Ethe addm analysis is done manually after each

Info iconThis preview shows page 1. Sign up to view the full content.

View Full Document Right Arrow Icon
This is the end of the preview. Sign up to access the rest of the document.

Unformatted text preview: atic Workload Repository (AWR) snapshots. F.The results of analysis are stored in tables, belonging to SYSMAN user, in the SYSTEMtablespace. Answer: D QUESTION 75: Exhibit, list of privileges. You work as a database administrator for Certkiller .com. The database user, Certkiller USER07, has the CONNECT role assigned. You want this user to be able to: A)connect to the database when the database is in restricted modeAND B)querythe tables created by other users. Which minimal set of privileges and roles would you select from the list in the exhibit to grant to the user? A.1 only B.6 only C.1, 2 and 4 D.3 and 4 E.1 and 6 Actualtests.com - The Power of Knowing 1Z0-042 Answer: D QUESTION 76: Exhibit Your database is not configured for session failover. Yourtnsnames.orafile contains the details shown in the exhibit. Which feature is enabled in this case? A.Load balancing B.Instance failover C.Database failover D.Connect-time failover E.Transparent Application Failover (TAF) Answer: D QUESTION 77: You work as a database administrator for Certkiller .com. One of the user sessions was terminated abnormally in the middle of a transaction. What does Oracle database do to recover it? A.Uses undo data for roll forward B.Uses Flashback Log for recovery C.Uses online redo logs to roll back D.Uses undo data to roll back the transaction E.Uses Recovery Manager (RMAN) to roll back F.Uses the System Monitor (SMON) background process to perform instance recovery Answer: D QUESTION 78: You work as a database administrator for Certkiller .com. You suspect that in one of your applications the customer table is being accessed by some unauthorized users. Which option would you use to monitor the queries being executed on the customer Actualtests.com - The Power of Knowing 1Z0-042 table? A.Monitor thealert.logfile B.Enable server-side SQL tracing for user sessions C.Enable fine-grained auditing for the customer table D.Enable Fine-Grained Access Control (FGAC) for the customer table E.Write a database trigger on the customer table on the SELEC...
View Full Document

Ask a homework question - tutors are online