网友您好, 请在下方输入框内输入要搜索的题目:
题目内容
(请给出正确答案)
单选题
You were recently hired by an organization as a database administrator. You are asked to find out whether the currently functional listener process, named L1, has been password protected or not. You are not familiar with the file system of the new organization. How would you accomplish the task?()
A
by using the STATUS command of the Listener control utility
B
by using the STATUS L1 command of the Listener control utility
C
by using the SHOW RULES command of the Listener control utility
D
by using the SET PASSWORD command of the Listener control utility
E
by searching for the PASSWORD_LISTENER entry in the listener.ora file
参考答案
参考解析
解析:
暂无解析
更多 “单选题You were recently hired by an organization as a database administrator. You are asked to find out whether the currently functional listener process, named L1, has been password protected or not. You are not familiar with the file system of the new organization. How would you accomplish the task?()A by using the STATUS command of the Listener control utilityB by using the STATUS L1 command of the Listener control utilityC by using the SHOW RULES command of the Listener control utilityD by using the SET PASSWORD command of the Listener control utilityE by searching for the PASSWORD_LISTENER entry in the listener.ora file” 相关考题
考题
下面代码执行后,正确的输出结果是()。A、You are fired! You are hired!B、You are fired! You are fired!C、You are hired! You are hired!D、You are hired! Youarefired!
考题
You are maintaining the SALES database for an organization. You have enabled the Flashback Database feature and want to estimate the flashback space required for future operations. Which view would you query to estimate the flashback space required?()A、 V$DATABASEB、 V$FLASHBACK_DATABASE_STATC、 V$FLASHBACK_DATABASE_LOGD、 V$RECOVERY_FILE_DEST
考题
A junior level Database Administrator erroneously deleted the database alert log while users were accessing the database. Which action should you take to recover the alert log?() A、 Do nothing.B、 Restart the database.C、 Perform recovery on the database.D、 Restore the alert log from the last backup.
考题
You were recently hired by Certkiller .com as a database administrator. You are asked to find out whether the currently functional listener process, named L1, has been password protected or not. You are not familiar with the file system of the new organization. How would you accomplish the task?()A、 by using the STATUS command of the Listener control utilityB、 by using the STATUS L1 command of the Listener control utilityC、 by using the SHOW RULES command of the Listener control utilityD、 by using the SET PASSWORD command of the Listener control utilityE、 by searching for the PASSWORD_LISTENER entry in the listener.ora file
考题
You have been recently hired as a database administrator. Your senior manager asks you to study the production database server and submit a report on the settings done by the previous DBA. While observing the server settings, you find that the following parameter has been set in the parameter file of the database: REMOTE_OS_AUTHENT = TRUE What could have been the reason to set this parameter as TRUE?()A、to enable operating system authentication for a remote clientB、to restrict the scope of administration to identical operating systemsC、to allow the start up and shut down of the database from a remote clientD、to enable the administration of the operating system from a remote clientE、to disable the administration of the operating system from a remote client
考题
You work as a database administrator for Certkiller .com. In your organization, you have four databases, Certkiller DB01, Certkiller DB02, Certkiller DB03, and Certkiller DB04, which are located in Berlin, Frankfurt,Rammstein, and Munich respectively, and which were created using Database Configuration Assistant (DBCA). You want to perform administrative tasks on these databases that include startup and shutdown, taking regular backups, and so on, fromFrankfurtusing Oracle tools. Which Oracle file would you enable to perform this task?()A、Control fileB、Password fileC、Parameter fileD、Online redo log fileE、Listener controller fileF、Server parameter file
考题
You are the Database Administrator for WonderWeb, which has recently acquired a media company TXGlobal. You have been assigned the task to migrate all the database applications of TXGlobal to the database server of WonderWeb. To accommodate more database applications, you need to add disks to the existing disk group. Whenever you add or remove disks from the disk group, Automatic Storage Management (ASM) rebalancing distributes the data evenly across all the disks of the disk group. Which background process performs this actual rebalancing activity, resulting in the movement of data extents in the disk groups?() A、 ASMBB、 ARBnC、 RBAL in the ASM instanceD、 RBAL in the database instance
考题
You were recently hired by an organization as a database administrator. You are asked to find out whether the currently functional listener process, named L1, has been password protected or not. You are not familiar with the file system of the new organization. How would you accomplish the task?()A、by using the STATUS command of the Listener control utilityB、by using the STATUS L1 command of the Listener control utilityC、by using the SHOW RULES command of the Listener control utilityD、by using the SET PASSWORD command of the Listener control utilityE、by searching for the PASSWORD_LISTENER entry in the listener.ora file
考题
You have an Exchange Server 2010 organization that contains a mailbox database named DB1.You have a backup of DB1.You need to copy a mailbox from the backup to a personal folder (PST) file.The solution must not prevent users on DB1 from accessing their mailboxes.What should you do?()A、Restore the mailbox database to DB1 and then run the Move-Mailbox cmdlet.B、Restore the mailbox database to DB1 and then restore the mailbox.Run the New- MoveRequest cmdlet.C、Restore the mailbox database to a Recovery Mailbox database and then run the Connect- Mailbox cmdlet.D、Restore the mailbox database to a Recovery Mailbox database and then restore the mailbox.Run the Export-Mailbox cmdlet.
考题
You have an Exchange Server 2010 organization that contains 20 Mailbox servers.You plan to create 10 mailbox databases on each Mailbox server. You need to create a naming convention for all mailbox databases. What should you include in your naming convention()? A、For each mailbox database, provide a database name that is unique within the organization.B、For each mailbox database, provide a database name that is unique within the Mailbox server.C、For each mailbox database file, provide a file name that is unique within the organization.D、For each mailbox database file, provide a file name that is unique within the Mailbox server.
考题
You work as the Exchange administrator at Company.com.The Company.com network contains an Exchange Server 2010 Organization.The organization contains the subsequent servers: the Company.com organization contains one mailbox database as well as one public folder database.You receive an instruction from the cio to ensure that in the event of -ex03 failure the public folders will remain available.What should you do?()A、You should consider creating a database availability group (DAG). Thereafter -ex03 and mbx2 should be added to the dag.B、You should consider creating a public folder database on -ex04.Thereafter the replication settings should be changed on every public folder.C、You should consider creating a public folder database on -ex04.Thereafter the replication settings should be changed on the public folder database.D、You should consider creating a Failover Cluster.Thereafter -ex03 and -ex04 should be added to the failover cluster.
考题
You work as a network Exchange administrator at Company.com.The Company.com network currently consists of a single Active Directory forest containing a single domain named Company.com.The Company.com organization makes use of Microsoft Exchange Server 2010 as their messaging solution.During the course of the business week you receive instruction from Company.com to start planning the creation of ten mailbox databases on twenty Mailbox servers whilst ensuring that you create a naming convention for all Mailbox databases. What should you do?()A、You should consider having a file name that is unique within the organization provided for each mailbox database file.B、You should consider having a file name that is unique within the Mailbox server provided for each mailbox database file.C、You should consider having a database name that is unique within the organization provided for each mailbox database file.D、You should consider having a database name that is unique within the Mailbox server provided for each mailbox database file.
考题
You have an Exchange Server 2010 organization. You need to recommend a mailbox storage management solution for your organization to meet thefollowing requirements: .Apply quota limits for users by department.Automatically apply quota limits for new users What should you recommend?()A、A storage group for each department.B、A mailbox database for each department.C、An organizational unit for each department.D、A managed folder mailbox policy for each department.
考题
You work as the exchange administrator at TestKing.com. The TestKing.com network contains an Exchange Server 2010 Organization. TestKing.com has its headquarters in Stockholm where you are located.The TestKing.com network contains a database availability group (DAG). You receive an instruction fromthe management to devise a Mailbox database security solution for the organization. Management wantsthe read/write performance to be maximized as well as ensuring that any access to the database isprohibited in the event of theft. What should you do?()A、You should recommend that management make use of DAG network encryption.B、You should recommend that management make use of Encrypted File System (EFS)C、You should recommend that management make use of Windows BitLocker Drive Encryption.D、You should recommend that management make use of Rights Management Service RMS.
考题
单选题You were recently hired by an organization as a database administrator. You are asked to find out whether the currently functional listener process, named L1, has been password protected or not. You are not familiar with the file system of the new organization. How would you accomplish the task?()A
by using the STATUS command of the Listener control utilityB
by using the STATUS L1 command of the Listener control utilityC
by using the SHOW RULES command of the Listener control utilityD
by using the SET PASSWORD command of the Listener control utilityE
by searching for the PASSWORD_LISTENER entry in the listener.ora file
考题
单选题You have been recently hired as a database administrator. Your senior manager asks you to study the production database server and submit a report on the settings done by the previous DBA. While observing the server settings, you find that the following parameter has been set in the parameter file of the database: REMOTE_OS_AUTHENT = TRUE What could have been the reason to set this parameter as TRUE?()A
to enable operating system authentication for a remote clientB
to restrict the scope of administration to identical operating systemsC
to allow the start up and shut down of the database from a remote clientD
to enable the administration of the operating system from a remote clientE
to disable the administration of the operating system from a remote client
考题
单选题Another DBA issues a shutdown abort command on a database on which you were running an online backup. What will happen when you try to restart the database?()A
Oracle will automatically take the datafile out of hot backup mode,generate a warning message,and then open the database.B
Oracle will automatically take the datafile out of hot backup mode and then open the database.C
Oracle will generate an error when trying to open the database,indicating that a datafile is in hot backup mode.You will need to correct this error before you can open the database.D
The database will open with the file in hot backup mode. You can restart the backup at any time.E
The datafile in hot backup mode will be corrupted and you will have to recover it.
考题
单选题You work as an Exchange Administrator for Xxx .The company has a Windows 2008 Active Directory-based network.The network contains an Exchange Server 2010 organization.An employee named John has recently left the company.You need to delete the mailbox and the user account for John.You also need to remove the mailbox from the Exchange database.Which of the following commands will you enter in the Exchange Management Shell to accomplish the task?()A
Delete-Mailbox -Identity john@TK.comB
Remove-Mailbox -Identity john@TK.com -Permanent $trueC
Remove-Mailbox -Identity john@TK.comD
Disable-Mailbox john@TK.com
考题
单选题You were recently hired by Certkiller .com as a database administrator. You are asked to find out whether the currently functional listener process, named L1, has been password protected or not. You are not familiar with the file system of the new organization. How would you accomplish the task?()A
by using the STATUS command of the Listener control utilityB
by using the STATUS L1 command of the Listener control utilityC
by using the SHOW RULES command of the Listener control utilityD
by using the SET PASSWORD command of the Listener control utilityE
by searching for the PASSWORD_LISTENER entry in the listener.ora file
考题
单选题You are maintaining the SALES database for an organization. You have enabled the Flashback Database feature and want to estimate the flashback space required for future operations. Which view would you query to estimate the flashback space required?()A
V$DATABASEB
V$FLASHBACK_DATABASE_STATC
V$FLASHBACK_DATABASE_LOGD
V$RECOVERY_FILE_DEST
考题
单选题You work as a network Exchange administrator at Company.com.The Company.com network currently consists of a single Active Directory forest containing a single domain named Company.com.The Company.com organization makes use of Microsoft Exchange Server 2010 as their messaging solution.During the course of the business week you receive instruction from Company.com to start planning the creation of ten mailbox databases on twenty Mailbox servers whilst ensuring that you create a naming convention for all Mailbox databases. What should you do?()A
You should consider having a file name that is unique within the organization provided for each mailbox database file.B
You should consider having a file name that is unique within the Mailbox server provided for each mailbox database file.C
You should consider having a database name that is unique within the organization provided for each mailbox database file.D
You should consider having a database name that is unique within the Mailbox server provided for each mailbox database file.
考题
单选题You discover that the schema changes that were recently made to your SQL Server 2005 database have caused your Web site to stop functioning. It is unclear who made the changes. TestKing.com now mandates that all changes to the database schema be tracked. You need to implement a mechanism that will track schema changes in your database. What should you do?()A
Implement a stored procedure that writes data about schema changes to a log table.B
Implement DDL AFTER triggers that write user and schema information to a log table.C
Implement a DML INSTEAD OF trigger that writes data about schema changes to a log table.D
Implement a DML AFTER trigger that writes data about schema changes to a log table.
考题
单选题下面代码执行后,正确的输出结果是()。A
You are fired! You are hired!B
You are fired! You are fired!C
You are hired! You are hired!D
You are hired! Youarefired!
考题
单选题The advertising company recently hired a designer _____ had once won a prize in a national contest.A
whoseB
whichC
whomD
who
考题
单选题You work as a database administrator for Certkiller .com. In your organization, you have four databases, Certkiller DB01, Certkiller DB02, Certkiller DB03, and Certkiller DB04, which are located in Berlin, Frankfurt,Rammstein, and Munich respectively, and which were created using Database Configuration Assistant (DBCA). You want to perform administrative tasks on these databases that include startup and shutdown, taking regular backups, and so on, fromFrankfurtusing Oracle tools. Which Oracle file would you enable to perform this task?()A
Control fileB
Password fileC
Parameter fileD
Online redo log fileE
Listener controller fileF
Server parameter file
考题
单选题You have an Exchange Server 2010 organization that contains 20 Mailbox servers.You plan to create 10 mailbox databases on each Mailbox server. You need to create a naming convention for all mailbox databases. What should you include in your naming convention()?A
For each mailbox database, provide a database name that is unique within the organization.B
For each mailbox database, provide a database name that is unique within the Mailbox server.C
For each mailbox database file, provide a file name that is unique within the organization.D
For each mailbox database file, provide a file name that is unique within the Mailbox server.
考题
单选题You work as the Exchange administrator at Company.com.The Company.com network contains an Exchange Server 2010 Organization.The organization contains the subsequent servers: the Company.com organization contains one mailbox database as well as one public folder database.You receive an instruction from the cio to ensure that in the event of -ex03 failure the public folders will remain available.What should you do?()A
You should consider creating a database availability group (DAG). Thereafter -ex03 and mbx2 should be added to the dag.B
You should consider creating a public folder database on -ex04.Thereafter the replication settings should be changed on every public folder.C
You should consider creating a public folder database on -ex04.Thereafter the replication settings should be changed on the public folder database.D
You should consider creating a Failover Cluster.Thereafter -ex03 and -ex04 should be added to the failover cluster.
考题
单选题You are the Database Administrator for WonderWeb, which has recently acquired a media company TXGlobal. You have been assigned the task to migrate all the database applications of TXGlobal to the database server of WonderWeb. To accommodate more database applications, you need to add disks to the existing disk group. Whenever you add or remove disks from the disk group, Automatic Storage Management (ASM) rebalancing distributes the data evenly across all the disks of the disk group. Which background process performs this actual rebalancing activity, resulting in the movement of data extents in the disk groups?()A
ASMBB
ARBnC
RBAL in the ASM instanceD
RBAL in the database instance
热门标签
最新试卷