Click on the Exhibit button
Given the following DDL statements:
If COL2 contains XML documents similar to the one shown in the scenario, what is the end result of the CREATE INDEX statement?
A. An error will be returned because it is not possible to include more than one column as part of the CREATE INDEX statement when one of the columns is of type XML.
B. An error will be returned because it is not possible to create an index for an XML column like COL2.
C. A non-partitioned index will be created in table space TBSP21 since the INDEX IN clause of the table definition is ignored and XML_INDEX will automatically be created within the first index partition listed in the create table statement.
D. TBSP11 and TBSP12 will each contain one local index for XML_INDEX since the local indexes will physically reside in the same table space as the related data.
正解:A
質問 2:
Which category is used to audit the running of SQL statements?
A. EXECUTE
B. CONTEXT
C. SQLMAINT
D. OBJMAINT
正解:A
質問 3:
What is the minimum privilege required to run the audit stored procedures and table functions (AUDIT_LIST_LOGS and AUDIT_ARCHIVE)?
A. DATAACCESS privilege on the audit stored procedures and table functions.
B. ACCESSCTR privilege on the audit stored procedures and table functions.
C. EXECUTE privilege on the audit stored procedures and table functions.
D. SECADM authority on database.
正解:C
質問 4:
Regardless of the value set for the mon_obj_metrics parameter, data is always collected for monitor elements reported by which of the two following table functions? (Choose two.)
A. MON_GET_TABLESPACE
B. MON_GET_TABLE
C. MON_GET_BUFFERPOOL
D. MON_GET_INDEX
E. MON_GET_CONTAINER
正解:B,D
質問 5:
Given the following GRANT commands:
Assuming that user BOB belongs to the group STAFF and STAFF has no other privileges aside from what is defined above, what is the highest level of privilege that BOB has on the database?
A. ACCESSCTRL
B. CONNECT
C. DATAACCESS
D. DBADM
正解:C
質問 6:
Which two are valid BASED UPON CONNECTION attributes for a trusted context? (Choose two.)
A. Data stream encryption
B. Application program name
C. System authorization id
D. Database role
E. Date and time
正解:A,C
質問 7:
If table space TS is created as follows: CREATE TABLESPACE ts MANAGED BY DATABASE USING (FILE '/data.dat' 12 M); If table space TS contains 4 MB of data and the hight water mark is at 6 MB, and the following statements are executed: ALTER TABLESPACE ts LOWER HIGH WATER MARK; ALTER TABLESPACE ts REDUCE (ALL CONTAINERS 5 M); What are the expected results?
A. The high water mark for all containers used for table space TS is lowered by 5 MB.
B. The size of all containers is only reduced by 5 MB if the high water mark is lowered.
C. The high water mark for table space TS is lowered and the size of all containers is reduced by 5 MB.
D. The high water mark for all containers used by table space TS is only lowered if the size of all containers can be reduced by 5 MB.
正解:C
質問 8:
Which function/stored procedure CANNOT be used to view audit facility data?
A. SYSPROC.AUDIT_ARCHIVE
B. SYSPROAUDIT_LIST_LOGS
C. SYSPROC.AUDIT_AUTH
D. SYSPROC.AUDIT_DELIM_EXTRACT
正解:C