Handsome Savings - Limited Time Offer 30% OFF - Ends In 0d 0h 0m 0s Coupon code: 50OFF
Welcome to QA4Exam
Logo

- Trusted Worldwide Questions & Answers

Oracle 1Z0-902 Exam Actual Questions

The questions for 1Z0-902 were last updated on Oct 2, 2024.
  • Viewing page 1 out of 12 pages.
  • Viewing questions 1-5 out of 60 questions
Unlock Access to All 60 Questions & Answers
Question No. 1

How do ASM failure groups provide redundancy?

Show Answer Hide Answer
Question No. 2

You have been notified by your Network Administrator that an upstream switch has been replaced due to a hardware fault. Which command verifies that the client network on your Exadata X9M-2 Database Server is available via both client switches?

Show Answer Hide Answer
Question No. 3

How is Exadata Secure RDMA Fabric isolation used in X9M-2 with virtualization enabled?

Show Answer Hide Answer
Correct Answer: D

Exadata Secure RDMA Fabric isolation is a feature that allows you to use virtualization on the X9M-2 platform while maintaining security and isolation between multiple tenants or VM clusters. Secure Fabric isolation works by creating a dedicated network partition and VLAN ID for each Database VM cluster, which is used for cluster networking between the database servers in the VM Cluster. This ensures that the network traffic of each VM cluster is isolated from the others, and it prevents unauthorized access to the data or resources of other VM clusters. Secure Fabric isolation can also be used for other purposes such as client networking, Data Guard traffic, but it's mainly used to provide security and isolation between multiple tenants or VM clusters.

According to Oracle's documentation1, Exadata Secure RDMA Fabric Isolation is a feature that enables strict network isolation for Oracle Real Application Clusters (Oracle RAC) clusters on Exadata Database Machine systems that use RDMA over Converged Ethernet (RoCE). Exadata Secure RDMA Fabric Isolation uses RoCE VLANs to ensure that network packets from one VM cluster cannot be seen by another VM cluster.VLAN tag enforcement is done at the KVM host level, which means that security cannot be bypassed by any software exploits or misconfiguration on the database server VMs1.

Therefore, the statement that is true about how Exadata Secure RDMA Fabric isolation is used in X9M-2 with virtualization enabled is:

With Secure Fabric isolation, each Database VM cluster uses a dedicated network partition and VLAN ID for cluster networking between the database servers in the VM Cluster. This provides security and isolation between multiple tenants or VM clusters.


Question No. 4

You have a script with several CELLCLI commands that must be executed on each cell in your Exadata full rack. The script must run on each cell simultaneously. How must you achieve this?

Show Answer Hide Answer
Question No. 5

Which statement is true about the Persistent Memory Commit Accelerator?

Show Answer Hide Answer
Product Image

Unlock All Questions for Oracle 1Z0-902 Exam

Full Exam Access, Actual Exam Questions, Validated Answers, Anytime Anywhere, No Download Limits, No Practice Limits

Get All 60 Questions & Answers