control files
password file
archived log files
system-critical data files for which all the redo entries are present
non-system-critical data files for which all the redo entries are present
第1题:
Which statements are true about checkpointing()
第2题:
After performing a clean shut down of the database instance for maintenance, you mount the database andthen execute a command to open the database:SQL> ALTER DATABASE OPEN; Which two statements are true()
第3题:
Which type of database file is spread across all disks in a disk group?()
第4题:
The loss of which two types of files may require a recovery with the RESETLOGS option?()
第5题:
Which two operations are NOT performed by the DUPLICATE command in Recovery Manager (RMAN) whileduplicating a running database? ()(Choose Two)
第6题:
View the Exhibit.You executed the following command to perform a backup of the USERS tablespace: RMAN> BACKUP TABLESPACE USERS; Which three types of files are backed up? ()
第7题:
Inactive and current redo log files are required to accomplish recovery.
Online and archived redo log files are required to accomplish instance recovery.
All redo log entries after the last checkpoint are applied from redo log files to data files.
All redo log entries recorded in the current redo log file until the checkpoint position are applied to datafiles.
第8题:
Only the data files.
All of the data files and the control files.
Only the data files belonging to the SYSTEM tablespace.
Only the data files belonging to the SYSTEM tablespace and the control files.
第9题:
Creating the control file for the duplicate database
Restoring the target data files to the duplicate database
Performing complete recovery using all available backups
Generating a new, unique DBID for the duplicate database
Copying the online redo log files from the target database to the duplicate database
第10题:
Inactive and current redo log files are required to accomplish recovery.
Online and archived redo log files are required to accomplish instance recovery.
All redo log entries after the last checkpoint are applied from redo log files to data files.
All redo log entries recorded in the current redo log file until the checkpoint position are applied to data files
第11题:
loss of one of the tablespaces
loss of a system data file
loss of one of the control files
loss of a tempfile
loss of the only member of an unarchived redo log group
loss of a member from each redo log group
第12题:
The online redo log files and online data files are opened.
All the online data file headers are checked for consistency.
Instance recovery is performed before opening the database.
The path and existence of all the log file members are checked
第13题:
The database is configured in ARCHIVELOG mode and regular complete database backups are taken. The loss of which two types of files may require a recovery with the RESETLOGS option?()
第14题:
Which two statements are true about checkpointing()
第15题:
The instance abnormally terminates because of a power outage. Which statement is true about redolog files during instance recovery()
第16题:
You are working on Oracle Database 10g, which is in ARCHIVELOG mode. All the archived log files are intact. In which scenario would performing a recovery require the opening of the database with the RESETLOGS option?()
第17题:
Which two operations are NOT performed by the DUPLICATE command in Recovery Manager (RMAN) while duplicating a running database?()
第18题:
all the data files belonging to the USERS tablespace
password file
online redo log files
the current control file
archived redo log files
the current server parameter file
data files belonging to the USERS tablespace and all the default tablespaces
第19题:
Control files
Password files
Inactive online redo log file
Archived log files required to perform recovery
Newly created tablespace which is not backed up
第20题:
loss of a tempfile
loss of a system data file
loss of one of the control files
loss of one of the tablespaces
loss of a member from each redo log group
loss of the only member of an unarchived redo log group
第21题:
control files
password file
archived log files
system-critical data files for which all the redo entries are present
non-system-critical data files for which all the redo entries are present
第22题:
The checkpoint frequency decreases with the smaller redo log file size.
It ensures that all committed data is written to the data files during normal shutdown.
The frequent full checkpoint in a database can cause the overall degradation of the database performance.
It prompts the Checkpoint (CKPT) process to write data to the data files and redo information to the online redo log files.
第23题:
Creating the control file for the duplicate database
Restoring the target data files to the duplicate database
Performing complete recovery using all available backups
Generating a new, unique DBID for the duplicate database
Copying the online redo log files from the target database to the duplicate database
第24题:
Control files
Password files
Inactive online redo log file
Archived log files required to perform recovery
Newly created tablespace which is not backed up