Curious about Actual Oracle Engineered Systems (1Z0-902) Exam Questions?

Here are sample Oracle Exadata Database Machine X9M Implementation Essentials (1Z0-902) Exam questions from real exam. You can get more Oracle Engineered Systems (1Z0-902) Exam premium practice questions at TestInsights.

Page: 1 /
Total 85 questions
Question 1

You have been asked to design a backup solution for an Exadata X9M-2 Quarter Rack with Extreme Flash Storage Servers connected to a new ZFS Storage Appliance ZS7 with 2 Storage Controllers with 100Gb Ethernet cards and 3 Storage Trays. You are using Oracle Exadata Configuration Assistant to validate the rack layout.

1. Use "Add Equipment" to add the Exadata X9M EF Storage Servers, starting from RU10.

2. Use drop down to add ZFS Storage Appliance Controllers.

3. You cannot add ZFS Storage Appliance to an Exadata Rack.

4. Use "Add Equipment" to add the ZFS Storage Trays, starting from RU1.

5. Use drop down to add ZFS Storage Trays.

6. Use "Add Equipment" to add the Exadata X9M Database Servers, starting from RU16.

7. Use "Add Equipment" to add the Exadata X9M EF Storage Servers, starting from RU1.

8. Use drop down to add Exadata X9M EF Storage Servers.

9. Use "Add Equipment" to add the ZFS Storage Controllers, starting from RU27.

10. Use drop down to add Exadata X9M Database Servers.

11. Use "Add Equipment" to add the ZFS Storage Trays, starting from RU31.

Which of these steps are correct and what is their correct order?


Correct : D

The correct order of steps is 10, 8, 9, 11. The 10th step is to use the drop down to add Exadata X9M Database Servers, the 8th step is to use the drop down to add Exadata X9M EF Storage Servers, the 9th step is to use 'Add Equipment' to add the ZFS Storage Controllers, and the 11th step is to use 'Add Equipment' to add the ZFS Storage Trays. These steps are referenced in the Oracle Exadata Database Machine X9M Implementation Essentials Official Textbook, which is available online athttps://docs.oracle.com/cd/E80437_01/E80437/html/index.html.

https://docs.oracle.com/en/engineered-systems/exadata-database-machine/dbmin/configuring-exadata.html


Options Selected by Other Users:
Mark Question:

Start a Discussions

Submit Your Answer:
0 / 1500
Question 2

You are working on a remote Exadata Database Machine with current software and firmware. You now need to start a storage server after hardware maintenance.

Which ILOM command starts the storage server?


Correct : C

This command is based on the Oracle Exadata Database Machine X9M Implementation Essentials Official Text Book and other resources. This command sets the power state of the system to ON and starts the storage server. It is the only command that is able to start the storage server remotely. All the other commands are incorrect or require the user to be physically present in the data center.


Options Selected by Other Users:
Mark Question:

Start a Discussions

Submit Your Answer:
0 / 1500
Question 3

You are concerned about the operating temperature of the database servers in your Exadata Full Rack and want to be alerted if the server exceeds 30C.

What command should use use to generate alerts for such an event?


Correct : D

According to Oracle's documentation1, to set a threshold for a metric on a database server, you need to use thecreate thresholdcommand with the appropriate parameters.Theset thresholdcommand is used to modify an existing threshold2.

Therefore, the command that you should use to generate alerts for such an event is:

dbmcli -e ''create threshold ds_temp comparison='>', critical=30'' on each database server1


Options Selected by Other Users:
Mark Question:

Start a Discussions

Submit Your Answer:
0 / 1500
Question 4

You have been notified by your Network Administrator that an upstream switch has been replaced due to a hardware fault. Which command verifies that the client network on your Exadata X9M-2 Database Server is available via both client switches?


Correct : D

According to Oracle's documentation1, the client network on Exadata X9M-2 Database Server is used for client access to the database servers using Single Client Access Name (SCAN) and Oracle RAC Virtual IP (VIP) addresses. To verify that the client network is available via both client switches, you can use the command:

cat /proc/net/bonding/bondeth0

This command displays information about the bondeth0 interface, which is used for the client network on Exadata X9M-2 Database Server2.You can check if both interfaces (eth0 and eth1) are active and connected to different switches3.


Options Selected by Other Users:
Mark Question:

Start a Discussions

Submit Your Answer:
0 / 1500
Question 5

How is Exadata Secure RDMA Fabric isolation used in X9M-2 with virtualization enabled?


Correct : D

Exadata Secure RDMA Fabric isolation is a feature that allows you to use virtualization on the X9M-2 platform while maintaining security and isolation between multiple tenants or VM clusters. Secure Fabric isolation works by creating a dedicated network partition and VLAN ID for each Database VM cluster, which is used for cluster networking between the database servers in the VM Cluster. This ensures that the network traffic of each VM cluster is isolated from the others, and it prevents unauthorized access to the data or resources of other VM clusters. Secure Fabric isolation can also be used for other purposes such as client networking, Data Guard traffic, but it's mainly used to provide security and isolation between multiple tenants or VM clusters.

According to Oracle's documentation1, Exadata Secure RDMA Fabric Isolation is a feature that enables strict network isolation for Oracle Real Application Clusters (Oracle RAC) clusters on Exadata Database Machine systems that use RDMA over Converged Ethernet (RoCE). Exadata Secure RDMA Fabric Isolation uses RoCE VLANs to ensure that network packets from one VM cluster cannot be seen by another VM cluster.VLAN tag enforcement is done at the KVM host level, which means that security cannot be bypassed by any software exploits or misconfiguration on the database server VMs1.

Therefore, the statement that is true about how Exadata Secure RDMA Fabric isolation is used in X9M-2 with virtualization enabled is:

With Secure Fabric isolation, each Database VM cluster uses a dedicated network partition and VLAN ID for cluster networking between the database servers in the VM Cluster. This provides security and isolation between multiple tenants or VM clusters.


Options Selected by Other Users:
Mark Question:

Start a Discussions

Submit Your Answer:
0 / 1500
Page:    1 / 17   
Total 85 questions