It can be used to back up all data on ASM disks.
It can be used to recover the damaged ASM disk group along with the data.
It can be used to gather information about a preexisting ASM disk group with disk paths,disk name,failure groups,attributes templates,and alias directory structure.
It can be used to re-create the ASM disk group with its attributes.
第1题:
Which two statements are true regarding an Automatic Storage Management (ASM) instance? ()
第2题:
The ORACLE_SID environment variable is set to +ASM. ASMLIB is not used in the configuration. You executed the following command to startup the Automatic Storage Management (ASM) instance. SQL> STARTUP; Which two activities are performed during a successful start up operation? ()(Choose two.)
第3题:
You want to perform an RMAN backup of database as a copy. Which two factors will you consider whileperforming the backup operation?() (Choose two).
第4题:
You want to migrate your existing non-ASM files to ASM files for the database PROD. Which method or command would you use to accomplish this task?()
第5题:
Which two statements are true about encrypting RMAN backup?() (Choose two.)
第6题:
BACKUP AS BACKUPSET
BACKUP AS COPY
BACKUP AS COMPRESSED BACKUPSET
BACKUP INCREMENTAL LEVEL n CUMULATIVE
第7题:
The backup piece size will be limited to 300 MB
The RMAN uses multiplexing to perform backup
The operation is accomplished using the default channel available
The RMAN parallelizes the backup although the parallelism is not set for a channel
第8题:
LDP uses Down Stream On Demand.
RSVP uses Down Stream On Demand.
LDP uses Down Stream Unsolicited.
RSVP uses Down Stream Unsolicited.
第9题:
RMAN would use the current operating system location to place the backup.
RMAN would use the control file of the target database to maintain the backup.
RMAN would use the recovery catalog of the target database to maintain the backup.
RMAN would use the control file of the target database to maintain the backup metadata.
RMAN would use the recovery catalog of the target database to maintain the backup metadata.
第10题:
As ASM instance mounts an ASM control file
An ASM instance uses the ASMB process for rebalancing of disks within a disk group
Automatic Memory Management is enabled in an ASM instance even when the MEMORY_TARGET parameter is not set explicitly
An RDBMS instance gets connected to an ASM instance using ASMB as a foreground process when the database instance is started
第11题:
The transparent encryption of backups uses the encryption wallet
The database uses the same encryption key for every encrypted backup
The password encryption of backups only uses the password while creating and restoring backup
If transparent encryption is configured, you cannot use the SET ENCRYPTION BY PASSWORD command to make password-protected backups.
第12题:
The database-compatibility version settings for each instance must be greater than or equal to the RDBMS compatibility of all ASM disk groups used by that database instances.
RDBMS compatibility and the database version determines whether a database instance can mount the ASM disk group.
The RDBMS compatibility settings for a disk group control the format of data structures for ASM metadata on the disk.
ASM compatibility controls which features for the ASM will be enabled.
第13题:
You want to take the backup of the USERS tablespace. It has a single data file of 900 MB. You have tape drives of 300 MB each. The SBT channel is configured for Recovery Manager (RMAN). To accomplish the backup, you issued the following RMAN command: RMAN> BACKUP SECTION SIZE 300M TABLESPACE users; Which two statements are true about the execution of the above command? ()(Choose two.)
第14题:
Which two statements are true about encrypting RMAN backup?()
第15题:
You want to perform the following operations for the DATA ASM disk group: -Verify the consistency of the disk. -Cross-check all the file extent maps and allocation tables for consistency. check whether the alias metadata directory and file directory are linked correctly. -Check that ASM metadata directories do not have unreachable allocated blocks. Which command accomplishes these tasks()?
第16题:
You are migrating your production database from non-ASM to ASM storage. You used the RMAN utility to migrate the database from non-ASM to ASM storage. Which type of backup command script will you use for migrating the database from non-ASM to ASM storage?()
第17题:
RMAN would use the current operating system location to place the backup.
RMAN would use the control file of the target database to maintain the backup.
RMAN would use the recovery catalog of the target database to maintain the backup.
RMAN would use the control file of the target database to maintain the backup metadata.
RMAN would use the recovery catalog of the target database to maintain the backup metadata.
第18题:
The transparent encryption of backups uses the encryption wallet
The database uses the same encryption key for every encrypted backup
The password encryption of backups only uses the password while creating and restoring backup
If transparent encryption is configured, you cannot use the SET ENCRYPTION BY PASSWORD command to make password-protected backups.
第19题:
The transparent encryption of backups uses the encryption wallet
The database uses the same encryption key for every encrypted backup
The password encryption of backups only uses the password while creating and restoring backup
If transparent encryption is configured, you cannot use the SET ENCRYPTION BY PASSWORD command to make password-protected backups
第20题:
Database files
Spfiles
Redo-log files
Archived log files
RMAN backup sets
Password files
init.ora files
第21题:
when one or more file directory paths are accidentally deleted from an ASM disk group
when one of the disks in a disk group is accidentaly unplugged
when the data file on an ASM disk group gets corrupted
when one or more disks in an ASM disk group are lost
第22题:
The metadata used to track extents in SGA is reduced.
Rebalance operations are completed faster than with a fixed extent size
An ASM Instance automatically allocates an appropriate extent size.
Resync operations are completed faster when a disk comes online after being taken offline.
Performance improves in a stretch cluster configuration by reading from a local copy of an extent.
第23题:
The backup metadata will be maintained in the control file for 100 days.
The backup metadata will be maintained in the recovery catalog for 100 days.
The backup metadata will be maintained in the flash recovery area for 100 days.
After 100 days, the backup sets and image copies will be deleted from the media.