网友您好, 请在下方输入框内输入要搜索的题目:
题目内容
(请给出正确答案)
单选题
When will an "all configuration" backup be imported into the Cisco UCS Manager?()
A
During the initial configuration from the console
B
Once the basic configuration has been applied
C
To restore the configuration on a secondary fabric interconnect
D
To upgrade the firmware on a replacement fabric interconnect
参考答案
参考解析
解析:
暂无解析
更多 “单选题When will an "all configuration" backup be imported into the Cisco UCS Manager?()A During the initial configuration from the consoleB Once the basic configuration has been appliedC To restore the configuration on a secondary fabric interconnectD To upgrade the firmware on a replacement fabric interconnect” 相关考题
考题
You want to perform an RMAN backup of database as a copy. Which two factors will you consider while performing the backup operation?()
A. The backup as copy can only be taken to diskB. The backup as copy can only be taken to tapeC. Backup can be performed only when the instance is shutdownD. Backup will constitute all used and unused blocks in the database
考题
Identify the persistent configuration setting for the target database that can be set for the backup by using RMAN.() (Choose all that apply.)
A. Backup retention policyB. Default backup device typeC. Default destinations for backupsD. Multiple backup device types for single backupE. Default section size for backups
考题
You want to perform an RMAN backup of database as a copy. Which two factors will you consider whileperforming the backup operation?() (Choose two).
A. The backup as copy can only be taken to diskB. The backup as copy can only be taken to tapeC. Backup can be performed only when the instance is shutdownD. Backup will constitute all used and unused blocks in the database
考题
The persistent configuration settings for RMAN have default for all parameters.Identify four RMAN commands that produce a multi-section backup.()
A. BACKUP TABLESPACE SYSTEM SECTION SIZE 100M;B. BACKUP AS COPY TABLESPACE SYSTEM SECTION SIZE 100M;C. BACKUP ARCHIVELOG ALL SECTION SIZE 25M;D. BACKUP TABLESPACE TEMP SECTION SIZE 10M;E. BACKUP TABLESPACE UNDO INCLUDE CURRENT CONTROLFILE SECTION SIZE 100M;F. BACKUP SPFILE SECTION SIZE 1M;G. BACKUP INCREMENTAL LEVEL 0 TABLESPACE SYSAUX SECTION SIZE 100M;
考题
Before replacing a MAG Series device, using the admin GUI, you export two backup files, system.cfg from Maintenance ImportfExport Configuration and user.cfg from Maintenance Import/Export Users. When you receive the new hardware, you import all of the settings stored in the system.cfg file (including the IP address, network configuration, and device certificates), but you fail to import the user.cfg file.Which three configuration areas were updated by system.cfg?()A. Cluster configuration settingsB. Static routesC. SNMP settingsD. Sign-in policiesE. MAC authentication realms
考题
Which two statements are true about the configure exclusive command?()
A. It allows users to retain all uncommitted changes when exiting exclusive configuration mode.B. It allows multiple users to edit private copies of the configuration concurrently.C. It causes the loss of all uncommitted changes when exiting exclusive configuration mode.D. It excludes other users from editing the configuration.
考题
Refer to the exhibit. Which statement is true about the router configuration that is shown ?Select the best response.()
A. Additional DHCP options will be imported from another DHCP server.B. The DHCP server pools need to be bound to an interface to operate.C. This configuration will provide IP configuration information to two different su bnets.D. Additional DCHP option information needs to be imported from another DHCP server.E. If the router hands out all the addresses in pool 1, then it will supply addresses from pool 2.
考题
Which of the following is the MOST important data retention consideration when creating a backup system?()A、Utilizing disk-to-disk clustering and hot site replicationB、If the GFS backup system will cover all potential data breachesC、The process to move the data backup to an offsite locationD、The individual laws and legal requirements of the data
考题
Which two statements apply when a user has entered private configuration mode by typing configure private?()A、All users have their own active configuration.B、All users have their own private candidate configuration.C、When a user commits, all nonconflicting changes made by all users are committed.D、When a user commits, only the user's own changes are committed.
考题
When will an "all configuration" backup be imported into the Cisco UCS Manager?()A、 During the initial configuration from the consoleB、 Once the basic configuration has been appliedC、 To restore the configuration on a secondary fabric interconnectD、 To upgrade the firmware on a replacement fabric interconnect
考题
Which two statements apply when a user has entered private configuration mode by typing configure private? ()A、All users have their own active configurationB、All users have their own private candidate configurationC、When a user commits, all nonconflicting changes made by all users are commitedD、When a user commits, only the user's own changes are commited
考题
The persistent configuration settings for RMAN have default for all parameters.Identify four RMAN commands that produce a multi-section backup.()A、BACKUP TABLESPACE SYSTEM SECTION SIZE 100M;B、BACKUP AS COPY TABLESPACE SYSTEM SECTION SIZE 100M;C、BACKUP ARCHIVELOG ALL SECTION SIZE 25M;D、BACKUP TABLESPACE "TEMP" SECTION SIZE 10M;E、BACKUP TABLESPACE "UNDO" INCLUDE CURRENT CONTROLFILE SECTION SIZE 100M;F、BACKUP SPFILE SECTION SIZE 1M;G、BACKUP INCREMENTAL LEVEL 0 TABLESPACE SYSAUX SECTION SIZE 100M;
考题
You want to perform an RMAN backup of database as a copy. Which two factors will you consider whileperforming the backup operation?() (Choose two).A、The backup as copy can only be taken to diskB、The backup as copy can only be taken to tapeC、Backup can be performed only when the instance is shutdownD、Backup will constitute all used and unused blocks in the database
考题
Identify the persistent configuration setting for the target database that can be set for the backup by using RMAN.() (Choose all that apply.)A、Backup retention policyB、Default backup device typeC、Default destinations for backupsD、Multiple backup device types for single backupE、Default section size for backups
考题
You want to perform an RMAN backup of database as a copy. Which two factors will you consider while performing the backup operation?()A、The backup as copy can only be taken to diskB、The backup as copy can only be taken to tapeC、Backup can be performed only when the instance is shutdownD、Backup will constitute all used and unused blocks in the database
考题
In which scenario will you issue the following command?() SQL RECOVER DATABASE UNTIL TIME ’2005-10-04 : 12:09:08’ USING BACKUP CONTROLFILE;A、 when all the control files are missing and only a binary backup of the current control file existsB、 when a multiplexed copy of the current control file is missingC、when all the control files are missing and only a script containing the CREATE CONTROLFILE statement existsD、 when the SPFILE is missing
考题
You need to ensure that you can recover system configuration and data if your computer hard disk fails. What should you do? ()A、Create a system restore point.B、Create a backup of all file categories.C、Create a Complete PC Backup and Restore image.D、Perform an Automated System Recovery (ASR) backup.
考题
多选题You want to perform an RMAN backup of database as a copy. Which two factors will you consider while performing the backup operation?()AThe backup as copy can only be taken to diskBThe backup as copy can only be taken to tapeCBackup can be performed only when the instance is shutdownDBackup will constitute all used and unused blocks in the database
考题
多选题Which two statements are true about the configure exclusive command?()AIt allows users to retain all uncommitted changes when exiting exclusive configuration mode.BIt allows multiple users to edit private copies of the configuration concurrently.CIt causes the loss of all uncommitted changes when exiting exclusive configuration mode.DIt excludes other users from editing the configuration.
考题
单选题You lost the PRODSTD tablespace, which was read-only. The tablespace was read-only when the last backup was taken. How would you recover the tablespace?()A
restore the tablespace from the backup, and then perform an incomplete recoveryB
restore the tablespace from the backup, and then apply all the redo informationC
restore all the data files in the database, and then perform an incomplete recoveryD
restore the tablespace from the backup
考题
单选题In which scenario will you issue the following command?() SQL RECOVER DATABASE UNTIL TIME ’2005-10-04 : 12:09:08’ USING BACKUP CONTROLFILE;A
when all the control files are missing and only a binary backup of the current control file existsB
when a multiplexed copy of the current control file is missingC
when all the control files are missing and only a script containing the CREATE CONTROLFILE statement existsD
when the SPFILE is missing
考题
多选题Identify the persistent configuration setting for the target database that can be set for the backup by using RMAN.() (Choose all that apply.)ABackup retention policyBDefault backup device typeCDefault destinations for backupsDMultiple backup device types for single backupEDefault section size for backups
考题
单选题You lost the PRODSTD tablespace, which was read/write. The tablespace was read-only when the last backup was performed. How would you recover the tablespace?()A
restore the tablespace from the backup; there is no need to apply the redo informationB
restore the full database to recover the data up to the point when you performed the backupC
restore the tablespace from the backup and then perform a recovery using the backup control fileD
restore the tablespace from the backup and then recover the tablespace; all the redo information from the point when the tablespace was made read/write is applied
考题
单选题Which of the following is the MOST important data retention consideration when creating a backup system?()A
Utilizing disk-to-disk clustering and hot site replicationB
If the GFS backup system will cover all potential data breachesC
The process to move the data backup to an offsite locationD
The individual laws and legal requirements of the data
考题
单选题Every Sunday, consistent backups are performed on your database. Because of a user error, you performed an incomplete recovery on Tuesday and opened the database with the RESETLOGS option. A user error occurs again on Thursday, which necessitates an incomplete recovery. Sunday’s backup is the most recent backup available.What would you do in this scenario?()A
recovery cannot be performed because a backup was not performed after the last incomplete recoveryB
restore all the files from Sunday’s backup, and then recover up to the point in time when the RESETLOGS operation was performed on TuesdayC
restore all the files from Sunday’s backup, and open the database to reset the database to the point in time when the backup was performed on SundayD
restore all the files from Sunday’s backup, and then perform an incomplete recovery up to the point in time when the user error occurred on Thursday
考题
单选题You lost the PRODSTD tablespace, which was read/write. The tablespace was read/x7fonly when the last backup was performed. How would you recover the tablespace?()A
restore the tablespace from the backup; there is no need to apply the redo information B
restore the full database to recover the data up to the point when you performed the backup C
restore the tablespace from the backup, and then perform a recovery using the backup control fileD
restore the tablespace from the backup, and then recover the tablespace; all the redo information from the point when the tablespace was made read/write is applied
考题
多选题Before replacing a MAG Series device, using the admin GUI, you export two backup files, system.cfg from "Maintenance" "ImportfExport Configuration" and user.cfg from "Maintenance" "Import/Export Users". When you receive the new hardware, you import all of the settings stored in the system.cfg file (including the IP address, network configuration, and device certificates), but you fail to import the user.cfg file. Which three configuration areas were updated by system.cfg?()ACluster configuration settingsBStatic routesCSNMP settingsDSign-in policiesEMAC authentication realms
热门标签
最新试卷