网友您好, 请在下方输入框内输入要搜索的题目:

题目内容 (请给出正确答案)
单选题
Which options must you configure while performing an automated Tablespace Point-in-Time Recovery (TSPITR) by using Recovery Manager (RMAN)?()
A

New channels for restore and recovery tasks

B

New name for the data files of the tablespace

C

Auxiliary name for the data files of the tablespace

D

Auxiliary destinations for an auxiliary set of data files


参考答案

参考解析
解析: 暂无解析
更多 “单选题Which options must you configure while performing an automated Tablespace Point-in-Time Recovery (TSPITR) by using Recovery Manager (RMAN)?()A New channels for restore and recovery tasksB New name for the data files of the tablespaceC Auxiliary name for the data files of the tablespaceD Auxiliary destinations for an auxiliary set of data files” 相关考题
考题 Your corporate security policy requires that a user performing attacks must have limited network access and activities until an administrator can investigate.In the admin GUI, which sensor event policy action must you configure in "Configuration" >"Sensors" >"Sensor Event Policies" >[rule name] to accomplish this?()A. IgnoreB. Replace users roleC. Terminate user sessionD. Disable user account

考题 Which statement is correct about defining an Infranet Enforcer for use as a RADIUS Client? () A. You do not need to configure a RADIUS client policy.B. You must know the exact model number of the Infranet Enforcer.C. You must specify the NACN password of the device in the RADIUS client policy.D. You do not need to designate a location group to which the Infranet Enforcer will belong.

考题 Which statement is correct about defining an Infranet Enforcer for use as a RADIUS Client? ()A、You do not need to configure a RADIUS client policy.B、You must know the exact model number of the Infranet Enforcer.C、You must specify the NACN password of the device in the RADIUS client policy.D、You do not need to designate a location group to which the Infranet Enforcer will belong.

考题 When you are performing media recover, and an archived log is lost or corrupt, which type of recover must you perform?()A、Until SCNB、Until timeC、Until cancelD、Recover using backup control file.

考题 You have been tasked with installing two SRX 5600 platforms in a high-availability cluster. Which requirement must be met for a successful installation?()A、You must enable SPC detect within the configuration.B、You must enable active-active failover for redundancy.C、You must ensure all SPCs use the same slot placement.D、You must configure auto-negotiation on the control ports of both devices

考题 You have been tasked with performing an update to the IDP attack database. Which three requirements areincluded as part of this task?()A、The IDP security package must be installed after it is downloaded.B、The device must be rebooted to complete the update.C、The device must be connected to a network.D、An IDP license must be installed on your device.E、You must be logged in as the root user

考题 You noticed that the index tablespace in your database requires a recovery. However, instead of performing a media recovery, you decided to re-create the indexes in a new tablespace. Which two options would you use to reduce the time it takes to re-create the indexes?()A、 ONLINEB、 REVERSEC、 PARALLELD、 COMPRESSE、 NOLOGGINGF、 COMPUTE STATISTICS

考题 You are maintaining your database in Oracle10g. While performing an incremental backup of the database, you want to back uponly those blocks that have changed since the last backup. Which file will you create to increase the performance of the backup operation while performing the incremental backup of the database?()A、 redo log filesB、 password fileC、 control fileD、 change tracking file

考题 You are performing a database recovery because a user’s schema is dropped. While performing the recovery, you use the UNTIL SEQUENCE clause. Which type of database recovery are you performing?()A、 user managed complete recoveryB、 user managed incomplete recoveryC、 RMAN-based complete recoveryD、 RMAN-based incomplete recovery

考题 You are performing a backup of your database across the network. While taking the backup, you want to save space on the storage media and reduce the network bandwidth. Which command will you issue to configure the required type of backup?()A、 CONFIGURE DEVICE TYPE TO sbt BACKUP TYPE TO BACKUPSET;B、 CONFIGURE DEVICE TYPE TO disk BACKUP TYPE TO COPY;C、 CONFIGURE DEVICE TYPE TO sbt BACKUP TYPE TO COMPRESSED BACKUPSET;D、 CONFIGURE DEVICE TYPE TO sbt BACKUP TYPE TO COMPRESSED COPY;

考题 You work in a company which uses SQL Server 2008. You are the administrator of the company database. Now you are in charge of a SQL Server 2008 instance. You intend to configure FILESTREAM data, enabling FILESTREAM for file I/O streaming access and allowing remote client computers to have streaming access to FILESTREAM data. You must make sure that FILESTREAM data is enabled. In the options below, which service should you configure? () A、You should configure Distributed File SystemB、You should configure SQL ServerC、You should configure SQL Server Full TextD、You should configure SQL Server VSS Writer

考题 You work as the enterprise exchange administrator at Xxx .Xxx is using Microsoft Exchange Server 2010 as their messaging solution.Which of the following options can be you in order to change the permissions settings for a public folder?()A、You must use the Active Directory Users and Computers.B、You must use the Microsoft Office Outlook.C、You must use the Mail Flow Troubleshooter.D、You must use the Exchange Server Jetstress 2010.

考题 You work in a company which is named Wiikigo Corp. The company uses SQL Server 2008. You are the administrator of the company database. Now you are in charge of a SQL Server 2008 instance. Now your company CIO assigns a task to you. The company CIO wants you to configure FILESTREAM data and the two requirements below must be met: you must enable FILESTREAM for file I/O streaming access; remote client computers must be able to have streaming access to FILESTREAM data. You must make sure that FILESTREAM data is enabled. Which service should you configure? () A、You should configure SQL Server VSS Writer B、You should configure Distributed File System C、You should configure SQL Server D、You should configure SQL Server Full Text

考题 单选题You are performing a backup of your database across the network. While taking the backup, you want to save space on the storage media and reduce the network bandwidth. Which command will you issue to configure the required type of backup?()A  CONFIGURE DEVICE TYPE TO sbt BACKUP TYPE TO BACKUPSET;B  CONFIGURE DEVICE TYPE TO disk BACKUP TYPE TO COPY;C  CONFIGURE DEVICE TYPE TO sbt BACKUP TYPE TO COMPRESSED BACKUPSET;D  CONFIGURE DEVICE TYPE TO sbt BACKUP TYPE TO COMPRESSED COPY;

考题 单选题You work in a company which uses SQL Server 2008. You are the administrator of the company database. Now you are in charge of a SQL Server 2008 instance. You intend to configure FILESTREAM data, enabling FILESTREAM for file I/O streaming access and allowing remote client computers to have streaming access to FILESTREAM data. You must make sure that FILESTREAM data is enabled. In the options below, which service should you configure? ()A You should configure Distributed File SystemB You should configure SQL ServerC You should configure SQL Server Full TextD You should configure SQL Server VSS Writer

考题 单选题You are performing a database recovery because a user’s schema is dropped. While performing the recovery, you use the UNTIL SEQUENCE clause. Which type of database recovery are you performing?()A  user managed complete recoveryB  user managed incomplete recoveryC  RMAN-based complete recoveryD  RMAN-based incomplete recovery

考题 单选题You are the administrator of your company's network. A use named Michael has limited dexterity, which prevents him from using a standard keyboard to complete his daily computing tasks. You want to configure his Windows 2000 Professional computer to use the appropriate accessibility options. You logon to Michael’s computer by using Michael’s user account, which is a member of local users group. You configure the stickykeys, filterkeys and togglekeys options. You then log off. Michael logs on to the computer by using this user account. Michael is able to use the accessibility option that you have configured. However, when he returns from lunch, the accessibility options are automatically turned off. What should you do? ()A Use Accessibility Options in Control Panel to reconfigure accessibility idle time settingsB Use Accessibility Options in Control Panel to enable the FilterKeys option to reconfigure the time settingC Use Utility Manager to configure the accessibility options to start automatically when Windows 2000 Professional loadsD Use Utility Manager to increase accessibility idle time setting for Michael’s accessibility options, and save the settings. 

考题 多选题You noticed that the index tablespace in your database requires a recovery. However, instead of performing a media recovery, you decided to re-create the indexes in a new tablespace. Which two options would you use to reduce the time it takes to re-create the indexes?()AONLINEBREVERSECPARALLELDCOMPRESSENOLOGGINGFCOMPUTE STATISTICS

考题 单选题You are maintaining your database in Oracle10g. While performing an incremental backup of the database, you want to back uponly those blocks that have changed since the last backup. Which file will you create to increase the performance of the backup operation while performing the incremental backup of the database?()A  redo log filesB  password fileC  control fileD  change tracking file

考题 单选题Your corporate security policy requires that a user performing attacks must have limited network access and activities until an administrator can investigate.In the admin GUI, which sensor event policy action must you configure in "Configuration" "Sensors" "Sensor Event Policies" [rule name] to accomplish this?()A IgnoreB Replace users roleC Terminate user sessionD Disable user account

考题 单选题Which options must you configure while performing an automated Tablespace Point-in-Time Recovery (TSPITR) by using Recovery Manager (RMAN)?()A  New channels for restore and recovery tasksB  New name for the data files of the tablespaceC  Auxiliary name for the data files of the tablespaceD  Auxiliary destinations for an auxiliary set of data files

考题 单选题You are working on a 24X7 database. You want to design a backup strategy for your database that uses user managed backups. You want to be able to perform all backups while the database remains online. Which statement about performing user-managed backups in a 24x7 environment is true?()A You must have change tracking enabled in your databaseB Your database must be running in NOARCHIVELOG modeC To back up a tablespace, it must be in backup modeD To back up a tablespace, it must first be taken offline

考题 单选题You work in a company which uses SQL Server 2008. You are the administrator of the company database. Now you are in charge of a SQL Server 2008 instance. Now according to the requirement of the company CIO, users on the SQL Server instance must be able to use the OPENROWSET() function to query remote data source.  In the options below, which sp_configure configuration option should you configure?A Agent XPs B remote access C remote proc trans D Ad Hoc Distributed Queries

考题 单选题You are working on a 24X7 database. You want to design a backup strategy for your database that uses user managed backups. You want to be able to perform all backups while the database remains online.  Which statement about performing user-managed backups in a 24x7 environment is true?()A  You must have change tracking enabled in your databaseB  Your database must be running in NOARCHIVELOG modeC  To back up a tablespace,it must be in backup modeD  To back up a tablespace,it must first be taken offline

考题 多选题Which two statements about the use of SCREEN options are correct? ()(Choose two.)ASCREEN options offer protection against various attacksBSCREEN options are deployed prior to route and policy processing in first path packet processingCSCREEN options are deployed at the ingress and egress sides of a packet flowDSCREEN options, you must take special care to protect OSPF

考题 单选题You work in a company which is named Wiikigo Corp. The company uses SQL Server 2008. You are the administrator of the company database. Now you are in charge of a SQL Server 2008 instance. Now your company CIO assigns a task to you. The company CIO wants you to configure FILESTREAM data and the two requirements below must be met: you must enable FILESTREAM for file I/O streaming access; remote client computers must be able to have streaming access to FILESTREAM data. You must make sure that FILESTREAM data is enabled. Which service should you configure? ()A You should configure SQL Server VSS Writer B You should configure Distributed File System C You should configure SQL Server D You should configure SQL Server Full Text

考题 单选题Where do you configure SCREEN options?()A zones on which an attack might arriveB zones you want to protect from attackC interfaces on which an attack might arriveD interfaces you want to protect from attack