Question 71
You want RMAN to make duplicate copies of data files when using the backup command.
What must you set using the RMAN configure command to achieve this?
What must you set using the RMAN configure command to achieve this?
Question 72
Your database is running in archivelog mode. You are taking a backup of your database by using RMAN with a recovery catalog. Because of a media failure, one of the data files and all the control files are lost.
Examine the steps to recover the database:
1.Restore the control files by using the RMAN restore controlfile command.
2.Mount the database.
3.Restore the data files by using the RMAN restore database command.
4.Open the database with the resetlogs option.
5.Recover the data files by using the RMAN recover using backup controlfile command.
6.Start the database instance in nomount state.
7.Connect to the target database by using a recovery catalog.
8.Open the database.
9.Restore the data file.
10.Recover the data file.
Identify the required steps in the correct order.
Examine the steps to recover the database:
1.Restore the control files by using the RMAN restore controlfile command.
2.Mount the database.
3.Restore the data files by using the RMAN restore database command.
4.Open the database with the resetlogs option.
5.Recover the data files by using the RMAN recover using backup controlfile command.
6.Start the database instance in nomount state.
7.Connect to the target database by using a recovery catalog.
8.Open the database.
9.Restore the data file.
10.Recover the data file.
Identify the required steps in the correct order.
Question 73
Examine the following steps of privilege analysis for checking and revoking excessive, unused privileges granted to users:
1.Create a policy to capture the privileges used by a user for privilege analysis.
2.Generate a report with the data captured for a specified privilege capture.
3.Start analyzing the data captured by the policy.
4.Revoke the unused privileges.
5.Compare the used and unused privileges' lists.
6.Stop analyzing the data.
Identify the correct sequence of steps.
1.Create a policy to capture the privileges used by a user for privilege analysis.
2.Generate a report with the data captured for a specified privilege capture.
3.Start analyzing the data captured by the policy.
4.Revoke the unused privileges.
5.Compare the used and unused privileges' lists.
6.Stop analyzing the data.
Identify the correct sequence of steps.
Question 74
In a database supporting an OLTP workload, tables are frequently updated on both key and non- keycolumns.
Reports are also generated by joining multiple tables.
Which table organization or type would provide the best performance for this hybrid workload?
Reports are also generated by joining multiple tables.
Which table organization or type would provide the best performance for this hybrid workload?
Question 75
Your multitenant container database (CDB) cdb1 that is running in archivelog mode contains two pluggable databases (PDBs), pdb2_1 and pdb2_2. RMAN is connected to the target database pdb2_1.
Examine the command executed to back up pdb2_1:
RMAN> BACKUP DATABASE PLUS ARCHIVELOG;
Which statement is true about the execution of this command?
Examine the command executed to back up pdb2_1:
RMAN> BACKUP DATABASE PLUS ARCHIVELOG;
Which statement is true about the execution of this command?