11.
The following initialization parameters are set on your database instance:
DB_NAME=LNX1
SQL_TRACE=FALSE
BACKGROUND_DUMP_DEST=/data1/admin/lnx1/bdump
USER_DUMP_DEST=/data1/admin/lnx1/udump
TRACEFILE_IDENTIFIER='prod'
An archiver (ARCH) process encounters an error situation. Its process ID is 32123. Which of the
following is true?
- A.The trace file /data1/admin/lnx1/bdump/lnx1_arch_32123.trc will be created.
- B.The trace file /data1/admin/lnx1/bdump/arch_lnx1_32123_prod.trc will be created.
- C.The trace file /data1/admin/lnx1/udump/arch_lnx1_32123.trc will be created.
- D.The trace file /data1/admin/lnx1/bdump/lnx1_arch_32123_prod.trc will be created.
- E.No trace file will be created.
- Answer & Explanation
- Report
Answer : [B]
Explanation :
Explanation :
Because the archiver is a background process, it will follow the naming conventions and storage locations used by all background processes. The TRACEFILE_IDENTIFIER parameter has no effect on background processes, so it is ignored. |
12.
Which of the following could be found in the alert log? (Choose all that apply.)
- A.Evidence of a brute force attack against the listener
- B.External procedure executions
- C.Tablespace creation events
- D.Evidence of recovery operations
- E.Initialization parameter values
- Answer & Explanation
- Report
Answer : [C,D,E]
Explanation :
Explanation :
All of the information specified in C, D, and E is logged to the alert log. Listener attacks would be logged in the listener log, not the alert log. External procedure executions are not logged. |
13.
You need to secure your listener. Which of the following is not a recommended security measure?
(Choose the best answer.)
- A.Enable Listener logging.
- B.Remove unnecessary external procedure services.
- C.Configure listener on a non-standard port.
- D.Apply patches.
- E.Block SQL*NET traffic on firewalls.
- Answer & Explanation
- Report
Answer : [C]
Explanation :
Explanation :
Configuring the listener on a non-standard port may offer a slight security increase, but portscanning programs could still easily locate the listener. Therefore, it is not a recommended security measure. |
14.
You want to set a password on the listener. Why might you want to use lsnrctl rather than
manually editing the listener.ora file? (Select the best two answers.)
- A.It is easier.
- B.It will encrypt the password in the listener.ora file.
- C.You don't have access to the operating system.
- D.lsnrctl will log the event to the alert log.
- E.The listener.ora file is stored in binary format.
- Answer & Explanation
- Report
Answer : [B,C]
Explanation :
Explanation :
Manually editing the listener.ora file will result in a password that is stored in plaintext, whereas lsnrctl will store the password in an encrypted format. Also, you cannot manually edit the listener.ora file if you don't have access to the operating system (for example, if you need to perform the change remotely, but don't have an operating system account). In this situation, lsnrctl could be used from a remote location. |
15.
Which of the following are not automatically sized components of ASMM?
- A.Streams pool
- B.Keep buffer cache
- C.SQL work area
- D.Recycle buffer cache
- E.All of the above
- Answer & Explanation
- Report
Answer : [E]
Explanation :
Explanation :
None of these components are automatically sized by ASMM. They are all manually sized SGA components, except for the SQL work area. The SQL work area isn't a part of the SGA at all. It is managed by APMM. |