Which two must be true when you migrate an Oracle Database 12.1.0.2 non-CDB to a database that is running in a Database as a Service (DBaaS) instance on Oracle Cloud by using the Remote Cloning method?
A. The non-CDB may be opened in READ WRITE mode as long as ARCHIVELOG is enabled.
B. The database link owner must have the CREATE PDB system privilege.
C. The source platform must have the same endian format.
D. The non-CDB must be in archivelog mode.
E. The non-CDB must be opened in READ ONLY mode.
F. The database link owner must have the CREATE PLUGGABLE DBsystem privilege.
Correct Answer: EF
Explanation:
To migrate an Oracle Database 12c non-CDB database to a Database Cloud Service database
deployment using the remote cloning method, you perform these tasks:
1.
On the on-premises database host, invoke SQL*Plus and set the on-premises database to READ ONLY mode.
2.
On the Database Cloud Service compute node, invoke SQL*Plus and create a database link that enables a connection to the on-premises database.
3.
On the Database Cloud Service compute node, execute the CREATE PLUGGABLE DATABASEcommand to clone the on-premises non-CDB database.
4.
On the Database Cloud Service compute node, execute the $ORACLE_HOME/rdbms/admin/noncdb_to_pdb.sqlscript.
5.
On the Database Cloud Service compute node, open the new PDB by executing the ALTER PLUGGABLE DATABASE OPENcommand.
6.
Optionally, on the on-premises database host invoke SQL*Plus and set the on-premises database back to READ WRITEmode.
You can use this method only if the on-premises platform is little endian, the on-premises database release is 12.1.0.2 or higher, and the on-premises database and Database Cloud Service database have
compatible database character sets and national character sets.
You want to control network traffic among your DBaaS instances.
Which two statements are true about network groups?
A. By default, the DBaaS instances in a network group are accessible from hosts outside the network group.
B. You can add a DBaaS instance to a network group, but this enables communication only within this network group.
C. You can add a DBaaS instance to a network group, thus enabling communication with all other DBaaS instances both inside and outside the network group.
D. You can create a network group to enable unrestricted communication among your DBaaS instances.
E. DBaaS prevents network groups from having unrestricted communication among DBaaS instances.
Correct Answer: BE
Explanation:
Network groups provide a method for VMs to be grouped together for communications and firewall rules.
You can define network groups to allow VMs within a group to communicate with each other, while also
preventing those VMs from communicating outside the group.
Note:
Access rule. Access rules define the permitted paths of communication for VMs that are within a network
group. You can define an access rule to enable a specific path of communication between two network
groups, or between a network group and a specified list of IP addresses.
You use GUI tools on the Virtual Machine to create and administer the Database as a Service (DBaaS) databases.
You wish to use the Oracle Database Configuration Assistant (DBCA) to create a database instance. To run DBCA, you will need to use an SSH connection.
You need to perform several steps to establish this connection in DBCA and to create the database.
What are two of these steps?
A. Connect to the DBaaS instance with the SSH terminal session as the oracle user.
B. Configure a PuTTY or SSH session to perform X11 forwarding.
C. Install an Xterminal program if required.
D. Update the tnsnames.ora file with the name of the service to which you want to connect.
Correct Answer: AB
Explanation:
Example: To create a database into your Oracle Database Cloud Service
1.
You have created a PuTTY definition for connecting through an SSH tunnel to your Database Cloud Service (DBaaS) instance. Now open this definition to connect to the VM.
2.
Because this is not the first time you are connecting to the VM, the SSH utility does not prompt you to confirm the public key. If it were the first time, the SSH utility would have prompted you to confirm the public key. You would have confirmed by clicking Yes.
3.
You can now launch DBCA either in silent mode or in graphical mode.
You created a Database Deployment and predefined security rules were generated.
Which two predefined security rules were generated when you created the Database Deployment?
A. The ora_p2_ssh security rule for the public-internet security IP list was created to communicate with the ora_dbpredefined network group over SSH.
B. The ora_db_public security rules to manage database access through the default port 1521 and the ora_db_admin security rules for SSH connection via SQL*Net through port 5500 were created.
C. The ora_access db security rule for SSH connection via PuTTY is created to configure network rules and ora_access_consolefor HTTPS access to Oracle Cloud Services Console.
D. No security rules are created by default and users must manually configure all access rules.
E. The ora_p2_dblistener security rule for the public-internet security IP list (any host on the Internet) was created to communicate with the ora_dbpredefined network group over SQL*Net.
Correct Answer: AE
Explanation:
When a database deployment is created, the following Oracle Compute Cloud Service security rules are
created, but set to a disabled status.
1.
ora_p2_dbconsole, which controls access to port 1158, the port used by Enterprise Manager 11g Database Control.
2.
ora_p2_dbexpress, which controls access to port 5500, the port used by Enterprise Manager Database Express 12c.
3.
ora_p2_dblistener, which controls access to the port used by SQL*Net.
4.
ora_p2_http, which controls access to port 80, the port used for HTTP connections.
5.
ora_p2_httpssl, which controls access to port 443, the port used for HTTPS connections, including Oracle REST Data Services, Oracle Application Express, and Oracle DBaaS Monitor.
References: References: Using Oracle Database Cloud Service (February 2017), page A-5 https://docs.oracle.com/en/cloud/paas/database-dbaas-cloud/csdbi/using-oracle-database-cloudservice.pdf
Question 37:
How do you access “none default ports” on a Database Deployment's compute node?
A. Review a file called portlist.ini in your installation directory to acquire the list of “none default ports” that are assigned to your compute node.
B. File a service request with your Oracle Database Cloud Service support team to have the “none default ports” opened for use.
C. Create an SSH tunnel to the “none default port”.
D. All communication to Oracle Database Cloud Service must be configured only by using the default ports that are assigned to your compute node during the installation of your Database Deployments.
Correct Answer: C
Explanation:
To enable access to a compute node port, you enable the appropriate security rule. When you enable one
of the predefined security rules, the given port on the compute node is opened to the public internet. To
enable access to a different port, or restrict access to a port, you must create a security rule.
Note: When a database deployment is created, the following Oracle Compute Cloud Service security rules
are created, but set to a disabled status.
1.
ora_p2_dbconsole, which controls access to port 1158, the port used by Enterprise Manager 11g Database Control.
2.
ora_p2_dbexpress, which controls access to port 5500, the port used by Enterprise Manager Database Express 12c.
3.
ora_p2_dblistener, which controls access to the port used by SQL*Net.
4.
ora_p2_http, which controls access to port 80, the port used for HTTP connections.
5.
ora_p2_httpssl, which controls access to port 443, the port used for HTTPS connections, including Oracle REST Data Services, Oracle Application Express, and Oracle DBaaS Monitor.
References: References: Using Oracle Database Cloud Service (February 2017), page 3-7
Which two problems indicate that you should consider scaling up your Database Deployment that hosts an Oracle Database 12c multitenant container database (CDB) with four pluggable databases (PDBs)?
A. shortage of CPU for two PDBs in the CDB
B. shortage of I/O bandwidth for the parallel queries that are issued by the CDB instance
C. shortage of memory for the Database Deployment
D. shortage of memory in the Shared Pool of the CDB
Which two steps would you perform to restore and recover a database from the most recent backup?
A. Disable the scheduled backup configuration.
B. Disable the scheduled recovery configuration.
C. Perform the restore with the dbaascli orec --args -latestcommand.
D. Perform the restore with the dbaascli orec --args -lastcommand.
E. Perform the restore with the dbaascli orec --args -stop -lastcommand.
F. Perform the restore with the dbaascli orec --args -close -lastcommand.
Correct Answer: AC
Explanation:
A: Note: If some activity you want to perform requires you to temporarily disable regularly scheduled backups, you can do so by removing the scheduling information from the system-wide /etc/crontab file.
C: You can use the dbaascli utility to restore from the most recent backup and perform complete recovery on a database deployment hosting a single-instance database:
1.
Connect as the opc user to the compute node.
2.
Start a root-user command shell: $ sudo -s #
3.
Restore the most recent backup and perform complete recovery using the orec subcommand of the
dbaascli utility:
# dbaascli orec --args -latest
The restore and recover process performs these steps:
Shuts down the database Extracts and restores configuration files Prepares for recovery Performs the recovery Restarts the database instance after recovery
1. Exit the root-user command shell: # exit $
References: Using Oracle Database Cloud Service (February 2017), page 6-23
Which statement is true about security rules for Database Deployments?
A. They are used only for configuring external server access to Database Deployments and do not impact how security lists communicate.
B. They define a specific communication path, which consists of a source, destination, and protocol-port combination over which communication is allowed.
C. They are used to map an external user to a database user to allow the user to communicate with and access the database.
D. They are used to encrypt communication between Database Deployments.
Correct Answer: B
Explanation: On the Access Rule you can define the following:
Source
Hosts from which traffic is allowed. Possible values are DB, PUBLIC-INTERNET, or a custom value in
the form of an IP address. Destination
Security list to which traffic is allowed. This will be DB, the ora_db security list for the deployment. Ports
Nowadays, the certification exams become more and more important and required by more and more enterprises when applying for a job. But how to prepare for the exam effectively? How to prepare for the exam in a short time with less efforts? How to get a ideal result and how to find the most reliable resources? Here on Vcedump.com, you will find all the answers. Vcedump.com provide not only Oracle exam questions, answers and explanations but also complete assistance on your exam preparation and certification application. If you are confused on your 1Z0-160 exam preparations and Oracle certification application, do not hesitate to visit our Vcedump.com to find your solutions here.