网友您好, 请在下方输入框内输入要搜索的题目:
题目内容
(请给出正确答案)
You are using Recovery wizard for performing incomplete recovery. Which of the following object types is NOT available in the Perform Recovery :Type screen?()
- A、 Whole database
- B、 Tablespaces
- C、 Datafiles
- D、 Archive logs
- E、 Redo logs
参考答案
更多 “You are using Recovery wizard for performing incomplete recovery. Which of the following object types is NOT available in the Perform Recovery :Type screen?()A、 Whole databaseB、 TablespacesC、 DatafilesD、 Archive logsE、 Redo logs” 相关考题
考题
An administrator account is granted the CREATE SESSION and SET CONTAINER system privileges.A multitenant container database (CDB) instant has the following parameter set:THREADED_EXECUTION = FALSEWhich four statements are true about this administrator establishing connections to root in a CDB that has been opened in read only mode?()A. You can conned as a common user by using the connect statement.B. You can connect as a local user by using the connect statement.C. You can connect by using easy connect.D. You can connect by using OS authentication.E. You can connect by using a Net Service name.F. You can connect as a local user by using the SET CONTAINER statement.
考题
When you are designing a Web application, which options define how rich text displays in a browser?()A、"Using HTML"B、"Using Java Applet"C、"Using AJAX Control"D、"Using Best Fit for OS"
考题
You want to check the EMP table in the user, Scott’s schema for block corruption. You also want to fix the corrupted blocks, if any. How will you accomplish the required task?()A、by using the ANALYZE utilityB、by using the DBVERIFY utilityC、by using the DB_BLOCK_CHECKING parameterD、by using the DBMS_REPAIR package
考题
You suspect unauthorized data manipulation language (DML) operations on a particular table. You want to track users who are performing the transactions and the values used in the transactions. Also, you plan to transfer these values to another table for analysis. How would you achieve this?()A、by using triggersB、by using external tablesC、by using anonymous PL/SQL blocksD、by auditing all DML operations on the table
考题
You issued the following command to analyze the SCOTT.EMP table for block corruption: ANALYZE TABLE SCOTT.EMP VALIDATE STRUCTURE; You received the following error: ORA-01578: ORACLE data block corrupted (file # %s, block # %s) How will you resolve the block corruption problem?()A、 by using the DBMS_REPAIR packageB、 by using the DB_BLOCK_CHECKING parameterC、 by using the DBVERIFY utilityD、 will not be completely resolved until the hardware fault is corrected
考题
You are maintaining your database in Oracle10g. You find that the INDEXES index tablespace should be recovered. How will you recover the index tablespace?()A、 by using the Flashback Database featureB、 by using RMAN incomplete recoveryC、 by performing a user-managed incomplete recoveryD、 by dropping and re-creating the index tablespace
考题
You work as a Web Developer at Certkiller.com. You are in the process of creating a Webapplication using Microsoft ASP.NET 3.5. An exception management framework is not used in the Web application. You need to ensure thatthe application log the unhandled exceptions automatically to the event log. You need to configurethe Web.config file to accomplish this. Identify the configuration that will assist you in thisscenario?()A、You should consider using the healthMonitoring enabled="true"/ configuration.B、You should consider using the deployment retail="true"/ configuration.C、You should consider using the customErrors mode="On"/ configuration.D、You should consider using the trace enabled="true"/ configuration.
考题
You need to recommend a solution for managing administrative rights for the branch office client computers. The solution must meet the companys technical requirements.What should you recommend configuring?()A、Account Policies by using GPOsB、Local Users and Groups by using Group Policy preferencesC、Restricted Groups by using GPOsD、Security Options by using Group Policy preferences
考题
You have a server that runs Windows Server 2003 Service Pack 2 (SP2). You create an Automated System Recovery (ASR) backup of the server. You restart the server and receive a critical error. You need to restore the server by using ASR. What should you do first? ()A、Start the computer by using Safe mode.B、Start the server by using the ASR floppy disk.C、Start the computer by using the Last Known Good Configuration option.D、Start the server by using the Windows Server 2003 SP2 installation media.
考题
You have a server named Server1 that runs Windows Server 2003 Service Pack 2 (SP2). Server1 is configured as an enterprise root certification authority (CA). You need to back up the CA's database and log files. You must achieve this goal by using the minimum amount of disk space. What should you run? ()A、Certreq.exe by using the –new parameterB、Certutil.exe by using the -backup parameterC、Cipher.exe by using the /k parameterD、Ntbackup.exe by using the systemstate parameter
考题
You develop a Web application. Your application contains two settings in the Web.config file. You deploy your application to production. You need to modify the application settings in the production environment without manually editing the XML markup in the Web.config file. What should you do? ()A、Modify the application settings by using the Web Site Administration Tool.B、Modify the application settings by using the Visual Studio property page editor for the project.C、Modify the application settings by using the resource editor.D、Modify the application settings by using the Visual Studio start options editor.
考题
You are creating a Windows Forms application by using the .NET Framework 3.5 The application is used by a financial service provider.You discover that the service provider transfers large amounts of data by using XML.You need to read and validate the XMLdocuments in the most time efficient manner.Which technology should you use?()A、The XmlReader classB、The XmlDocument classC、The XmlResolver classD、The LINQ to XML method
考题
You work as a network Exchange administrator at Company.com.The Company.com network currently consists of a single Active Directory forest containing a single domain named Company.com.The Company.com organization makes use of Microsoft Exchange Server 2010 as their messaging solution.During the course of the business week you receive instruction from Company.com to have the permission of a public folder named KingPublic modified.What should you do?()A、You should consider using the Microsoft Office Outlook tool.B、You should consider using the Public Folder Management Console tool.C、You should consider using the Exchange Control Panel (ECP) tool.D、You should consider using the Exchange Management Console (EMC) tool.
考题
You work as the enterprise exchange administrator at Company.com.The Company.com network consists of a single Active Directory domain named Company.com.Company.com has an Exchange Server 2010 organization.the Company.com contains an exchange server 2010 server named -sr14.-sr14 is configured to with outlook anywhere.you have received instructions from the cio to make sure that the users can connect to -sr14, using outlook anywhere. What should you do?()A、You should consider using the Exchange Remote Connectivity Analyzer.B、You should consider checking the properties of the WEB Outlook Provider.C、You should consider using the Mail Flow Troubleshooter.D、You should consider using the Test-OwaConnectivity cmdlet.
考题
You work as a network administrator at ABC.com. The ABC.com network consists of a single domain named ABC.com. All servers on the ABC.com network have Windows Server 2012 R2 installed. The ABC.com network has a domain controller named ABC_DC01.Which of the following tools would you use to manually remove Active Director from ABC_DC01?()A、You should consider using the dism.exe command-line tool.B、You should consider using the dsadd.exe command-line tool.C、You should consider using the pcpromo.exe command-line tool.D、You should consider using the ntdsutil.exe command-line tool.E、You should consider using the netsh.exe command-line tool.F、You should consider using the rexec.exe command-line tool.
考题
单选题You suspect unauthorized data manipulation language (DML) operations on a particular table. Youwant to track users who are performing the transactions and the values used in the transactions. You alsoplan to transfer these values to another table for analysis. How would you achieve this()A
by using triggersB
by using Data PumpC
by using external tablesD
by using anonymous PL/SQL blocks
考题
单选题You need to recommend a deployment strategy for App1. What should you recommend?()A
Assign App1 to users by using a Group Policy.B
Publish App1 to users by using a Group Policy.C
Deploy App1 as a RemoteApp program by using an MSI file.D
Deploy App1 as a RemoteApp program by using an RDP file.
考题
单选题You disabled the Flashback Database feature by using the following command: SQL ALTER DATABASE FLASHBACK OFF; What would be the effect of this command on the existing flashback logs?()A
Flashback logs are not deleted.B
Flashback logs are deleted automatically.C
Flashback logs are deleted only if you are using Recovery Manager (RMAN)D
Flashback logs are deleted only if you are using Oracle Manager Files (OFM)E
Flashback logs are deleted only if you are using Automatic Storage Management (ASM)
考题
单选题On Monday, you dropped the DEPT table from your schema and then you re-created the DEPT table in your schema. On Wednesday, you have a requirement to restore the DEPT table from the recycle bin. Which statement is correct?()A
You cannot restore the DEPT table by using the Oracle Flashback Drop feature because a table with the name DEPT already exists in your schema.B
You can restore the DEPT table by using the Oracle Flashback Drop feature, provided you use the RENAME TO clause.C
You cannot restore the DEPT table by using the Oracle Flashback Drop feature because the contents of the recycle bin are purged every 12 hours by default.D
You can restore the DEPT table by using the Oracle Flashback Drop feature and a system-generated name will be assigned to the restored table.
考题
单选题You suspect unauthorized data manipulation language (DML) operations on a particular table. You want to track users who are performing the transactions and the values used in the transactions. Also, you plan to transfer these values to another table for analysis. How would you achieve this?()A
by using triggersB
by using external tablesC
by using anonymous PL/SQL blocksD
by auditing all DML operations on the table
考题
单选题You are maintaining your database in ARCHIVELOG mode. An important table, SCOTT.EMPLOYEE, is dropped and purged from the Recycle Bin on Monday at 2:00 P.M. You do not use RMAN to perform backups. You performed the last full user-managed backup at 9:00 P.M. on Sunday. How will you recover the dropped table, SCOTT.EMPLOYEE?()A
by using the Flashback Table featureB
by using the Flashback Database featureC
by performing incomplete recovery using RMAN utilityD
by performing incomplete recovery using user-managed recovery
考题
单选题You have a public computer that runs Windows XP Professional. All users log on to the computer by using the same user account. You log on to the computer by using the local administrator account and attempt to access a secure Web site. You discover that you have automatically logged on to the secure Web site by using the credential of another user. You need to connect to the secure Web site by using your own credentials. What should you do?()A
Run ipconfig /flushdns at the command prompt. B
Reset the password for the local administrator user account. C
From the Internet Options in Internet Explorer, clear the AutoComplete history.D
From the Internet Options in Internet Explorer, delete the Temporary Internet Files.
考题
单选题You work as a Web Developer at Certkiller.com. You are in the process of creating a Webapplication using Microsoft ASP.NET 3.5. An exception management framework is not used in the Web application. You need to ensure thatthe application log the unhandled exceptions automatically to the event log. You need to configurethe Web.config file to accomplish this. Identify the configuration that will assist you in thisscenario?()A
You should consider using the healthMonitoring enabled=true/ configuration.B
You should consider using the deployment retail=true/ configuration.C
You should consider using the customErrors mode=On/ configuration.D
You should consider using the trace enabled=true/ configuration.
考题
单选题You want a record of all queries that are not using indexes. How would you achieve this?()A
By enabling the Slow Query Log because all queries that are not using indexes will be logged automaticallyB
By enabling the Error Log because not using indexes is an errorC
By enabling the Slow Query Log and using the – log-queries-not-using-indexes optionD
By enabling the Error Log and using the – log-queries-not-using-indexes option
考题
单选题You want to check the EMP table in the user, Scott’s schema for block corruption. You also want to fix the corrupted blocks, if any. How will you accomplish the required task?()A
by using the ANALYZE utilityB
by using the DBVERIFY utilityC
by using the DB_BLOCK_CHECKING parameterD
by using the DBMS_REPAIR package
考题
单选题You disabled the Flashback Database feature by using the following command: SQL ALTER DATABASE FLASHBACK OFF; What would be the effect of this command on the existing flashback logs?()A
Flashback logs are not deleted.B
Flashback logs are deleted automatically.C
Flashback logs are deleted only if you are using Recovery Manager (RMAN).D
Flashback logs are deleted only if you are using Oracle Managed Files (OMF).E
Flashback logs are deleted only if you are using Automatic Storage Management (ASM).
热门标签
最新试卷