A database is running in ARCHIVELOG mode. It has two online redo log groups and each group has one member. A LGWR I/O fails due to permanent media failure that has resulted in the loss of a redo log file and the LGWR terminates causing the instance to crash. Which method should be used to efficiently recover from this loss of the current group member?
A. Restart the database; it would automatically re-create the corrupted redo log member.
B. Restore the corrupted redo log group, perform incomplete recovery, relocate by renaming the member of the damaged online redo log group to a new location, and then open the database with RESETLOGS.
C. Restore the corrupted redo log member, perform incomplete recovery, relocate by renaming the member of the damaged online redo log group to a new location, and then open the database with RESETLOGS.
D. Restore whole database backup, perform incomplete recovery, relocate by renaming the member of the damaged online redo log group to a new location, and then open the database with the RESETLOGS option.
Which is the correct description of the significance of the ORACLE_HOME environmental variable?
A. It specifies the directory containing the Oracle software.
B. It specifies the directory containing the Oracle-Managed Files.
C. It specifies the directory for database files, if not specified explicitly.
D. It specifies the base directory of Optimal Flexible Architecture (OFA).
The Oracle Application Server is installed on your machine. In Forms Builder, you open the HResource form and connect to the HR database. You also edit your Forms Builder run-time preferences and click Set Default. To test the HResource form module, you click Run Form and receive the error message FRM-10142 (The HTTP listener is not running). What action should you take?
A. Start an OC4J instance.
B. Start the Oracle HTTP Server.
C. Run the batch file STOPINST.BAT.
D. Start the browser before clicking Run Form.
E. Generate the form and move the .fmx file to the Oracle Application Server deployment directory.
You instance has these parameter settings:
Which three statements are true about these settings if no hints are used in a SQL statement?
A. A statement estimated for more than 10 seconds always has its degree of parallelism computed automatically.
B. A statement with a computed degree of parallelism greater than 8 will be queued for a maximum of 10 seconds.
C. A statement that executes for more than 10 seconds always has its degree of parallelism computed automatically.
D. A statement with a computed degree of parallelism greater than 8 will raise an error.
E. A statement with any computed degree of parallelism will be queued if the number of busy parallel execution processes exceeds 64.
F. A statement with a computed degree of parallelism of 20 will be queued if the number of available parallel execution processes is less 5.
Requirement demands that an incoming request from a portfolio manager has to have a higher priority compared to other users of the application. As an administrator, which one of the following approaches would you adopt?
A. Use Work Manager with the execute thread model to set up rules to associate a priority to the user.
B. Use Work Manager fair-share-request-class to associate a priority to the user.
C. Use Work Manager response-time-request-class to associate a priority to the user.
D. Use Work Manager context-request-class to associate a priority to the user.
Which two statements are true about java EE shared libraries?
A. A shared library cannot bedeployed to a cluster.
B. An application that is targeted to server1 can use a shared library that is targeted to server 2.
C. Multiple versions of the same shared library can be deployed and be active at the same time
D. A shared library is referenced through an application’s deployment descriptor.
Which two statements are true concerning the installation and configuration of the bootloader by the Anaconda installer, which is then used to boot Oracle Linux?
A. The Linux Loader (LILO) bootloader may be chosen for installation.
B. The bootloader must be password protected and Anaconda prompts for a password in all cases.
C. The Grand Unified Bootloader (GRUB) is the only bootloader used by Oracle Linux.
D. If previously installed operating systems are found on disk partitions that were not overwritten, then an attempt is made to configure the bootloader to be able to boot them.
E. The bootloader is installed by default in the first partition of the disk.
Node devices provide which three connectivity functions on QFabric systems? (Choose three.)
A. Connect to servers
B. Connect to Director groups
C. Connect to storage devices
D. Connect to external networks
E. Connect to redundant server Node groups
Which configuration keyword ensures that all in-progress sessions are re-evaluated upon committing a security policy change?
On a MAG Series device, where is the preauthentication sign-in message configured?
A. On the configuration page for the sign-in notification message
B. On the wireless user realm authentication policy
C. On the sign-in policy of the URL being used by the wireless users
D. On the sign-in page of the URL being used by the wireless users
Which two configurations are made using the QoS Setup Wizard? (Choose two.)
A. Assign applications to traffic classes.
B. Use ToS/DSCP values for traffic classes.
C. Exclude subnets from QoS management.
D. Select dedicated vs. over-subscribed circuits.
An administrator is tasked with installing an application patch on a virtual server. The administrator needs the ability to restore the server to its previous state quickly if the patch corrupts the system. Which of the following should the administrator do to accomplish this task?
A. Install the patch on a development server
B. Create a full backup
C. Create a snapshot
D. Install the patch on a test server
Sandy, the network administrator, has funding to do a major upgrade of the company’s LAN. This upgrade is currently in the planning stage, and Sandy still needs to determine the network requirements, bottlenecks, and any future upgrades in mind. Which of the following is the FIRST step in the planning process?
A. Conduct a vulnerability scan
B. Establish a network baseline
C. Conduct traffic analysis
D. Conduct a risk assessment
Which of the following devices is BEST suited for servers that need to store private keys?
A. Hardware security module
B. Hardened network firewall
C. Solid state disk drive
D. Hardened host firewall