This preview shows page 1. Sign up to view the full content.
Unformatted text preview: atic Workload Repository
F.The results of analysis are stored in tables, belonging to SYSMAN user, in the
Exhibit, list of privileges. You work as a database administrator for Certkiller .com. The database user,
Certkiller USER07, has the CONNECT role assigned. You want this user to be
A)connect to the database when the database is in restricted modeAND
B)querythe tables created by other users.
Which minimal set of privileges and roles would you select from the list in the
exhibit to grant to the user?
C.1, 2 and 4
D.3 and 4
E.1 and 6
Actualtests.com - The Power of Knowing 1Z0-042 Answer: D
Exhibit Your database is not configured for session failover. Yourtnsnames.orafile contains
the details shown in the exhibit.
Which feature is enabled in this case?
E.Transparent Application Failover (TAF)
You work as a database administrator for Certkiller .com. One of the user sessions
was terminated abnormally in the middle of a transaction.
What does Oracle database do to recover it?
A.Uses undo data for roll forward
B.Uses Flashback Log for recovery
C.Uses online redo logs to roll back
D.Uses undo data to roll back the transaction
E.Uses Recovery Manager (RMAN) to roll back
F.Uses the System Monitor (SMON) background process to perform instance recovery
You work as a database administrator for Certkiller .com. You suspect that in one of
your applications the customer table is being accessed by some unauthorized users.
Which option would you use to monitor the queries being executed on the customer
Actualtests.com - The Power of Knowing 1Z0-042
B.Enable server-side SQL tracing for user sessions
C.Enable fine-grained auditing for the customer table
D.Enable Fine-Grained Access Control (FGAC) for the customer table
E.Write a database trigger on the customer table on the SELEC...
View Full Document
- Fall '09