考题
View the Exhibit and examine the output.You execute the following RMAN command to perform the backup operation:What is the multiplexing level in the preceding backup process()
A. 4B. 8C. 7D. 0
考题
Examine the following commands and their output:View the exhibit and examine the Flashback Version Query that was executed after the preceding commands.What could be the possible cause for the query not displaying any row?()A. Flashback logging is not enabled for the database.B. The changes made to the table are not committed.C. Supplemental logging is not enabled for the database.D. The database is not configured in ARCHIVELOG mode.
考题
Your multitenant container database (CDB) is running in ARCHIVELOG mode. You connect to the CDB RMAN.Examine the following command and its output:You execute the following command:RMAN BACKUP DATABASE PLUS ARCHIVELOG;Which data files will be backed up?()A. Data files that belong to only the root containerB. Data files that belong to the root container and all the pluggable databases (PDBs)C. Data files that belong to only the root container and PDB$SEEDD. Data files that belong to the root container and all the PDBs excluding PDB$SEED
考题
Using network monitoring tools would allow an administrator to do which of the following?()
A. Configure offline devicesB. Examine performance issuesC. Install additional software and updatesD. View syslog events
考题
A user is unable to connect to the company‘s intranet server by FQDN, but can connect by IP address. Other users are not having a problem. An administrator verifies that the user can successfully ping the server by IP address and can properly resolve the FQDN using nslookup. The problem is persisting after running ipconfig /flushdns.Which of the following should the administrator do NEXT?()A. Examine the Imhost file.B. Flush the cache on the DNS server.C. Flush the cache on the WINS server.D. Examine the hosts file
考题
Examine the following options, Multicasting supports applications that communicate.()
A. many - to - oneB. one - to - oneC. one - to - manyD. many - to - many
考题
This programme will examine the writer′s booksin detail, ______ an introduction to her life.A.following
B.having followed
C.being followed
D.to be followed
考题
You examine the port statistics on a Cisco Catalyst switch and notice an excessive number offrames are being dropped. Which of the following are possible reasons for the drops?()A、Unknown destination MAC addressB、Bad cablingC、MAC forwarding table is fullD、Port configured for half duplexE、Port configured for full duplexF、Network congestion
考题
Examine the following options,which Spanning Tree Protocol (STP) protection mechanism disables aswitch port if the port receives a Bridge Protocol Data Unit (BPDU)?()A、Uplink FastB、Port FastC、BPDU GuardD、Root Guard
考题
Which of the following is not considered a common approach to narrow the field of potentialproblem causes? (Choose the best answer.)()A、Following the traffic pathB、Top-downC、Comparing configurationsD、Bottom-upE、Divide and conquerF、Examine SLAs
考题
A user is unable to connect to the company's intranet server by FQDN, but can connect by IP address. Other users are not having a problem. An administrator verifies that the user can successfully ping the server by IP address and can properly resolve the FQDN using nslookup. The problem is persisting after running ipconfig /flushdns. Which of the following should the administrator do NEXT?()A、Examine the Imhost file.B、Flush the cache on the DNS server.C、Flush the cache on the WINS server.D、Examine the hosts file
考题
While applying a service update on a system using SMIT, the system administrates SMIT Command Status screen shows "Command: failed". Which of the following procedures should be performed to investigate the failure?()A、Exit the SMIT session and re-apply the update.B、Select the SMIT option to Clean UP After an Interrupted Installation.C、Examine the installation summary report to determine the cause of the failure.D、Examine the console log to view the error messages generated by the failure.
考题
Examine the following options, Multicasting supports applications that communicate.()A、many - to - oneB、one - to - oneC、one - to - manyD、many - to - many
考题
Which of the following commands should Karen, a technician, use to examine and restoreprotected system files?()A、SFCB、RECOVERC、REPLACED、COPY
考题
To examine the Exhibit, press the Exhibit button. Which of the following addresses should be reachable without adding any routes?()A、129.35.57.22B、129.35.54.22C、129.35.58.22D、129.35.254.22
考题
To examine the Exhibit, press the Exhibit button. Which of the following addresses will be reachable without adding any routes?()A、129.35.54.21B、129.35.57.21C、129.35.58.21D、129.35.55.21
考题
Examine the following RMAN command: RMAN CONFIGURE ENCRYPTION FOR DATABASE ON; RMAN BACKUP DATABASE PLUS ARCHIVELOG; Which prerequisite must be met before accomplishing the backup?()A、 Provide a password for the encryptionB、 Set up an Oracle wallet for the encryptionC、 No setup is required as it is a default encryption methodD、 Both Oracle wallet and password must be set up for the encryption
考题
Your alert log file has the following information: Tue May 25 17:43:38 2004 ORA-00060: Deadlock detected. More info in file /u01/app/oracle/admin/ORCL/udump/orcl_ora_3173.trc. What would you do to ensure that database is still running correctly?()A、examine the trace file and kill the session that caused the deadlockB、examine the trace file and kill both the sessions responsible for the deadlockC、examine the trace file for details and ask the user who caused the deadlock to roll back the transactionD、examine the trace file for details and remember that deadlocks are resolved automatically by Oracle databaseE、examine the trace file for details and use the Undo Advisor to rollback the transaction that caused the deadlock
考题
单选题To examine the Exhibit, press the Exhibit button. Based on the output of the "netstat -p udp" command as shown in the exhibit, which of the following procedures should be performed?()A
Increase the number of nfsd's on the client. B
Increase the number of biod's on the client. C
Decrease the number of nfsd's on the server. D
Increase the size of nfs_socketsize on the server.
考题
多选题You examine the port statistics on a Cisco Catalyst switch and notice an excessive number offrames are being dropped. Which of the following are possible reasons for the drops?()AUnknown destination MAC addressBBad cablingCMAC forwarding table is fullDPort configured for half duplexEPort configured for full duplexFNetwork congestion
考题
单选题Examine the following options ,when editing global IPS settings, which one determines if the IOS- basedIPS feature will drop or permit traffic for a particular IPS signature engine while a new signature for thatengine is being compiled?()A
Enable Signature DefaultB
Enable Engine Fail ClosedC
Enable Default IOS Signature ActualTests.comD
Enable Fail Opened
考题
单选题For visitors whose time is limited and are unable to learn the history and examine the building in detail on the spot, it is suggested that the following plan of a journey be followed.A
whoseB
and are unableC
onD
be followed
考题
多选题Examine the values for the following initialization parameters: FAST_START_MTTR_TARGET = 0LOG_CHECKPOINT_INTERVAL = 0 Which two will be the implications of these values in your database()AThe SGA advisor will be disabled.BThe MTTR advisor will be disabled.CAutomatic checkpoint tuning will be disabled.DCheckpoint information will not be written to the alert log file.
考题
单选题Your multitenant container database (CDB) is running in ARCHIVELOG mode. You connect to the CDB RMAN. Examine the following command and its output: You execute the following command: RMAN BACKUP DATABASE PLUS ARCHIVELOG; Which data files will be backed up?()A
Data files that belong to only the root containerB
Data files that belong to the root container and all the pluggable databases (PDBs)C
Data files that belong to only the root container and PDB$SEEDD
Data files that belong to the root container and all the PDBs excluding PDB$SEED
考题
单选题Examine the following commands executed in your database: SQL ALTER SESSION RECYCLEBIN=ON; Session altered SQL CREATE TABLE emp TABLESPACE tbsfd AS SELECT * FROM hr.employees; Table created. Further, you executed the following command to drop the table: SQL DROP TABLE emp;Table dropped. What happens in this scenario?()A
The table is moved to the SYSAUX tablespace.B
The table is moved to the SYSTEM tablespace.C
The table is removed from the database permanently.D
The table is renamed and remains in the TBSFD tablespace.
考题
单选题Examine the following command: ALTER DISKGROUP data MOUNT FORCE; In which scenario can you use the above command to mount the disk group?()A
when ASM disk goes offlineB
when one or more ASM files are droppedC
when some disks in a disk group are offlineD
when some disks in a failure group for a disk group are rebalancing
考题
单选题Examine the following command: ALTER DISKGROUP data MOUNT FORCE; In which scenario can you use the above command to mount the disk group? ()A
when ASM disk goes offlineB
when one or more ASM files are droppedC
when some disks in a disk group are offlineD
when some disks in a failure group for a disk group are rebalancing
考题
单选题To examine the Exhibit, press the Exhibit button. Which of the following addresses should be reachable without adding any routes?()A
129.35.57.22B
129.35.54.22C
129.35.58.22D
129.35.254.22