QUESTION 1What can you do with the DBMS_LOB package? A. Use the DBMS_LOB.WRITE procedure to write data to a BFILE.B. Use the DBMS_LOB.BFILENAME function to locate an external BFILE.C. Use the DBMS_LOB.FILEEXISTS function to find the location of a BFILE.D. Use the DBMS_LOB.FILECLOSE procedure to close the file being accessed. Answer: D
Category: Check Point Dumps
QUESTION 1Examine the parameters for your database instance:NAMETYPE VALUE————————– ——————————- —————————undo_management string AUTOundo_retentioninteger 12 00undo_tablespace string UNDOTBS1You execute the following command:SQL> ALTER TABLESPACE undotbs1 RETENTION NOGUARANTEE;Which statement is true in this scenario? A. Undo data is written to flashback logs after 1200 seconds.B. Inactive undo data is retained for 1200 seconds even if subsequent transactions […]
QUESTION 1You need to create a table for a banking application. One of the columns in the table has the following requirements:1) You want a column in the table to store the duration of the credit period.2) The data in the column should be stored in a format such that it can be easily added […]
QUESTION 1You notice that the performance of your production 24/7 Oracle database significantly degraded. Sometimes you are not able to connect to the instance because it hangs. You do not want to restart the database instance.How can you detect the cause of the degraded performance? A. Enable Memory Access Mode, which reads performance data from […]
QUESTION 1As part of archiving the historical data, you want to transfer data from one database to another database, which is on another server. All tablespaces in the source database are read/write and online. The source and target databases use the same compatibility level and character sets. View the Exhibit and examine the features in […]
QUESTION 1Which two statements correctly describe the relation between a data file and the logical database structures? (Choose two.) A. An extent cannot spread across data files.B. A segment cannot spread across data files.C. A data file can belong to only one tablespace.D. A data file can have only one segment created in it.E. A […]
QUESTION 1 Which statement is true about the object model? A. dmr_content is not a sub-type of dm_sysobject although sysobject contents are stored as dmr_content objects. B. dm_acl objects are stored in the System cabinet. C. Not all sysobjects can have associated permissions. D. Virtual documents are objects of type dm_relation that describe a parent/child […]
QUESTION 1 Oracle Web Services Manager uses an agent-based approach to providing Web Services security. Where are these agents deployed? A. In any IPv4 of Later network firewall B. In the Oracle WebLogic Server Web Service request Interceptors C. In the Oracle Service Bus proxy pipeline D. In the Oracle Access Manager web gate E. […]
QUESTION 1 APIs for dynamically registering servlets and filters can be called at: A. Context initialization time B. Any time C. There is no way to dynamically register servlets and filters D. Context destruction time E. Injected into a servlet context Answer: A
QUESTION 1 The developer has defined the following entity class office: Which of the following attributes will be in corresponding generated static metamodel class for the rooms’ field? A. Public static volatile CollectionAttribute<Room> rooms; B. Public static volatile ListAttribute<Room> rooms; C. Public static volatile ListAttribute<Office, Room> rooms; D. Public static volatile SingleAttribute<Room> rooms; Answer: […]
QUESTION 1 Which of the following WS-Security token profiles is not supported in Metro? A. X509 Token Profile B. Kerberos Token Profile C. SAML Token Profile D. SOAP with Attachments (SWA) profile E. Right Expression Language (REL) Token Profile Answer: E
QUESTION 1 You are writing a client that sends a message to a JMS queue. What two statements are true? A. You cannot use resource injection to access a JMS destination from a Java EE application client. B. You can use resource injection to access a JMS destination from a servlet. C. You must use […]
QUESTION 1 A system administrator has received the Java ES distribution as a two-CD set, and wishes to configure an NFS server to use as an install server for Sun Cluster 3.2. What is the correct procedure? A. Mount and share each CD from a separate server. B. This is NOT possible, only the DVD […]
QUESTION 1 A security administrator has a requirement to deploy the Solaris Security Toolkit onto all Solaris servers in the department. In this environment, there are a variety of platforms and operating system versions deployed. Onto which two platforms and operating system combinations can the Solaris Security Toolkit be deployed in a supported configuration? (Choose […]
QUESTION 1 Company A owns, and is authoritative, for the domain aco.com. Company A is in the process of consolidating systems as a result of the purchase of Company B. As part of this transition effort, network administrators have configured Company A’s DNS server zone files to include and become authoritative for Company B’s bco.com […]

