网友您好, 请在下方输入框内输入要搜索的题目:
题目内容
(请给出正确答案)
单选题
Which is the correct description of the significance of the ORACLE_HOME environmental variable?()
A
It specifies the directory containing the Oracle software.
B
It specifies the directory containing the Oracle-Managed Files.
C
It specifies the directory for database files, if not specified explicitly.
D
It specifies the base directory of Optimal Flexible Architecture (OFA) .
参考答案
参考解析
解析:
暂无解析
更多 “单选题Which is the correct description of the significance of the ORACLE_HOME environmental variable?()A It specifies the directory containing the Oracle software.B It specifies the directory containing the Oracle-Managed Files.C It specifies the directory for database files, if not specified explicitly.D It specifies the base directory of Optimal Flexible Architecture (OFA) .” 相关考题
考题
You are managing the APPPROD database as a DBA which is not using the Oracle-managed files. You plan to duplicate this database in the same system with the name DUPDB.You want to create the same directory structure for duplicate database files as of the target database.You executed the following RMAN commands:What are the implications of this command?()A. It creates database files for the duplicate database under the Oracle base with a different directory for the duplicate database.B. It overwrites data files of the target database because a different location for data files is not mentioned for the duplicate database.C. It creates database files for the duplicate database under the same Oracle home as that of the target database with the same directory structure.D. It creates database files for the duplicate database under the same Oracle home as that of the target but with a different directory for the duplicate database.
考题
Which statement is true about the log-output variable?()
A.It is a static variable and can be set only at MySQL server startupB.It enables and starts the General Query LogC.It sets the target location for the binary logs generated by the MySQL severD.It specifies output destinations for the slow and General Query logs
考题
Given that the current directory is empty, and that the user has read and write permissions, and the following:Which statement is true?()
A.Compilation fails.B.The file system has a new empty directory named dir.C.The file system has a new empty directory named newDir.D.The file system has a directory named dir, containing a file f1.txt.E.The file system has a directory named newDir, containing a file f1.txt.
考题
Referring to the exhibit, what is the purpose of the targets section of the configuration?()
A. It defines which devices will be sending traps.B. It specifies where to send traps.C. It defines the IP addresses of management systems that can access the device.D. It specifies which devices can be polled for SNMP data.
考题
Which of the following statements is TRUE about mounting a file system?()
A.A file system cannot be mounted on a directory containing data.B.Mounting a file system on a mount point containing data will delete the data.C.Mounting a file system on a amount point containing data will make the data temporarily inaccessible.D.A systems administrator must manually create an empty directory prior to mounting an AIX JFS.
考题
You are configuring for Oracle Shared Server. Which service is required? ()A、Oracle Net ServiceB、Oracle HTTP ServiceC、Oracle Paging ServiceD、Internet Directory Service
考题
What is the objective of the aaa authentication login console-in local command?()A、It specifies the login authentication method list named console-in using the local user database on the routerB、It specifies the login authorization method list named console-in using the local RADIUS username-password data baseC、It specifies the login authentication list named console-in using the local username- password data base on the routerD、It specifies the login authorization method list named console-in using the local username- password data base on the router
考题
Which two statements best describe the wireless security standard that is defined by WPA (Choose two.)()。A、It specifies use of a static encryption key that must be changed frequently to enhance securityB、It requires use of an open authentication methodC、It specifies the use of dynamic encryption keys that change each time a client establishes a connectionD、It requires that all access points and wireless devices use the same encryption keyE、It includes authentication by PSK
考题
Which of the following specifies a set of consistent requirements for a workstation or server?()A、Vulnerability assessmentB、Imaging softwareC、Patch managementD、Configuration baseline
考题
Which two statements are true of a network mask?()A、A subnet mask specifies the portion of an IP address that is in a binary formatB、A subnet mask specifies the portion of an IP address that is in a decimal formatC、A subnet mask specifies the portion of an IP address that represents a network prefixD、A subnet mask specifies the portion of an IP address that represetns network hosts
考题
Which two statements are true of a network mask?()A、A subnet mask specifies the portion of an IP address that is in a binary format.B、A subnet mask specifies the portion of an IP address that is in a decimal format.C、A subnet mask specifies the portion of an IP address that represents a network prefix.D、A subnet mask specifies the portion of an IP address that represents network hosts.
考题
When you create a backup control file, where is the resulting file written to?() A、 The database user dump destination directoryB、 The database diagnostic destination directoryC、 To $ORACLE_HOME/rdbmsD、 To $ORACLE_HOME/adminE、 To the directory and filename you specify in the command
考题
Which statement is true regarding checkpoints and recovery?()A、A checkpoint defines the highest system change number (SCN).B、All redo entries higher or at the SCN are known to be written to the data files.C、Only the redo records containing SCNs higher then the checkpoint need to be applied during recovery.D、The LOG_CHECKPOINT_INTERVAL initialization parameter specifies the amount of time between incremental checkpoints.
考题
Which statement is true about the log-output variable?()A、It is a static variable and can be set only at MySQL server startupB、It enables and starts the General Query LogC、It sets the target location for the binary logs generated by the MySQL severD、It specifies output destinations for the slow and General Query logs
考题
单选题Which two statements are true of a network mask?()A
A subnet mask specifies the portion of an IP address that is in a binary formatB
A subnet mask specifies the portion of an IP address that is in a decimal formatC
A subnet mask specifies the portion of an IP address that represents a network prefixD
A subnet mask specifies the portion of an IP address that represetns network hosts
考题
单选题What is the objective of the aaa authentication login console-in local command?()A
It specifies the login authentication method list named console-in using the local user database on the routerB
It specifies the login authorization method list named console-in using the local RADIUS username-password data baseC
It specifies the login authentication list named console-in using the local username- password data base on the routerD
It specifies the login authorization method list named console-in using the local username- password data base on the router
考题
单选题Which statement is true regarding checkpoints and recovery?()A
A checkpoint defines the highest system change number (SCN).B
All redo entries higher or at the SCN are known to be written to the data files.C
Only the redo records containing SCNs higher then the checkpoint need to be applied during recovery.D
The LOG_CHECKPOINT_INTERVAL initialization parameter specifies the amount of time between incremental checkpoints.
考题
多选题The NLS_TERRITORY parameter specifies the default conventions to be used for which of the following globalization elements?()ADate formatBDecimal characterCGroup separatorDFirst day of the monthENone of the aboveFAll of the above
考题
单选题You are managing the APPPROD database as a DBA which is not using the Oracle-managed files. You plan to duplicate this database in the same system with the name DUPDB.You want to create the same directory structure for duplicate database files as of the target database. You executed the following RMAN commands: RMAN CONNECT TARGET sys/sys@APPPROD RMAN CONNECT AUXILIARY sys/sys@DUPDB RMAN DUPLICATE TARGET DATABASE TO dupdb FROM ACTIVE DATABASE PASSWORD FILE SPILE NOFILENAMECHECK; What are the implications of this command?()A
It creates database files for the duplicate database under the Oracle base with a different directory for the duplicate database.B
It overwrites data files of the target database because a different location for data files is not mentioned for the duplicate database.C
It creates database files for the duplicate database under the same Oracle home as that of the target database with the same directory structure.D
It creates database files for the duplicate database under the same Oracle home as that of the target but with a different directory for the duplicate database.
考题
单选题Which statement is true about the log-output variable?()A
It is a static variable and can be set only at MySQL server startupB
It enables and starts the General Query LogC
It sets the target location for the binary logs generated by the MySQL severD
It specifies output destinations for the slow and General Query logs
考题
单选题Referring to the exhibit, what is the purpose of the targets section of the configuration?()A
It defines which devices will be sending traps.B
It specifies where to send traps.C
It defines the IP addresses of management systems that can access the device.D
It specifies which devices can be polled for SNMP data.
考题
多选题Which two statements are true of a network mask?()AA subnet mask specifies the portion of an IP address that is in a binary format.BA subnet mask specifies the portion of an IP address that is in a decimal format.CA subnet mask specifies the portion of an IP address that represents a network prefix.DA subnet mask specifies the portion of an IP address that represents network hosts.
考题
单选题Which of the following specifies a set of consistent requirements for a workstation or server?()A
Vulnerability assessmentB
Imaging softwareC
Patch managementD
Configuration baseline
考题
单选题You are configuring for Oracle Shared Server. Which service is required? ()A
Oracle Net ServiceB
Oracle HTTP ServiceC
Oracle Paging ServiceD
Internet Directory Service
考题
单选题When you create a backup control file, where is the resulting file written to?()A
The database user dump destination directoryB
The database diagnostic destination directoryC
To $ORACLE_HOME/rdbmsD
To $ORACLE_HOME/adminE
To the directory and filename you specify in the command
考题
单选题Which of the following statements is TRUE about mounting a file system?()A
A file system cannot be mounted on a directory containing data.B
Mounting a file system on a mount point containing data will delete the data.C
Mounting a file system on a amount point containing data will make the data temporarily inaccessible.D
A systems administrator must manually create an empty directory prior to mounting an AIX JFS.
考题
单选题Which of the following environment variables specifies a non-default location for the listener configuration file?()A
LSN_ADMINB
TNS_ADMINC
ADMIN_TNSD
TSN_ADMIN
热门标签
最新试卷