최신 Oracle Database Cloud 1z0-998-21 무료샘플문제:
1. Which three are the basic security considerations for using any application securely?
A) Review user privileges to determine relevance to current work requirements.
B) Establish who should access which system components and how often, and monitor those components.
C) Keep up-to-date on security information and apply all the security patches.
D) Use the default password allocated by the administrator while creating an account.
E) Ensure that different applications have separate Virtual Cloud Networks (VCN).
2. Which three are the features of the different DB systems in Oracle Cloud Infrastructure?
A) RAC is available in VM and Exadata DB systems.
B) All DB systems can have multiple database editions and versions.
C) CPU can be scaled up for full rack only in Exadata DB systems.
D) Storage can be scaled up for the VM DB systems only.
E) CPUs can be scaled up for bare metal and Exadata DB systems.
3. Which two statements are true about using the Object Storage for the backups?
A) Availability and durability of the backup is high.
B) Virtual Cloud Network must be configured with dynamic routing gateway.
C) Availability is low but the durability of the backup is high.
D) Availability is high but the durability of the backup is low.
E) Virtual Cloud Network must be configured with an internet gateway.
4. You are creating a new virtual cloud network (VCN) and you have selected "CREATE VIRTUAL CLOUD NETWORK PILUS RELATED RESOURCES" option. Which three additional resources will be created?
A) Route table with rule
B) Service Gateway
C) Internet Gateway
D) Three subnets
E) Dynamic Routing Gateway
5. Which two are true about RMAN encryption?
A) RMAN can encrypt the Oracle password file.
B) Password encryption can be persistently configured using the CONFIGURE ENCRYPTION command.
C) SET ENCRYPTION command overrides the CONFIGURE ENCRYPTION command settings.
D) Dual-mode encrypted backups can be restored only if both the password and the keystore used for encryption are available.
E) RMAN encryption keys are stored in a database wallet.
질문과 대답:
질문 # 1 정답: A,B,C | 질문 # 2 정답: A,D,E | 질문 # 3 정답: A,E | 질문 # 4 정답: A,C,D | 질문 # 5 정답: B,D |