Which two are true about changing the LOCAL_UNDO_ENABLED property to false in a CDB? (Choose two.)
A. After the change, only a common user with the required privilege can create an undo tablespace in CDBandROOT.
B. Any new PDB and existing PDBs are automatically configured to use the default undo tablespace in CDB$ROOT.
C. After the change, only one undo tablespace can exist in CDB$ROOT.
D. After the change, any user with the required privilege can create an undo tablespace in the PDBs.
E. Undo tablespaces existing in PDBs must be dropped before the change.
F. After the change, each existing PDB has to be reopened for the new undo mode to take effect.
Which three are true about Database Point-in-Time Recovery? (Choose three.)
A. The database must have FLASHBACK DATABASE ON to perform Database Point-in-Time Recovery.
B. The database must be in MOUNT state when performing Database Point-in-Time Recovery.
C. Database Point-in-Time Recovery is performed by the Managed Recovery Process (MRP)
D. The Database must be in ARCHIVELOG mode.
E. The target point for the recovery must be specified as a stime or System Change Number (SCN).
F. The database must be open RESETLOGS after Database Point-in-Time Recovery.
Which two are true about various Oracle security and auditing capabilities? (Choose two).
A. Application-common Transparent Security Data Protection (TSDP) policies can be created only if all the PDBs in the application container are closed.
B. Application-common TSDP policies are always container specific.
C. Application-common OLS policies can be created only if all the PDBs in the application container are closed.
D. Unified auditing can be automatically synchronized to all application PDBs in an application container.
E. Fine-grained auditing (FGA) policies in an application root are automatically synchronized to all application PDBs contained in the application container when they are updated.
Which two statements are true about Resource Manager plans for individual pluggable databases (PDB plans) in a multitenant container database (CDB)?
A. If no PDB plan is enabled for a pluggable database, then all sessions for that PDB are treated to an equal degree of the resource share of that PDB.
B. In a PDB plan, subplans may be used with up to eight consumer groups.
C. If a PDB plan is enabled for a pluggable database, then resources are allocated to consumer groups across all PDBs in the CDB.
D. If no PDB plan is enabled for a pluggable database, then the PDB share in the CDB plan is dynamically calculated.
E. If a PDB plan is enabled for a pluggable database, then resources are allocated to consumer groups based on the shares provided to the PDB in the CDB plan and the shares provided to the consumer groups in the PDB plan.
Which two are true about backup encryption? (Choose two).
A. The Transparent Data Encryption (TDE) keystore is backed up using RMAN.
B. Vendor-specific media management software can be used for making encrypted RMAN backups to media.
C. The BACKUP BACKUPSET command can encrypt and decrypt backup sets.
D. Image copies can be encrypted.
E. Keystore-based encryption is the default mode for RMAN backup encryption.
F. Backup encryption can be enabled selectively for specific tablespaces.
Examine the command to duplicate a database:
Which two statements are true about the DUPLICATE command?
A. The SPFILE is copied along with the datafiles of the pluggable databases (PDBs). The root and the seed database in the container database (CDB) are also duplicated.
B. A backup of pdb1 and pdb5 must exist before executing the command.
C. The root and the seed database in the container database (CDB) are also duplicated.
D. A backup of CDB and pdb1 and pdb5 must exist before executing the command.
E. An auxiliary instance must be started with the initialization parameter ENABLE_PLUGGABLE_DATABASE set to TRUE.
RMAN is connected to the target database prod1 and an auxiliary instance in nomount state. Examine the command to create a duplicate database:
RMAN> DUPLICATE TARGET DATABASE TO dup1
FROM ACTIVE DATABASE
NOFILENAMECHECK
PASSWORD FILE
SPFILE;
Which two statements are true about the execution of the duplicate command?
A. All archive redo log files are automatically copied to the duplicate database.
B. The duplicate database has the same directory structure as the source database.
C. The duplicate database is created by using the backups created during the execution of
D. The duplicate command.
E. The password file and SPFILE for the duplicate database dup1 are created in their respective default locations.
F. The duplicate database is created without using RMAN backups and prod: is allowed to remain open during duplication.
You plan to create a database by using the Database Configuration Assistant (DBCA), with t he following specifications: Applications will connect to the database via a middle tier. The number of concurrent user connections will be high. The database will have mixed workload, with t he execution of complex BI queries scheduled at night.
Which DBCA option must you choose to create the database?
A. a General Purpose database template with default memory allocation
B. a Data Warehouse database template, with t he dedicated server mode option and AMM enabled
C. a General Purpose database template, with the shared server mode option and Automatic Memory Management (AMM) enabled
D. a default database configuration
Which three are true about recovery operations done without using Recovery Manager (RMAN)? (Choose three.)
A. A lost SPFILE can be recovered from memory using SQL*PLUS.
B. A lost password file can be re-created with SQL*PLUS.
C. A lost TEMPFILE must always be re-created manually.
D. A lost password file can be manually re-created with the orapwd utility.
E. A lost PFILE can be re-created alert.log using SQL*PLUS.
F. A lost index tablespace can be re-created without performing any recovery.
Which two are prerequisites for performing Flashback Transaction?
A. Fast Recovery Area must be enabled for the database
B. The EXECUTE privilege must be granted to a user on the DBMS_FLASHBACK package.
C. Undo retention guarantee must be configured for the database.
D. A supplemental log must be enabled for the primary key.
E. A supplemental log must be enabled for the primary key.