C maximum number of network connections for each

Info iconThis preview shows page 1. Sign up to view the full content.

View Full Document Right Arrow Icon
This is the end of the preview. Sign up to access the rest of the document.

Unformatted text preview: chman, p. 1047-1050 Chapter 22: Names, Intelligent Agent, and MTS QUESTION 121: What does the connection attribute specify when enabling connection pooling? A. Maximum number of network connections for each dispatcher. B. Average number of network connections for each dispatcher. C. Maximum number of network connections for each shared server. D. Maximum number of user processes that can work against a dispatcher. Answer: A Explanation: Answer A is correct. The CONNECTION attribute of MTS_MAX_DISPATCHERS parameter specifies the maximum number of network connections to allow for each dispatcher. Default is platform-specific. Incorrect Answers: B is incorrect; there is no attribute in the MTS_MAX_DISPATCHERS parameter to specify average number of network connections for each dispatcher. C is incorrect; this attribute specifies limitation for each dispatcher, not for each shared server. D is incorrect; there is no attribute in the MTS_MAX_DISPATCHERS parameter to specify the maximum number of user processes that can work against a dispatcher. Oracle 8, DBA Certification Exam Guide, Jason S. Couchman, p. 1064-1065 Chapter 22: Names, Intelligent Agent, and MTS QUESTION 122: You execute Net8 Assistant to create a new listener for the PROD database. After Actualtests.com - The Power of Knowing 1Z0-026 defining the name of the listener as LSNprod1, the port address as 1521, and the protocol as TCP/IP, you save and exit. What is the status of the listener you just created? A. The listener has been created but is not valid because you used an unconventional name. B. The listener has been created but the Database Services setup needs to be completed. C. The listener has been created but cannot access the PROD database because you did not make the manual change in the listener.ora file on the server. D. The listener will access the PROD database the next time a client connection request is made. Answer: B Explanation: Answer B is correct. After that the listener has been created but the Database Services setup needs to be completed. Incorrect Answers: A is incorrect; LSNprod1 is acceptable name for the listener, it is valid. C is incorrect; you don't need to do manual changes in the listener.opa file on the server Net8 Assistant helps you to save all listener configurations to the listener.ora file automatically. The Database Services setup needs to be completed to finish the listener configuration. D is incorrect; the listener will not be able to access the PROD database until the Database Services setup is done. Oracle 8, DBA Certification Exam Guide, Jason S. Couchman, p. 991-997 Chapter 21: Overview of Net8 for Client and Server QUESTION 123: Which process returns responses to the user? A. Client process B. Listener process C. Dispatcher process D. Shared server process Answer: C Explanation: Answer C is correct. Dispatcher process returns responses to the user. Incorrect Answers: A is incorrect; the dispatcher process, not the client process, communicates with user to return results of query. B is incorrect; listener process is used just to set connection between the user and the database. Actualtests.com - The Power of Knowing 1Z0-026 D is incorrect; shared server grabs requests from the request queue where dispatcher put it, process the work requested and returns results onto the response queue, where dispatcher can pick up the results to pass them to the user. Oracle 8, DBA Certification Exam Guide, Jason S. Couchman, p. 1061-1063 Chapter 22: Names, Intelligent Agent, and MTS QUESTION 124: Given two data encryption algorithms, which one would be more secure? A. The one with longer key length. B. The one with the shorter key length. C. The one with the more complicated hash function. D. The one with the less commonly known encryption algorithm. Answer: A Explanation: Answer A is correct. The data encryption algorithm is most secure with longer key length. For example, RC4_128 128-bit encryption technology is more reliable that RC4_40 40-bit encryption technology. Incorrect Answers: B is incorrect; the data encryption algorithm with shorter key length is less secure that one with longer encryption key. C is incorrect; security of the data encryption algorithm is related with the length of the encryption key, not with a complication of hash function. D is incorrect; frequency of usage and popularity of the data encryption algorithm is not correlated with security of algorithm. Oracle 8, DBA Certification Exam Guide, Jason S. Couchman, p. 1114-1117 Chapter 23: Connection Manager, Troubleshooting, and Security QUESTION 125: What is the primary function of the OPA layer of the Net8 communication stack? A. Responsible for closing open cursors. B. Response to RPC calls from the server. C. Executes the SQL statement and fetches the data. D. Provides the graphical or character based user interface. E. Maps TNS functions to industry standard protocol used in the client server connection. Answer: E Explanation: Answer E is correct. OPA layer of the Net8 communication maps TNS functions to industry standard protocol used in the client-server connection. Actualtests.com - The Power of Knowing 1Z0-026 Incorrect Answers: A is incorrect; this layer is not responsible for closing open cursors. B is incorrect; this layer is not responsible to RPC calls from the server. C is incorrect; this layer is not responsible to execute the SQL statement and fetch the data. D is incorrect; it does not provide the graphical or character-based user interface Application layer is responsible for that. Oracle 8, DBA Certification Exam Guide, Jason S. Couchman, p. 989-991 Chapter 21: Overview of Net8 for Client and Server QUESTION 126: Someone manages to read packages sent over the network. What does this compromise? A. Data privacy B. Data integrity C. Data ambiguity D. Data authorization Answer: A Explanation: Answer A is correct. Data privacy ensures that database is not disclosed or stolen during transmission, so this compromises data privacy. Incorrect Answers: B is incorrect; data integrity ensures that data is not modified or disrupted during transmission. C is incorrect; there is no "data ambiguity" feature in Oracle. D is incorrect; data authorization ensures that a user have enough permissions log into database. Oracle 8, DBA Certification Exam Guide, Jason S. Couchman, p. 1114-1117 Chapter 23: Connection Manager, Troubleshooting, and Security Actualtests.com - The Power of Knowing...
View Full Document

Ask a homework question - tutors are online