B. Connect to the instance's VM as the oracle user.
C. Disable the backup configuration (crontab).
D. Enable the backup configuration (crontab).
Correct Answer: AD
Explanation:
A: Creating an On-Demand Backup by Using the bkup_api Utility You can use the bkup_api utility to create an on-demand backup of a database deployment hosting a single-instance database or an Oracle Data Guard configuration.
1.
Connect as the opc user to the compute node. In a Data Guard configuration, connect to the compute node hosting the primary database.
2.
Start a root-user command shell: $ sudo -s #
3.
You can choose to have the backup follow the current retention policy, or you can choose to create a long-term backup that persists until you delete it:
•
To create a backup that follows the current retention policy, enter the following bkup_api command: # /var/opt/oracle/bkup_api/bkup_api bkup_start
•
To create a long-term backup, enter the following bkup_api command: # /var/opt/oracle/bkup_api/bkup_api bkup_start --keep
1. Exit the root-user command shell and disconnect from the compute node: # exit $ exit
D: If some activity you want to perform requires you to temporarily disable regularly scheduled backups, you can do so by removing the scheduling information from the system-wide /etc/crontab file.
References: Using Oracle Database Cloud Service (February 2017), 6-4
You are preparing the storage volume for use in an instance.
Which two tasks must you perform?
A. Point to a mount point that has existing files and directories.
B. Connect to the Database Deployment to which you attached the storage volume by using ssh or PuTTY as the opc user.
C. Create a mount point on your instance.
D. Connect to the Database Deployment to which you attached the storage volume by using ssh or PuTTY as the oracleuser.
Correct Answer: BC
Explanation:
To add temporary storage to a database deployment:
1.
Use the Create Storage Volume wizard in the Compute Cloud Service console to create a storage volume.
2.
Attach the storage volume to the Compute Cloud Service instance on which the compute node is running. When you attach the storage volume, it is assigned a disk number. Note down this disk number for later use.
3.
Connect as the opc user to the compute node.
4.
Start a root-user command shell $ sudo -s #
5.
Confirm the addition of the storage volume by using the ls command: # ls /dev/xvd*
6.
Create a single, primary partition that occupies the entire storage volume by using the fdisk command.
7.
Create a file system on the partition by using the mkfs command.
8.
Create a directory to use as the mount point for the partition by using the mkdir command.
9.
Mount the partition on the directory you just created by using the mount command.
10.
Set the ownership and permissions of the mount-point directory appropriately by using the chown and chmod commands.
11.
Exit the root-user command shell.
References: Using Oracle Database Cloud Service (February 2017), 4-4
You are monitoring resource usage on your Database Cloud Service.
What two resource usage metrics can you find on the Instance Overview page?
A. number of days left on your subscription
B. number of processes allocated
C. I/O from reads and writes
D. memory
E. storage
F. number of current users
Correct Answer: DE
Explanation:
The Overview page includes graphs that plot the data values for the top metrics for the past 7 days. The
type of data collected and shown depends on the type of service. For example, for Oracle Database Cloud
Service, the graphs show Storage Used and Maximum Storage Used.
Question 64:
A key pair is required to create a Database Deployment.
What can the key pair be used for?
A. They key pair is used to start up, shut down, and manage EM Express availability.
B. The keys are used to control the encryption that is used by Database Deployment: the first is for network encryption and the second is for database encryption.
C. The keys replace password use. Database Deployment use only key pairs; password authentication is not enable for SSH default connections.
D. Communication between instances in a Database Cloud Service account is controlled by network security rules and security lists.
Correct Answer: C
Explanation:
Before you create a Database Cloud Service instance you can choose to create a Secure Shell (SSH)
public/private key pair. The SSH keys are used to facilitate secure access to the compute nodes that
support your database deployments.
References: Using Oracle Database Cloud Service (February 2017), 1-7
Which statement is true about Oracle Database Schema Service or Oracle Database Cloud Service in Oracle Public Cloud?
A. Database Schema Service requires no database administrators to administer the database.
B. Database as a Service (DBaaS) requires no database administrators to administer the database.
C. Database as a Service (DBaaS) provides complete database instances with shared control between the subscriber DBA and Oracle Support.
D. Database Schema Service provides database schemas with shared control between the subscriber DBA and Oracle Support.
Correct Answer: C
Question 66:
You want to make sure that your database administrators have a convenient way to monitor your DBaaS instance. To do so, you need to enable the Oracle DBaaS Monitor.
How would you enable the Oracle DBaaS Monitor?
A. Use the enable_dbaas_monitorcommand.
B. Create an SSH tunnel to port 443.
C. Disable the ora_p2_httpsslsecurity rule in Oracle Compute Cloud Service Console.
D. Use the Oracle GlassFish Server Administration Console.
E. Add ODBM access to each DBA's user profile.
Correct Answer: B
Explanation:
To access Oracle DBaaS Monitor when the HTTPS port is blocked, you must create an SSH tunnel to port
443 on the compute node hosting the DBaaS Monitor.
Note: How you access Oracle DBaaS Monitor depends on whether the HTTPS port (443) has been
unblocked. When a Database Cloud Service deployment is first created, the HTTPS port is blocked to
ensure network security
Incorrect Answers:
C: You should enable the ora_p2_httpsslsecurity rule, not disable it.
When a database deployment is created, the following Oracle Compute Cloud Service security rules are
created, but set to a disabled status:
* ora_p2_httpssl, which controls access to port 443, the port used for HTTPS connections, including
Oracle REST Data Services, Oracle Application Express, and Oracle DBaaS Monitor.
..etc.
To enable access to a compute node port, you enable the appropriate security rule.
What are two ways to enable a port on your computer node of Database Deployment for access to your Database Deployment?
A. Use your public and private key pairs to define a list of preferred ports that get enabled during your Database Deployment installation.
B. Create a tunnel for port forwarding by using SSH.
C. Configure all remote connections through port 22 that is assigned by default for SSH connections.
D. Ask Oracle Database Cloud Service to open the required ports.
E. Use the Oracle Compute Cloud Service Console to open ports to a set of IP addresses.
Correct Answer: BC
Explanation:
C: SSH is a cryptographic network protocol that uses two keys, one public and one private, to provide secure communication between two networked computers. Port 22 is the standard TCP/IP port that is assigned to SSH servers.
B: To access network protocols and services on a compute node by using a port other than port 22, you must either:
1.
Enable network access to the port
2.
You can use the Oracle Database Cloud Service console to enable access to a port on a compute node.
3.
Create an SSH tunnel to the port Creating an SSH tunnel enables you to access a specific compute node port by using an SSH connection as the transport mechanism. To create the tunnel, you must have the SSH private key file that matches the public key specified during the database deployment creation process.
References: Using Oracle Database Cloud Service (February 2017), 3-2
How would you connect from your local machine to the database instance on a Database Deployment by using SQL*Net?
A. You start an SSH process on your local machine to communicate to a tunnel created on the Database Deployment compute node.
B. You must use port 1521 and the TCP/IP SSL communication protocol.
C. You can use only the SSH connection that is defined on port 22 that is configured by default during Database Deployment installation.
D. You use Transparent Data Encryption (TDE) to secure connections to the database instance on the Database Deployment.
Correct Answer: B
Explanation:
To confirm remote access to the database through the SQL*Net security rule, create a connection to the
database in Oracle SQL Developer. When creating the connection, fill out the fields as follows:
1.
Username: enter SYSTEM.
2.
Password: enter Pa55_WoRd.
3.
Hostname: enter the Public IP address of the compute node associated with the database deployment. To find out this address, display details of the service as described in Viewing Detailed Information for a Database Deployment
4.
Port: enter 1521.
5.
SID: enter ORCL.
After entering values, click Test to test the connection.
Note: TCPS is TCP/IP with SSL.
References: Using Oracle Database Cloud Service (February 2017), 4-24
How do you enable a default connection between Database Deployment?
A. by creating security lists and adding the instances that you want to communicate to these lists
B. by creating dedicated communication keys and setting them to be used only for your Database Deployment-to-Deployment communication
C. by creating nothing for communication between the Database Deployment because all instances are interconnected by default
D. by installing and configuring the NETMGR utility for your database cloud, and then using it to set up the required communication channels
Correct Answer: A
Explanation:
Before your DBaaS database was created, you or a coworker generated a private and public SSH key
pair, perhaps using PuTTY Key Generator.
The public key was specified when your database instance was created; a copy of that public key was
stored in the VM hosting your database. When you define in PuTTY an SSH connection to the VM hosting your database, you will specify a copy of the private key stored on your local PC. When you initiate a PuTTY connection, the VM compares the private key to the matching public key stored in the VM. The VM permits the connection when the private and public key match as a valid key pair.
Nowadays, the certification exams become more and more important and required by more and more enterprises when applying for a job. But how to prepare for the exam effectively? How to prepare for the exam in a short time with less efforts? How to get a ideal result and how to find the most reliable resources? Here on Vcedump.com, you will find all the answers. Vcedump.com provide not only Oracle exam questions, answers and explanations but also complete assistance on your exam preparation and certification application. If you are confused on your 1Z0-160 exam preparations and Oracle certification application, do not hesitate to visit our Vcedump.com to find your solutions here.