1Z0-052 | 10 Tips For Renewal 1Z0-052 practice test


Q91. Examine the following statement that is used to modify the primary key constraint on the SALES table:

SQL> ALTER TABLE SALES MODIFY CONSTRAINT pk DISABLE VALIDATE;

Which three statements are true regarding the above command? (Choose three.)

A. The constraint remains valid.

B. The index on the constraint is dropped.

C. It allows the loading of data into the table using SQL *Loader.

D. New data conforms to the constraint, but existing data is not checked.

E. It allows the data manipulation on the table using INSERT/UPDATE/DELETE SQL statements.

Answer: ABC

Q92. You want to create a role to meet these requirements:

1. The role is to be protected from unauthorized usage.

2. The password of the role is not to be embedded in the application source code or stored in a table.

Which method would you use to restrict enabling of such roles?

A. Create the role with external authentication. B.

Create the role as a secure application role. C.

Create the role as a password-protected role.

D. Create a role and use Fine-Grained Access Control (FGAC) to secure the role.

Answer: B

Q93. See the Exhibit:

Which statements are true regarding the USERS tablespace? (Choose all that apply.)

A. A bitmap is used to record free extents

B. Free extents information is managed within the tablespace

C. Free extents information is managed in the SYSAUX tablespace

D. The data dictionary tables are updated when extents are allocated or deallocated

Answer: AB

Q94. Which three statements are correct about temporary tables? (Choose three.)

A. Indexes and views can be created on temporary tables

B. Both the data and structure of temporary tables can be exported

C. Temporary tables are always created in a user's temporary tablespace

D. The data inserted into a temporary table in a session is available to other sessions

E. Data Manipulation Language (DML) locks are never acquired on the data of temporary tables

Answer: ACE

Q95. Which two statements are true about checkpointing? (Choose two.)

A. The checkpoint frequency decreases with the smaller redo log file size.

B. It ensures that all committed data is written to the data files during normal shutdown.

C. The frequent full checkpoint in a database can cause the overall degradation of the database performance.

D. It prompts the Checkpoint (CKPT) process to write data to the data files and redo information to the online redo log files.

Answer: BC

Q96. Which of these is true about undo tablespace?

A. Undo tablespace is a temporary tablespace

B. Undo tablespace has only one datafile

C. Undotablespace has a datafile which is reused in cyclic manner

Answer: A

Q97. You are installing Oracle Database 11g on a machine. When you run the installer, the Universal Installer (OUI) shows the message that says one of the product-specific prerequisite checks has failed:

Checking available swap space requirements ...

Expected result: 1512MB

Actual Result: 1018MB

Check complete. The overall result of this check is: Failed <<<< Problem: The system does not have the required swap space.

What happens to the installation in this situation?

A. It can be continued.

B. It resizes the swap space automatically when you proceed further.

C. It can be continued, but the instance cannot be started without increasing the swap space.

D. It shows a message saying one or more prerequisite checks have failed and the installation cannot proceed.

Answer: A

Q98. In your production database, data manipulation language (DML) operations are executed on the SALES table.

You have noticed some dubious values in the SALES table during the last few days. You are able to track users, actions taken, and the time of the action for this particular period but the changes in data are not tracked. You decide to keep track of both the old data and new data in the table long with the user information.

What action would you take to achieve this task?

A. Apply fine-grained auditing.

B. Implement value-based auditing.

C. Impose standard database auditing to audit object privileges.

D. Impose standard database auditing to audit SQL statements.

Answer: B

Q99. You have a large amount of historical data in a flat file. Some analysts in your organization need to query this data in the file. The file is too large to load the data in it into your current database.

Which is the most effective method to access this data in your database?

A. Use the database link.

B. Use the SQL*Loader utility.

C. Use the Oracle Data Pump utility.

D. Create an external table and leave the data in the flat file.

Answer: D

Q100. You plan to implement the distributed database system in your company. You invoke Database Configuration Assistant (DBCA) to create a database on the server. During the installation, DBCA prompts you to specify the Global Database Name.

What must this name be made up of?

A. It must be made up of a database name and a domain name.

B. It must be made up of the value in ORACLE_SID and HOSTNAME.

C. It must be made up of the value that you plan to assign for INSTANCE_NAME and HOSTNAME.

D. It must be made up of the value that you plan to assign for ORACLE_SID and SERVICE_NAMES.

Answer: A