Summer Sale Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: ecus65

Oracle 1z0-447 - Oracle GoldenGate 12c Implementation Essentials

Page: 1 / 3
Total 72 questions

You must configure GoldenGate parameter files for conflict resolution and want to be sure that the before values are compared with current values in the target database to detect update and delete conflicts.

How should you accomplish this?

A.

Use theCOMPCOLSwith theGETUPDATEBEFORESoption of the MAP parameter in the Replicat parameter file to specify columns that are to be used with before values in the ReplicatWHERE clause.

B.

Use theCOMPARECOLSoption of the MAP parameter in the Replicat parameter file to specify columns that are to be used with before values in the ReplicatWHEREclause.

C.

Use theGETUPDATEBEFORESoption of the MAP parameter in the Replicat parameter file to specify columns that are to be used with before values in the ReplicatWHEREclause.

D.

Use theGETBEFORECOLSoption of the MAP parameter in the Replicat parameter file to specify columns that are to be used with before values in the ReplicatWHEREclause.

Which three are types of encryption supported by OGG?

A.

Parameter file encryption

B.

Password

C.

Trial file encryption

D.

Message encryption

A database that requires replication contains sensitive data that is not required on the target. How should you prevent this sensitive data from being replicated?

A.

Use theFILTERoption in theMAPparameter.

B.

Use theCOLMAPoption in theMAPparameter.

C.

Do not specify those columns in theADD TRANDATAcommand.

D.

Use theCOLSandCOLSEXCEPToptions in theTABLEparameter.

How does Replicate know the structure of the source tables when the target has a different layout?

A.

GoldenGate trail file contains the metadata of incoming data

B.

Replicat uses an ODBC connection to connect to the source system tables

C.

Parameter file contains table layouts

D.

Discard file contains table layouts

E.

Source Definitions file contains table layouts

Which three are valid Extract or Replicat statements using the @RANGE function for an Acct table with a

Primary Key on the AccountID column? (Select three.)

A.

MAP sales.acct, TARGET sales.acct, FILTER (@RANGE (2, 3, AccountID));

B.

MAP sales.acct, TARGET sales.acct, FILTER (@RANGE (1, 3, ID));

C.

TABLE fin.Sales, FILTER (@RANGE (1, 2));

D.

FILTER (@RANGE (2, 2, AccountID));

E.

FILTER (@RANGE 2, 2, ID);

Which GLOBALS parameter is required to initially enable monitoring?

A.

JAGENTMONITORING

B.

ENABLEMONITORING

C.

ENABLEOEMMONITORING

D.

CHECKMONITORING

You need to configure the source database, target database, and Oracle GoldenGate for conflict detection and resolution (CDR). You want the full before image of each record, but your database does not provide a before image in the log record and must be configured to do so with supplemental logging.

How should you proceed?

A.

Include theOVERWRITEcommand.

B.

Include theUSEDELTAcommand.

C.

Include theADD TRANDATAcommand.

D.

Include theUPDATAROWEXISTScommand.

You have configured and added the Extract and Replicat tasks by using the Direct Load method. What do you need to do to get the processes up and running?

A.

Start the Extract task.

B.

Start the Extract task, wait for it to stop, and then start the Replicat task.

C.

Start the Extract task and then start the Replicat task.

D.

Start the Replicat task.

What software is required prior to running Oracle GoldenGate in a Windows Server environment?

A.

Oracle Gateway software configured for that particular database platform

B.

JDBC drivers into the GoldenGate home directory

C.

Microsoft Visual C++ 2010 SP1 Redistributable Package

D.

Nothing, configure GoldenGate Jagent for that particular database platform.

GoldenGate has cached long-running open transactions to disk for an Oracle database. Where can you locate them?

A.

in the checkpoint file area

B.

in the trail files area

C.

in the server temporary file system

D.

in the bounded recovery area