网友您好, 请在下方输入框内输入要搜索的题目:
题目内容
(请给出正确答案)
While setting up an Oracle database for one of your critical applications, you want to ensure that the database is backed up at regular intervals without your intervention. What should you do to achieve the objective?()
- A、configure the database to run in ARCHIVELOG mode
- B、configure the Flash Recovery Area to enable automatic database backup
- C、schedule the database backup using DBMS_JOB package after creating the database
- D、schedule the database backup using Recovery Manager (RMAN) commands after creating the database
- E、schedule the database backup using Database Configuration Assistant (DBCA) while creating the database
参考答案
更多 “While setting up an Oracle database for one of your critical applications, you want to ensure that the database is backed up at regular intervals without your intervention. What should you do to achieve the objective?()A、configure the database to run in ARCHIVELOG modeB、configure the Flash Recovery Area to enable automatic database backupC、schedule the database backup using DBMS_JOB package after creating the databaseD、schedule the database backup using Recovery Manager (RMAN) commands after creating the databaseE、schedule the database backup using Database Configuration Assistant (DBCA) while creating the database” 相关考题
考题
You are developing a Windows Communication Foundation (WCF) service.You need to enable security auditing for all events.What should you do?()
A. Set the serviceAuthorizationAuditLevel setting to Success and the messageAuthenticationAuditLevel setting to Success.B. Set the messageAuthenticationAuditLevel setting to Success and the auditLogLocation setting to Application.C. Set the serviceAuthorizationAuditLevel setting to SuccessAndFailure and the messageAuthenticationAuditLevel setting to SuccessAndFailure.D. Set the messageAuthenticationAuditLevel setting to SuccessAndFailure and the auditLogLocation setting to Security.
考题
While setting up the threshold for tablespace space usage metrics for one of your tablespaces, you define the critical threshold as 60% and warning threshold as 75%. What would be the result of this setting?()A、 It would result in an error because the warning threshold cannot be more than the critical threshold.B、 The warning threshold is ignored and alerts would be generated when space usage exceeds the critical threshold.C、 The critical threshold is ignored and alerts would be generated when space usage exceeds the warning threshold.D、 Both threshold values are used and alerts are generated when space usage exceeds the respective threshold values.
考题
How does NTP help you troubleshoot network problems?()A、By calculating the time offset from the GPS or atomic clockB、By setting the router clock to the default value if the router can't connect to a time serverC、By setting all network devices to the correct timeD、By setting necessary time date in the timestamp information
考题
The size of the largest datafile, data1.dbf, in your database is 30MB. You issued the following command: RMANCONFIGURE MAXSETSIZE 10MB; What will be the impact of the above setting?()A、 While performing the backup of the datafile,data1.dbf,one backup set is created.B、 While performing the backup of the datafile,data1.dbf,two backup sets are created.C、 While performing the backup of the datafile,data1.dbf,three backup sets are created.D、 While performing the backup of the datafile,data1.dbf,the command for performing a backup of the datafile,data1.dbf,will fail.
考题
Which options would you consider while configuring a flash recovery area (fast recovery area in 11g Release 2) for your production database that is running in ARCHIVELOG mode?()A、Setting the FAST_START_MTTR_TARGET to set the mean time to recoverB、Setting the RECOVERY_PARALLELISM parameter to twice the number of CPUsC、Using the DB_RECOVERY_FILE_DEST parameter to set the location for flash recovery areaD、Using the DB_RECOVERY_FILE_DEST_SIZE parameter to define the disk space limit for the recovery files created in the flash recovery area
考题
You are developing a Windows Communication Foundation (WCF) service. You need to enable security auditing for all events. What should you do?()A、Set the serviceAuthorizationAuditLevel setting to Success and the messageAuthenticationAuditLevel setting to Success.B、Set the messageAuthenticationAuditLevel setting to Success and the auditLogLocation setting to Application.C、Set the serviceAuthorizationAuditLevel setting to SuccessAndFailure and the messageAuthenticationAuditLevel setting to SuccessAndFailure.D、Set the messageAuthenticationAuditLevel setting to SuccessAndFailure and the auditLogLocation setting to Security.
考题
You have a single Active Directory directory service domain. You create organizational units (OUs) named Corporate and Support. You move the corporate user and computer accounts into the Corporate OU. You move the accounts of computers in the support department into the Support OU. You need to ensure that users have one screensaver while using computers that are in the Corporate OU, and aseparate screensaver while using computers that are in the Support OU. What should you do?()A、 Create a new parent OU for the Corporate and Support OUs and name the parent OU Users. Move all user objects to the Users OU, and then create and link a Group Policy object (GPO) with the screensaver setting to the Users OU.B、 Create and link a Group Policy object (GPO) with the screensaver setting to the Support OU and select the Block Inheritance option.C、 Create and link a Group Policy object (GPO) with the screensaver setting to the Corporate OU, create and link a GPO with the screensaver setting to the Support OU, and then enable loopback processing in Replace mode on the Support OUs GPO.D、 Create and link a Group Policy object (GPO) with the screensaver setting to the Support OU and select the Enforced option.
考题
You need to configure the local security policy setting to request a user name and password when you make changes to the computer system. What should you do?()A、Enable the Password must meet complexity requirements setting.B、Enable the User Account Control: Detect application installations and prompt for elevation setting.C、Configure the Interactive logon: Prompt user to change password before expiration setting to a value between 1 and 999.D、Configure the User Account Control: Behavior of the elevation prompt for administrators in Admin Approval mode setting to the Prompt for credentials option.
考题
You need to ensure that users who enter three successive invalid passwords within 5 minutes are locked out for 5 minutes. Which three actions should you perform()A、Set the Minimum password age setting to one day.B、Set the Maximum password age setting to one day.C、Set the Account lockout duration setting to 5 minutes.D、Set the Reset account lockout counter after setting to 5 minutes.E、Set the Account lockout threshold setting to 3 invalid logon attempts.F、Set the Enforce password history setting to 3 passwords remembered.
考题
Your network has a single domain with 1,000 client computers that run Windows 7. A large number of software installation scripts are configured to run on the client computers. You need to recommend a Group Policy setting to allow users to log on to their computers as soon as possible at first boot. What should you recommend?() A、Configure the Run logon scripts synchronously setting to be Enabled.B、Configure the Run logon scripts synchronously setting to be Disabled.C、Configure the Run startup scripts asynchronously setting to be Enabled.D、Configure the Run startup scripts asynchronously setting to be Disabled.
考题
单选题The size of the largest datafile, data1.dbf, in your database is 30MB. You issued the following command: RMANCONFIGURE MAXSETSIZE 10MB; What will be the impact of the above setting?()A
While performing the backup of the datafile,data1.dbf,one backup set is created.B
While performing the backup of the datafile,data1.dbf,two backup sets are created.C
While performing the backup of the datafile,data1.dbf,three backup sets are created.D
While performing the backup of the datafile,data1.dbf,the command for performing a backup of the datafile,data1.dbf,will fail.
考题
单选题When you adjust a thermostatic expansion valve, ().A
refrigerant must be bled off the sensing line before adjustments are madeB
all refrigerant must be pumped into the receiver before adjustments are madeC
time must be allowed for conditions to stabilize in the evaporator before further adjustments are madeD
all refrigerant must be routed through the dehydrator while changing the superheat setting
考题
单选题In your test database, you find that a user’s session is executing a lot of SQL statements, resulting in the generation of a large number of trace files. While investigating the reason, you find that SQL trace has been enabled at the instance level. You want to disable SQL trace, remotely, only for that user session to reduce the volume of trace data being generated. How do you achieve this objective?()A
by setting the SQL_TRACE parameter to FALSE in the parameter fileB
by using DBMS_MONITOR.SESSION_TRACE_DISABLE to disable the tracing for the user sessionC
by setting the SQL_TRACE parameter to FALSE by using the ALTER SYSTEM command in the user sessionD
by setting the SQL_TRACE parameter to FALSE by using the ALTER SESSION command in the user session
考题
单选题View the Exhibit. You want to create a tablespace to contain objects with block size 16 KB. But while configuring the storage you find that the block size that you can provide is only 8 KB. Which configuration couldhave enabled the block selection of 16 KB()A
Choosing the extent allocation type to uniformB
Choosing the Segment Space Management option to manualC
Setting autoextension on for the data file mentioned for the tablespaceD
Setting the DB_16K_CACHE_SIZE parameter for the database instance to a nonzero value
考题
单选题A backlash below a lock is defined as a().A
current setting your vessel on the wallB
current setting into the lock chamberC
an eddy working along the lower guide wallD
current setting counterclockwise
考题
单选题While setting up an Oracle database for one of your critical applications, you want to ensure that the database is backed up at regular intervals without your intervention.What should you do to achieve the objective?()A
configure the database to run in ARCHIVELOG modeB
configure the Flash Recovery Area to enable automatic database backupC
schedule the database backup using DBMS_JOB package after creating the databaseD
schedule the database backup using Recovery Manager (RMAN)commands after creating the databaseE
schedule the database backup using Database Configuration Assistant (DBCA)while creating the database
考题
多选题Immediately after adding a new disk to or removing an existing disk from an ASM instance, you find that the performance of the database goes down initially until the time the addition or removal process is completed, and then gradually becomes normal. Which two activities would you perform to maintain a consistent performance of the database while adding or removing disks?()ADefine the POWER option while adding or removing the disksBIncrease the number of ARB processes by setting up a higher value for ASM_POWER_LIMIT.CIncrease the number of DBWR processes by setting up a higher value for DB_WRITER_PROCESSESDIncrease the number of slave database writer processes by setting up a higher value for DBWR_IO_SLAVES
考题
多选题Immediately after adding a new disk to or removing an existing disk from an Automatic Storage Management (ASM) instance, you find that the performance of the database decreases initially, until the addition or removal process is completed. Performance then gradually returns to normal levels. Which two activities could you perform to maintain a consistent performance of the database while adding or removing disks?()Aincrease the number of checkpoint processesBdefine the POWER option while adding or removing the disksCincrease the number of DBWR processes by setting up a higher value for DB_WRITER_PROCESSESDincrease the number of slave database writer processes by setting up a higher value for DBWR_IO_SLAVESEincrease the number of ASM Rebalance processes by setting up a higher value for ASM_POWER_LIMIT during the disk addition or removal
考题
单选题A backlash below a lock is defined as().A
a current setting your vessel on the wallB
a current setting into the lock chamberC
an eddy working along the lower guide wallD
a current setting counterclockwise
考题
单选题While setting up the thresholds for tablespace space usage metrics for one of your tablespaces, you define the critical threshold as 60% and warning threshold as 75%. What would be the result of this setting?()A
It would result in an error because the warning threshold cannot be more than the critical threshold.B
The warning threshold is ignored and alerts would be generated when space usage exceeds the critical threshold.C
The critical threshold is ignored and alerts would be generated when space usage exceeds the warning threshold.D
Both threshold values are used and alerts are generated when space usage exceeds the respective threshold values.
考题
多选题You need to ensure that users who enter three successive invalid passwords within 5 minutes are locked out for five minutes. Which threeactions should you perform()ASet the Minimun password age setting to one day.BSet the Maximum password age setting to one day.CSet the Account lockout duration setting to 5 minutes.DSet the Reset account lockout counter after setting to 5 minutes.ESet the Account lockout threshold setting to 3 invalid logon attempts.FSet the Enforce password history setting to 3 passswords remembered.
考题
单选题As a licensed Merchant Marine Officer you are expected to().A
obtain a weather forecast before setting out from portB
listen to weather forecasts on the radio while enrouteC
understand all broadcast weather warning informationD
All of the above
考题
单选题You use two user accounts for your computer: standard user and administrator. You log on to your computer as standard user but are unable to make advanced configuration changes. You need to make advanced configuration changes while you are logged on as a standard user. What should you do? ()A
Enable the User Account Control: Only elevate executables that are signed and validated option.B
Disable the User Account Control: Only elevate executables that are signed and validated option.C
Configure the User Account Control: Behavior of the elevation prompt for standard users setting to the Prompt for credentials option.D
Configure the User Account Control: Behavior of the elevation prompt for administrators in Admin Approval Mode setting to the Prompt for consent option.
热门标签
最新试卷