网友您好, 请在下方输入框内输入要搜索的题目:

题目内容 (请给出正确答案)
单选题
In your database, the users SYS and SYSTEM have been assigned the profiles, ADMIN_PROF1 and ADMIN_PROF2, respectively. The rest of the database administrators are assigned the profile ADMIN_PROF3. You create a profile, USER_PROF, and assign it to the application user, Adams. After a week you realize that the profile is no longer required and you decide to drop it. What will Adam’s profile be after the USER_PROF profile has been dropped?()
A

no profiles

B

the default profile

C

same as the profile of SYS user

D

same as the profile of SYSTEM user


参考答案

参考解析
解析: 暂无解析
更多 “单选题In your database, the users SYS and SYSTEM have been assigned the profiles, ADMIN_PROF1 and ADMIN_PROF2, respectively. The rest of the database administrators are assigned the profile ADMIN_PROF3. You create a profile, USER_PROF, and assign it to the application user, Adams. After a week you realize that the profile is no longer required and you decide to drop it. What will Adam’s profile be after the USER_PROF profile has been dropped?()A no profilesB the default profileC same as the profile of SYS userD same as the profile of SYSTEM user” 相关考题
考题 In the ORACLE system, sets of SQL statements and control flow statements that have been named, compiled ,and stored in database are referred to as storedA.batchesB.proceduresC.triggersD.transactions

考题 In your database, the LDAP_DIRECTORY_SYSAUTH initialization parameter has been set to YES and the users who need to access the database as DBAs have been granted SYSDBA enterprise role in Oracle Internet Directory (OID). SSL and the password file have been configured. A user SCOTT with the SYSDBA privilege tries to connect to the database instance from a remote machine using the command:Which authentication method would be used first?()A. authentication by password fileB. authentication by using certificates over SSLC. authentication by using the Oracle Internet DirectoryD. authentication by using the local OS of the database server

考题 You enabled an audit policy by issuing the following statements:SQL AUDIT POLICY ORA_DATABASE_PARAMETER BY SCOTT;SQL AUDIT POLICY ORA_DATABASE_PARAMETER BY SYS, SYSTEM;For which database users and for which executions is the audit policy now active? ()A. SYS, SYSTEMB. SCOTTC. Only for successful executionsD. Only for failed executionsE. Both successful and failed executions

考题 You executed this command to create a password file:$ orapwd file = orapworcl entries = 10 ignorecase = NWhich two statements are true about the password file?() A. It will permit the use of uppercase passwords for database users who have been granted the SYSOPER role.B. It contains username and passwords of database users who are members of the OSOPER operating system group.C. It contains usernames and passwords of database users who are members of the OSDBA operating system group.D. It will permit the use of lowercase passwords for database users who have granted the SYSDBA role.E. It will not permit the use of mixed case passwords for the database users who have been granted the SYSDBA role.

考题 You wish to enable an audit policy for all database users, except SYS, SYSTEM, and SCOTT.You issue the following statements:SQL AUDIT POLICY ORA_DATABASE_PARAMETER EXCEPT SYS;SQL AUDIT POLICY ORA_DATABASE_PARAMETER EXCEPT SYSTEM;SQL AUDIT POLICY ORA_DATABASE_PARAMETER EXCEPT SCOTT;For which database users is the audit policy now active?()A. All users except SYSB. All users except SCOTTC. All users except sys and SCOTTD. All users except sys, system, and SCOTT

考题 You enabled an audit policy by issuing the following statements: SQL AUDIT POLICY ORA_DATABASE_PARAMETER BY SCOTT; SQL AUDIT POLICY ORA_DATABASE_PARAMETER BY SYS, SYSTEM; For which database users and for which executions is the audit policy now active? ()A、SYS, SYSTEMB、SCOTTC、Only for successful executionsD、Only for failed executionsE、Both successful and failed executions

考题 While designing your database, you have created the EMPLOYEEStable as an index-organized (IOT). You want to create a bitmap index on the JOD_IDcolumn to make queries faster. Which task must have been completed so that you are able to create the bitmap index?()A、 A primary key must have been created.B、 A mapping table must have been created.C、 An overflow tablespace must have been specified.D、 The PCTTHRESHOLD option must have been specified.

考题 You have been recently hired as a database administrator. Your senior manager asks you to study the production database server and submit a report on the settings done by the previous DBA.  While observing the server settings, you find that the following parameter has been set in the parameter file of the database:  REMOTE_OS_AUTHENT = TRUE  What could have been the reason to set this parameter as TRUE?()A、to enable operating system authentication for a remote clientB、to restrict the scope of administration to identical operating systemsC、to allow the start up and shut down of the database from a remote clientD、to enable the administration of the operating system from a remote clientE、to disable the administration of the operating system from a remote client

考题 In your database,the LDAP_DIRECTORY_SYSAUTH initialization parameter has been set to YES and the users who need to access the database as DBAs have been granted SYSDBA enterprise role in Oracle Internet Directory (OID). SSL and the password file have been configured. A user SCOTT with the SYSDBA privilege tries to connect to the database instance from a remote machine using the command:$ SQLPLUS scott/tiger@DB01 AS SYSDBA   where DB01 is the net service name.   Which authentication method would be used first?()  A、 authentication by password fileB、 authentication by using certificates over SSLC、 authentication by using the Oracle Internet DirectoryD、 authentication by using the local OS of the database server

考题 You want to implement the backup and recovery strategy in your database using Recovery Manager (RMAN). You have chosen the control file of the target database for the RMAN repository.  Which command-line RMAN command would you use to establish a local connection between RMAN and the RMAN repository if your database is using password file authentication?()A、 rman TARGET / NOCATALOGB、 rman TARGET sys/passwordC、 rman TARGET sys/password AS SYSDBAD、 rman TARGET sys/password@db_name CATALOG rman_user/rman_password@rcat

考题 There is a problem with one of the disks used for your database and your system administrator informs you that the disk needs to be replaced. The replacement disk will not be available until tomorrow.  There was only one data file on this disk; it belongs to the USERS tablespace in your PROD database. Your PROD database runs in ARCHIVELOG mode and nightly online backups are taken. The users need to be able to access the data in the USERS tablespace before the replacement disk arrives. You have already taken the USERS tablespace offline and have restored the data file from last night’s backup to a new disk. Which additional steps are required in order to make the USERS tablespace available?()A、Only bring the tablespace back online.B、Only recover the tablespace and then bring the tablespace back online.C、Shut down the database, recover the data file and then start up the database.D、Issue the ALTER DATABASE RENAME FILE command, recover the tablespace, and then bring the tablespace online.E、Recover the tablespace, issue the ALTER DATABASE RENAME FILE command, and then bring the tablespace online.

考题 You wish to enable an audit policy for all database users, except SYS, SYSTEM, and SCOTT.You issue the following statements: SQL AUDIT POLICY ORA_DATABASE_PARAMETER EXCEPT SYS;SQL AUDIT POLICY ORA_DATABASE_PARAMETER EXCEPT SYSTEM; SQL AUDIT POLICY ORA_DATABASE_PARAMETER EXCEPT SCOTT; For which database users is the audit policy now active?()A、All users except SYSB、All users except SCOTTC、All users except sys and SCOTTD、All users except sys, system, and SCOTT

考题 You are about to create your Oracle data dictionary for use with the database. Which of the following users would you connect to the database as for this purpose in Oracle9i and later releases?()A、SYSTEM B、OUTLN C、INTERNAL D、SYS

考题 单选题There is a problem with one of the disks used for your database and your system administrator informs you that the disk needs to be replaced. The replacement disk will not be available until tomorrow.  There was only one data file on this disk; it belongs to the USERS tablespace in your PROD database. Your PROD database runs in ARCHIVELOG mode and nightly online backups are taken. The users need to be able to access the data in the USERS tablespace before the replacement disk arrives. You have already taken the USERS tablespace offline and have restored the data file from last night’s backup to a new disk. Which additional steps are required in order to make the USERS tablespace available?()A Only bring the tablespace back online.B Only recover the tablespace and then bring the tablespace back online.C Shut down the database, recover the data file and then start up the database.D Issue the ALTER DATABASE RENAME FILE command, recover the tablespace, and then bring the tablespace online.E Recover the tablespace, issue the ALTER DATABASE RENAME FILE command, and then bring the tablespace online.

考题 单选题You are ready to implement RMAN in the backup and recover strategy for your company. Which system privilege must the RMAN user have to be able to connect and execute RMAN commands on a target database?()A SYSDBAB SYSOPERC No system privileges are required for the RMAN user.D Only SYS user can connect and execute RMAN commands on a target database.

考题 单选题You have been recently hired as a database administrator. Your senior manager asks you to study the production database server and submit a report on the settings done by the previous DBA.  While observing the server settings, you find that the following parameter has been set in the parameter file of the database:  REMOTE_OS_AUTHENT = TRUE  What could have been the reason to set this parameter as TRUE?()A to enable operating system authentication for a remote clientB to restrict the scope of administration to identical operating systemsC to allow the start up and shut down of the database from a remote clientD to enable the administration of the operating system from a remote clientE to disable the administration of the operating system from a remote client

考题 单选题While creating a database using Database Configuration Assistant tool, you created a database default temporary tablespace. Which activity would cause the default temporary tablespace of the database to be used?()A the CREATE TABLE .. commandB sorting of the SYSTEM tablespace’s dataC sorting of data required by recursive SQL statementsD the CREATE TABLE .. ORGANIZATION EXTERNAL .. commandE sorting of data if the users have not been allocated temporary tablespace explicitlyF sorting of data if the users have been allocated temporary tablespace explicitly

考题 单选题Your database is in the NOARCHIVELOG mode. Since last night’s offline backup, the logs in group 1 have been written to twice. This morning, the SYSTEM data file has become corrupted. Up to what point can it be recovered?()A until the last commitB cannot be recoveredC until the last offline backupD until the beginning of the last transaction

考题 单选题Two data files have been deleted at the operating system level by accident. Your database is running in ARCHIVELOG mode and online backups are taken nightly. One of the data files that has been deleted belongs to the USERS tablespace on the other belongs to the SYSTEM tablespace. How can you recover from this situation?()A Shut down the database, restore the two data files and then start up the database. B Take the system and users tablespace offline, restore the two data files, recover the two datafiles, and then bring the SYSTEM and USERS tablespaces online. C Shut down the database, restore the two data files, start up the database in MOUNT mode, recover the two data files, and then alter the database open. D Take the SYSTEM and USERS tablespaces offline, recover the two datafiles and then bring the SYSTEM and USERS tablespaces online.

考题 多选题You enabled an audit policy by issuing the following statements: SQL AUDIT POLICY ORA_DATABASE_PARAMETER BY SCOTT; SQL AUDIT POLICY ORA_DATABASE_PARAMETER BY SYS, SYSTEM; For which database users and for which executions is the audit policy now active? ()ASYS, SYSTEMBSCOTTCOnly for successful executionsDOnly for failed executionsEBoth successful and failed executions

考题 多选题You executed this command to create a password file: $ orapwd file = orapworcl entries = 10 ignorecase = N Which two statements are true about the password file?()AIt will permit the use of uppercase passwords for database users who have been granted the SYSOPER role.BIt contains username and passwords of database users who are members of the OSOPER operating system group.CIt contains usernames and passwords of database users who are members of the OSDBA operating system group.DIt will permit the use of lowercase passwords for database users who have granted the SYSDBA role.EIt will not permit the use of mixed case passwords for the database users who have been granted the SYSDBA role.

考题 单选题You want to implement the backup and recovery strategy in your database using Recovery Manager (RMAN). You have chosen the control file of the target database for the RMAN repository.  Which command-line RMAN command would you use to establish a local connection between RMAN and the RMAN repository if your database is using password file authentication?()A  rman TARGET / NOCATALOGB  rman TARGET sys/passwordC  rman TARGET sys/password AS SYSDBAD  rman TARGET sys/password@db_name CATALOG rman_user/rman_password@rcat

考题 单选题While designing your database, you have created the EMPLOYEEStable as an index-organized (IOT). You want to create a bitmap index on the JOD_IDcolumn to make queries faster. Which task must have been completed so that you are able to create the bitmap index?()A  A primary key must have been created.B  A mapping table must have been created.C  An overflow tablespace must have been specified.D  The PCTTHRESHOLD option must have been specified.

考题 单选题You have a large amount of historical data in an operating system file. Some analysts in your organization need to query this data. The file is too large to load into your current database. Which is the most effective method to accomplish the task?()A Upgrade the hardware/memory to accommodate the data.B Load the data into your database by using the PARALLEL clause.C Give analysts DBA privilege, so that they can query DBA_EXTERNAL_TABLES.D Use an external table so you can have the metadata available in your database, but leave the data in the operating system files.

考题 单选题From the V$SESSION_LONGOPS view, you find that some of the database users have long-running queries and are consuming a lot of CPU time. This causes problems for you when you try to log on as the system user and perform small maintenance tasks. You would like to ensure that users SYS and SYSTEM get priority over all other users.   Which method would you use to achieve this objective?()A create a plan directive in the SYS_GROUPB create the pending area for the consumer groupC activate the provided SYSTEM_PLAN in Resource ManagerD set the TIMED_STATISTICS parameter to TRUE in the parameter fileE set the execution time limit for all users, except SYS and SYSTEM, in their profiles

考题 单选题You work as a database administrator for Certkiller .com. Your database is in NOARCHIVELOG mode. The database has been configured with three redo logs groups, and there have been five log switches. You lost one non-system-critical data file from your database.  Which method would you use to recover the data file?()A Restore all the data files and open the databaseB Create the data file and performtablespacerecoveryC No need to restore any file, just recover the databaseD Restore only the system data file and recover the databaseE Restore only lost date file and performtablespacerecovery

考题 单选题Two database users, Jack and Bill, are accessing the SupportCenter STAFF table of the SupportCenter DB database. When Jack modifies a value in the table, the new value is invisible to Bill. Which is the modified value invisible to Bill?()A The modified data are not available on disk.B The modified data have been flushed out from memory.C The modified rows of the SupportCenter STAFF table have been locked.D Jack has not committed the changes after modifying the value.E Both users are accessing the database from two different machines.