How would you connect from your local machine to the database instance on the DBaaS server by using SQL*Net?
Answer : B
To confirm remote access to the database through the SQL*Net security rule, create a connection to the database in Oracle SQL Developer. When creating the connection, fill out the fields as follows:
After entering values, click Test to test the connection.
Note: TCPS is TCP/IP with SSL.
References: Using Oracle Database Cloud Service (February 2017), 4-24 https://docs.oracle.com/en/cloud/paas/database-dbaas-cloud/csdbi/using-oracle-database- cloud-service.pdf
You want to make sure that Oracle Application Express (APEX) is enabled and accessible.
Which two steps must you perform?
Answer : A,C
To access the administration console when the HTTPS port is unblocked:
Which two tasks can you perform on the Database Cloud Service Instance View page?
Answer : C,D
You want to perform database recovery with the most recent backup.
Which command would you execute?
Answer : B
dbaascliorec latest command restores the most recent backup and performs complete recovery.
Which two statements are true about Database as a Service (DBaaS) or about Database
Schema Service in Oracle Public Cloud?
Answer : B,C
Database Schema Service uses schema isolation to implement multi-tenancy, which allows full transparency while still providing efficient use of database resources. The Oracle
Database is, at its core, a multiuser system for sharing data, so Database Schema Service simply uses the capabilities built up for the Oracle Database to share resources among multiple Database Schema Service customers.
What are two things can you do on the My Services Dashboard page?
Answer : C,D
TheMy ServicesDashboard shows information limited to one identity domain in your account.
References: Using Oracle Database Cloud Service (February 2017), page 8-26 https://docs.oracle.com/en/cloud/paas/database-dbaas-cloud/csdbi/using-oracle-database- cloud-service.pdf
Which two problems indicate that you should consider scaling up your Database as a
Service (DBaaS) instance that hosts an Oracle Database 12c multitenant container database (CDB) with four pluggable databases (PDBs)?
Answer : C,E
You are using access rules to control network traffic among your DBaaS instances.
Which statement is true about access rules?
Answer : B
On the Access Rule youcan define the following:
You want to make sure that your database administrators have a convenient way to monitor your DBaaS instance. To do so, you need to enable the Oracle DBaaS Monitor.
How would you enable the Oracle DBaaS Monitor?
Answer : B
To access Oracle DBaaS Monitor when the HTTPS port is blocked, you must create an
SSH tunnel to port 443 on the compute node hosting the DBaaS Monitor.
Note:How you access Oracle DBaaS Monitor depends on whether the HTTPS port (443) hasbeen unblocked. When a Database Cloud Service deployment is first created, theHTTPS port is blocked to ensure network security
With Oracle Database Cloud Service as the subscription type, you must configure a database for Backup and Recovery.
Which two options do you have to back up your database instance?
Answer : A,C
When creating a new database deployment on Oracle Database Cloud Service, you choose whether you want automatic backups to be configured for the database. Your choices are:
Both Cloud Storage and Local Storage30 days' worth of backups are kept, with the 7 most recent days' worth available directly on the compute nodes local storage.
Cloud Storage Only30 days' worth of backups are kept, with all backupson cloud storage.
Noneautomatic backups are not configured.
The first step to connecting to Oracle Cloud is generating an SSH key pair.
To generate a key pair on a Unix or Linux machine, you would run the ssh-keygen utility.
What should be the number of bits in the key that must be created?
Answer : C
To generate an SSH key pair on UNIX and UNIX-like platforms using the ssh-keygenutility:
References: Using Oracle Database Cloud Service (February 2017), page 3-3 https://docs.oracle.com/en/cloud/paas/database-dbaas-cloud/csdbi/using-oracle-database- cloud-service.pdf
You are working on a DBaaS database instance.
Identify the location for the associated database files for your instance.
Answer : B
Compute Cloud Service Storage Volumes
When a Database Cloud Service databasedeployment is created at the Oracle
Database Cloud Service service level, the following storage volumes are created.
Which two must be true when you migrate an Oracle Database 184.108.40.206 non-CDB to a database that is running in a Database as a Service (DBaaS) instance on Oracle Cloud by using the Remote Cloning method?
Answer : E,F
To migrate an Oracle Database 12c non-CDB database to a Database Cloud
Service database deployment using the remote cloning method, you perform these tasks:
You can use this method only if the on-premises platform is little endian, the on-premises database release is 220.127.116.11 or higher, and the on-premises database and Database Cloud
Service database have compatible database character sets and national character sets.
Which two statements are true about the SSH tunnels within a Database as a Service
(DBaaS) Cloud environment?
Answer : A,D
A: Oracle Database Cloud Service relies on Oracle Compute Cloud Service to provide secure network accessto database deployments. You can use the Oracle Database Cloud
Service console to perform network access operations such as enabling access to a port on a compute node, or creating new security rules.
D: Creating an SSH tunnel enables you to access a specific compute node port by using an
SSH connection as the transport mechanism. To create the tunnel, you must have the SSH private key file that matches the public key specified during the database deployment creation process.
References: Using Oracle Database Cloud Service (February 2017), 3-2 https://docs.oracle.com/en/cloud/paas/database-dbaas-cloud/csdbi/using-oracle-database- cloud-service.pdf
You are configuring network connections to your database instance.
What does each network group represent?
Answer : A
Network groups provide a method for VMs to be grouped together forcommunications and firewall rules. You can define network groups to allow VMs within agroup to communicate with each other, while also preventing those VMs fromcommunicating outside the group.
Access rule. Access rules define the permitted paths of communication for VMs that are within a network group. You can define an access rule to enable a specific path of communication between two network groups, or between a network groupand a specified list of IP addresses.