1.Which statements are true of goldenGate password encryption?
A password can be encrypted and pasted into a parameter file. An encrypted password can be generated
using the default key. An encrypted password can be generated using a user defined-key.
A. 1 only
B. 2 only
C. 3 only
D. 1 and 3
E. 1, 2 and 3
Answer: E
2.You want to configure replication of CREATE TABLE statements from oracle to Teradata, so that only
new table created in your mapped source schema is Replicated. Which should be the part of solution?
A. This feature is not supported in oracle goldenGate 10.
B. DDL INCLUDE MAPPED in extra parameter file.
C. DDL INCLUDE UNMAPPED in extra parameter file.
D. DDL EXCLUDE MAPPED in extra parameter file.
Answer: B
3.Which translations are captured if you ADD EXTRACT BEGIN now 1:00 p.m., but START EXTRACT at
2:00 p.m.?
A. Transactions started on or after 1:00 p.m.
B. Transactions started on or after 2:00 p.m.
C. Transactions started before 1:00 p.m and committed after 1:00 p.m.
D. Transactions started before 1:00 p.m and committed after 2:00 p.m.
Answer: D
4.You want encrypt message sent or over TCP/IP to server usserver1, where the goldenGate manage
process is running on port 7809. Your requirements include using a custom encryption key and advanced
encryption standard (AES), and you have created an ENCKEYS file What parameters should you use?
A. This feature is not supported in oracle goldenGate 10.
B. RMTHOST usserval, MGRPORT 7809, ENCRYPT AES, ENCRYPT KEY
C. RMTHOST usserval, MGRPORT AES, ENCRYPTKEY MYKWY, MBRPORT 7809
D. RMTHOST usserval, MGRPORT 7809, ENCRYPT BLOWFISH ENCRYPTKEY MYKEY
Answer: D
5.Which three describe a valid OGG Event Action?
A. Stop the process
B. Write a checkpoint before and/or after writing the record to the trail.
C. Run a shell command
D. Purge old trail files
Answer: A,B,C
6. CORRECT TEXT
By default, which option is evaluated first, SQLEXEC or filter statement?
A.SQLEXEC
B. FILTER
C.There is no default; it is set with the after filter I before filter.
D. It depends on their position in the parameter file; the first encountered is executed first.
Answer: B
7.Which argument is used to set the maximum size of the EXTTRAIL or RMTTRAL.
A. MAXSIZE
B. TRAILSIZE
C. HAXTRAILSI2E
D. TRAILMAXSIZE F
E. MEGABYTES
Answer: E
8.Which Manager Parameter sets will report current lag every hour and write a critical message for any
Extract/Replicate with a lag over 60 minutes?
A. LAGBEPOBTHOURS 1, LAGINFO 1 and LAGCRITICAL 60
B. LAGREPORTMINUTES 60, LAGINFOHOURS 1
C. LAGREPOBT 1, I.AGCRITICALHOURS 1
D. LAGREPOBTHOURS 1, LAGINFOMINUTES 30, LAGCR JTTCAI-M I
Answer: B
9.What parameter provides options for compression and encryption?
A. RMTHOST
B. TARGET
C. TCPIP
D. TARGET DB
Answer: A
10.What GoldenGate process is responsible for capturing changes in the source database?
A. Manager
B. Replicate
C. Extract
D. Server Collector
Answer: C
11.You have configured and added the extract and Replicate tasks using the direct load method what do
you need to do to get the processes up and running?
A. Start the Extract task.
B. Start the Extract task and then start the Replicat task.
C. Start the Extract task; wait for it to stop and than start the Replicate task.
D. Start the Replicate task
Answer: B
12.You are configuring replication between two Oracle tables with the same number of columns, column
table names, and data types, but in different orders. For replication purpose can you treat these as
identical tables?
A. No
B. Yes, if the source and target Oracle versions and character sets are the same.
C. Yes
D. Yes, as long as the source table has a primary key define
Answer: D
13.What us expected behavior of CHEKPARMS parameter?
A. The process checks the parameter syntax and then starts running.
B. The process checks the parameter syntax and then stops.
C. A report file is created listing all missing parameters.
D. A report file is created listing all default values not specified in the parameter file.
Answer: A
14.What GoldenGate facility allows for custom processing in response to a data value?
A. DDLGEN
B. GGSExec
C. User Exits
D. User Tokens
Answer: C
15.How do you control the size of the buffer that contains data extracted from an ASM instance?
A. TRANLOGOPTIONS ASMBUFSIZ
B. DBOPTIONS ASMBUFSIZE
C. TRANLOGOPTIONS BUFSIZE
D. DBOPTIONS BUFSIZE
Answer: A
No comments:
Post a Comment