网友您好, 请在下方输入框内输入要搜索的题目:

题目内容 (请给出正确答案)

You set the recovery window to seven days and the backup optimization to ON using the CONFIGURE command of Recovery Manager (RMAN). The most recent backup of the TOOLS tablespace to disk was taken on January 3. The TOOLS tablespace is read/x7fonly.  On February 21, when you execute a command to back up all the tablespaces to disk, you find that RMAN backs up the TOOLS tablespace also, even though the contents of the tablespace have not changed after the backup on January 3.  Because there are no changes made to the TOOLS tablespace, you decide that the tablespace should not be backed up by RMAN. What can you to do skip backing up the TOOLS tablespace without changing the current backup optimization setting?()

  • A、configure a default device for RMAN backups
  • B、temporarily disable the retention policy for RMAN backups
  • C、configure automatic channel allocation for RMAN backups
  • D、use the CONFIGURE command to reconfigure the recovery window to 60 days

参考答案

更多 “ You set the recovery window to seven days and the backup optimization to ON using the CONFIGURE command of Recovery Manager (RMAN). The most recent backup of the TOOLS tablespace to disk was taken on January 3. The TOOLS tablespace is read/x7fonly.  On February 21, when you execute a command to back up all the tablespaces to disk, you find that RMAN backs up the TOOLS tablespace also, even though the contents of the tablespace have not changed after the backup on January 3.  Because there are no changes made to the TOOLS tablespace, you decide that the tablespace should not be backed up by RMAN. What can you to do skip backing up the TOOLS tablespace without changing the current backup optimization setting?()A、configure a default device for RMAN backupsB、temporarily disable the retention policy for RMAN backupsC、configure automatic channel allocation for RMAN backupsD、use the CONFIGURE command to reconfigure the recovery window to 60 days” 相关考题
考题 you should () your reasons for canceling your purchase order.A、set forthB、set upC、set inD、set out

考题 You are developing a Windows Communication Foundation (WCF) service.You need to enable security auditing for all events.What should you do?() A. Set the serviceAuthorizationAuditLevel setting to Success and the messageAuthenticationAuditLevel setting to Success.B. Set the messageAuthenticationAuditLevel setting to Success and the auditLogLocation setting to Application.C. Set the serviceAuthorizationAuditLevel setting to SuccessAndFailure and the messageAuthenticationAuditLevel setting to SuccessAndFailure.D. Set the messageAuthenticationAuditLevel setting to SuccessAndFailure and the auditLogLocation setting to Security.

考题 A new switch is being installed in the Ezonexam network and you have been assigned the task of connecting it to an existing switch. In doing this, you want to set up the VLAN Trunking Protocol so that VLAN information can be passed between the switches. Which of the following must you do to accomplish this? (Choose all that apply).A.You must set each end of the trunk line to IEEE 802.1e encapsulation.B.You must set the same VTP management domain name on both switches.C.You must set all ports on the two switches as access ports.D.You must configure one of the switches as a VTP server.E.You must use a rollover cable to connect the two switches.

考题 Do you have a set of ______ (key)?

考题 You work as the enterprise exchange administrator at Xxx .Xxx is using Microsoft Exchange Server 2010 as their messaging solution.A new Xxx usage policy prohibits the employees from using certain words in internal e-mail messaging.What actions must you take to have the policy implemented?()A、You must set up an IP Block list.B、You must set up sender filtering.C、You must set up managed folders.D、You must build a transport rule

考题 You set up scheduled tasks to run and notify you of any failures. 3 days later you see that none of the tasks ran and you received no notifications. What should you do?()A、Set the schedule service to run under the administrator account.B、Set the scheduled tasks to run under the administrator account.C、Enable the messenger serviceD、Set the schedule service to run under the local system account and set it to start automatically.

考题 You have an Exchange Server 2010 organization that contains 20 mailbox databases. You configure each database to retain all deleted items for 30 days.You need to ensure that all items that pass the retention period are permanently deleted daily between 02:00 and 06:00. Which cmdlet should you use?()A、Set-MailboxDatabaseB、Set-MailboxServerC、Set-OrganizationConfigD、Set-RetentionPolicy

考题 You plan to use Windows PowerShell scripts to configure system settings when you deploy Windows 7.   You need to ensure that Windows PowerShell scripts will run on the client computers during initial setup.   What should you do?()A、Set the script execution policy to RemoteSigned.B、Set the script execution policy to AllSigned.C、Set the script execution policy to Restricted.D、Use Group Policy preferences.

考题 You are configuring an 802.1Q trunk between a Layer 2 switch and a firewall. You read in the documentation that the best way to set up a trunk is to set the port as dynamic desirable. The trunk is not coming up. Which one of these options would be a valid explanation? ()A、The firewall does not support Cisco Discovery Protocol. You should set the switchport trunk mode ONB、The firewall does not support Cisco Discovery Protocol. You should set the switchport trunk mode to OFFC、The firewall does not support Cisco Discovery Protocol. You should set the switchport trunk mode asauto.D、The firewall does not support DTP. You should set the switchport trunk mode to ON

考题 A new switch is being installed and you have been assigned the task of connecting it to an existing switch. In doing this, you want to set up the VLAN Trunking Protocol so that VLAN information can be passed between the switches. Which of the following must you do to accomplish this?()A、You must set each end of the trunk line to IEEE 802.1e encapsulation.B、You must set the same VTP management domain name on both switches.C、You must set all ports on the two switches as access ports.D、You must configure one of the switches as a VTP server.E、You must use a rollover cable to connect the two switches.

考题 You work as a database administrator for Certkiller .com. You want to create your database with the automatic undo management feature enable.Which two tasks must you perform to achieve this?()A、Set the UNDO_RETENTION parameter to AUTO.B、Create an initial undo segment in undotablespace.C、Set the UNDO_RETENTION parameter to 900 or moreD、Set the initialization parameter UNDO_MANAGEMENT to AUTOE、Set the UNDO_MANAGEMENT parameter to the name of an undotablespace

考题 Which of the following would you use to enable automatic media recovery for a database?()A、SET AUTORECOVERY ONB、SET RECOVERY ONC、SET AUTO OND、You cannot enable automatic media recovery.

考题 You are developing a Windows Communication Foundation (WCF) service. You need to enable security auditing for all events. What should you do?()A、Set the serviceAuthorizationAuditLevel setting to Success and the messageAuthenticationAuditLevel setting to Success.B、Set the messageAuthenticationAuditLevel setting to Success and the auditLogLocation setting to Application.C、Set the serviceAuthorizationAuditLevel setting to SuccessAndFailure and the messageAuthenticationAuditLevel setting to SuccessAndFailure.D、Set the messageAuthenticationAuditLevel setting to SuccessAndFailure and the auditLogLocation setting to Security.

考题 You work in a company which uses SQL Server 2008. You are the administrator of the company database. Now you are in charge of a SQL Server 2008 instance. There are queries that have an estimated execution cost less than 3. You intend to configure the instance, make it use a single thread for these queries. In the options below, which sp_configure configuration option should you set?()A、You should set query governor cost limitB、You should set cost threshold for parallelismC、You should set priority boost D、You should set precompute rank

考题 You develop a Web application that contains two master pages. You need to dynamically set the master page when a user views pages in the application. What should you do? ()A、Set Page.MasterPageFile in the Page's Page_Init event.B、Set Page.MasterPageFile in the Page's OnInit event.C、Set Page.MasterPageFile in the Page's Page_Load event.D、Set Page.MasterPageFile in the Page's Page_PreInit event.

考题 You have a secured Windows Communication Foundation (WCF) service. You need to track unsuccessful attempts to access the service. What should you do?()A、Set the authorization Manager Type attribute of the service Authorization behavior to Message.B、Set the include Exception Detailsln Faults attribute of the service Debug behavior to true.C、Set the Mode attribute of the security configuration element to Message.D、Set the message Authentication AuditLevel attribute of the service Security Audit behavior to Failure.

考题 You are developing a class library. Portions of your code need to access system environment variables. You need to force a runtime SecurityException only when callers that are higher in the call stack do not have the necessary permissions. Which call method should you use?()A、set.Demand();B、set.Assert();C、set.PermitOnly();D、set.Deny();

考题 You are creating a Windows Forms application by using the .NET Framework 3.5.You have resource files in five different languages.You need to test the application in each language. What should you do?()A、Set the CurrentCulture property explicitly to the respective culture for each language.B、Set the CurrentCulture property explicitly to IsNeutralCulture for each language.C、Set the CurrentUICulture property explicitly to IsNeutralCulture for each language.D、Set the CurrentUICulture property explicitly to the respective culture for each language.

考题 You are debugging a Windows Communication Foundation (WCF) service. The service uses signed and encrypted messages.You need to configure logging so that you can read the contents of the messages. What should you do?()A、Set maxSizeMessagesToLog to 10B、Set logMessageAtServiceLevel to true.C、Set maxMessagesToLog to 10.D、Set logMessageAtTransportLevel to true.

考题 You are developing an ASP.NET Web page. You add a data-bound GridView control. The GridView contains a TemplateField that includes a DropDownList. You set the GridViews ClientIDMode property to Static, and you set the ClientIDRowSuffix property to ProductID. You need to be able to reference individual DropDownList controls from client-side script by using the ProductID. What should you set the ClientIDMode property of the DropDownList to? ()A、AutoIDB、StaticC、InheritD、Predictable

考题 You work as the enterprise exchange administrator at Xxx .The Xxx network consists of a domain named xxx .What actions must you take to use administrative delegation on a series of cmdlets?()A、You must implement log transactionsB、You must set up new management roleC、You must implement Mailbox journalingD、You must set up a Role Based Access Control (RBAC) role

考题 You are developing an application that will perform mathematical calculations.You need to ensure that the application is able to perform multiple calculations simultaneously. What should you do?()A、Set the IdealProcessor property of the ProcessThread object.B、Set the ProcessorAffinity property of the ProcessThread object.C、For each calculation, call the QueueUserWorkItem method of the ThreadPool class.D、Set the Process.GetCurrentProcess().BasePriority property to High.

考题 Your organization has Exchange Server 2010.You need to ensure that users in the organization are notified before they send e-mail messages to external recipients. Which cmdlet should you run?()A、set-MailboxB、set-OrganizationConfigC、set-TransportAgentD、set-TransportConfig

考题 多选题Your computer has a wired network adapter and a wireless network adapter. You use the wireless network adapter only when you are traveling.  You need to configure the network adapter profile settings to ensure that the computer discovers other network devices only when you are at home.  Which two actions should you perform?()AWhen you configure access to the wired network at home, set the wired network adapter location type to Public.BWhen you configure access to the wired network at home, set the wired network adapter location type to Private.CWhen you configure access to the public wireless access points, set the wireless network adapter location type to Public.DWhen you configure access to the public wireless access points, set the wireless network adapter location type to Private.

考题 单选题You are creating a Windows Forms Application by using the .NET Framework 3.5.You plan to create a Windows Installer package for a Windows Forms application. The package will be deployed on Windows Vista computers.You need to ensure that during deployment the installation does not elevate privileges of the user installing the application.What should you do?()A Create a custom action and set the NoImpersonate property to trueB Create a custom action and set the NoImpersonate property to falseC Create a manifest and set the RequestedExecutionLevel level attribute to AsInvokerD Create a manifest and set the RequestedExecutionLevel level attribute to AsAdministrator

考题 单选题Terminal Services application runs on the server. Users report that the application stops responding. You monitor the memory usage on the server for a week. You discover that the application has a memory leak. A patch is not currently available.  You create a new resource-allocation policy in Microsoft Windows Server Resource Manager. You configure a Process Matching Criteria named TrackShip and select the application.  You need to terminate the application when the application consumes more than half of the available memory on the server. What should you do?()A Configure the resource-allocation policy and set the maximum working set limit option to half the available memory on the server. Set the new policy as a Profiling Policy.B Configure the resource-allocation policy and set the maximum working set limit option to half the available memory on the server. Set the new policy as a Managing Policy.C Configure the resource-allocation policy and set the maximum committed memory option to half the available memory on the server. Set the new policy as a Profiling Policy.D Configure the resource-allocation policy and set the maximum committed memory option to half the available memory on the server. Set the new policy as a Managing Policy.

考题 单选题You work in a company which uses SQL Server 2008. You are the administrator of the company database. Now you are in charge of a SQL Server 2008 instance. There are queries that have an estimated execution cost less than 3. You intend to configure the instance, make it use a single thread for these queries. In the options below, which sp_configure configuration option should you set?()A You should set query governor cost limitB You should set cost threshold for parallelismC You should set priority boost D You should set precompute rank

考题 单选题You are creating a Windows Forms Application by using the .NET Framework 3.5.You plan to create a Windows Installer package for a Windows Forms application.The package will be deployed on Windows Vista computers.You need to ensure that during deployment the installation does not elevate privileges of the user installing the application.What should you do?()A Create a custom action and set the NoImpersonate property to trueB Create a custom action and set the NoImpersonate property to falseC Create a manifest and set the RequestedExecutionLevel level attribute to AsInvoker.D Create a manifest and set the RequestedExecutionLevel level attribute to AsAdministrator.