Hi Kee,
Please take a look and let me know your inputs.
Nicole is preparing initial data load Extract task EINI_HR using the parameter DBOPTIONS
FECHBATCHSIZE 2000. What is likely to happen if one of her source tables includes LOB data?
A. The Extract will revert to single-row fetch mode, and then resume array fetches afterwards. --I marked
B. The Extract will revert to single-row fetch mode for all tables.
C. The Extract will abend unless LOBMEMORY is increa
D. The Extract will perform poorly due to paging unless LOBMEMORY is increased
What is the default format for a GoldenGate trail?
A. ASCII:ASCII format -- I marked
B. INPUT ASCII: from 1to 127 representing ASCII characters
C. SQL: SQL statements
D. CDF: Canonical Data format
E. XML: XML statement
You need to locate the position of the oldest unprocessed transaction by using the command
INFO EXTRACT <extractgroup> SHOWCH. How should you proceed?
A. Use the Read Startup Checkpoint.
B. Use the Read Recovery Checkpoint. ---I marked
C. Use the Write Startup Checkpoint.
D. Use the Read Current Checkpoint.
What software is required prior to running Oracle GoldenGate in a Windows Server
environment?
A. Oracle Gateway software configured for that particular database platform
B. JDBC drivers into the GoldenGate home directory
C. Microsoft Visual C++ 2010 SP1 Redistributable Package -- I marked
D. Nothing, configure GoldenGate Jagent for that particular database platform.
By default which type of operations are captured by extract?
A. Inserts, updates, deletes, and table operations such as CREATE TABLE
B. Inserts, compresses, and updates --- I marked
C. Inserts, updates, deletes, and table operations such as ADD COLUMN
D. Inserts only
E. Inserts, updates, and deletes
Which three are required to correctly configure an OGG?
A. A maximum file size
B. An extract process --- I marked B,C,D
C. A trail file identifier
D. Designation as local or remote
You must implement GoldenGate in a secure environment. How should you proceed in order
to protect GoldenGate data from theft?
A. Implement trail file encryption.
B. Ensure that passwords are encrypted.
C. Ensure that network communications are encrypted.
D. Ensure that table-level Transparent Data Encryption is implemented. --- I marked
You have discovered that an OGG checkpoint table has become corrupted. What is you best
strategy to recover From this?
A. Use the CONVCHK utility on the target to restore the checkpoint table from checkpoint files. --- I marked
B. Restore the target DB from backup, reposition the Extract to a point prior to the corruption, Turn
to HANDLECOLLISIONS in the Replicat.
C. Use NODECHECKPONT to cause Replicat to use the checkpoint files as backup and regenerate the
checkpoint table.
D. Use the GENCHK utility on the source to restore the checkpoint table from checkpoint files.
Which three describe a valid OGG Event Action?
A. Stop the process
B. Write a checkpoint before and/or after writing the record to the trail.
C. Run a shell command
D. Purge old trail files --- I marked A,B,D
What Oracle GoldenGate feature provides recoverability without loss of transactions?
A. Checkpointing --- I marked
B. Sub-second latency
C. Two-phase commits
D. Transactional integrity
Regards,
Dharma