单选题You want to move all the objects of the APPS user in the test database to the DB_USER schema of the production database. Which option of IMPDP would you use to accomplish this task?()AFULLBSCHEMASCREMAP_SCHEMADREMAP_DATAFILESEREMAP_TABLESPACE
单选题
You want to move all the objects of the APPS user in the test database to the DB_USER schema of the production database. Which option of IMPDP would you use to accomplish this task?()
A
FULL
B
SCHEMAS
C
REMAP_SCHEMA
D
REMAP_DATAFILES
E
REMAP_TABLESPACE
参考解析
解析:
暂无解析
相关考题:
You executed the following command to drop a user:DROP USER scott CASCADE;Which two statements regarding the above command are correct?() A. All the objects of scott are moved to the Recycle Bin.B. Any objects in the Recycle Bin belonging to scott are purged.C. All the objects owned by scott are permanently dropped from the database.D. All the objects of scott in the Recycle Bin must be purged before executing the DROP command.E. Any objects in the Recycle Bin belonging to scott will not be affected by the above DROP command.
USER_DATA is a nonencrypted tablespace that contains a set of tables with data. You want to convert all existing data in the USER_DATA tablespace and the new data into the encrypted format.Which methodswould you use to achieve this?()A. Use Data Pump to transfer the existing data to a new encrypted tablespaceB. Use ALTER TABLE MOVE to transfer the existing data to a new encrypted tablespaceC. Use CREATE TABLE AS SELECT to transfer the existing data to a new encrypted tablespaceD. Enable row movement for each table to be encrypted and then use ALTER TABLESPACE to encrypt the tablespaceE. Encrypt the USER_DATA tablespace using the ALTER TABLESPACE statement so that all the data in the tablespace is automatically encrypted
You recently upgraded all Windows NT Workstation 4.0 computers to Windows 2000 Professional. You want to give a new employee named Maria the ability to back up files, share resources, and install programs on a client computer that she shares with other users. You do not want Maria to be able to read other users' files.What should you do to accomplish these goals? (Choose all that apply)A.Add Maria's user account to the System group.B.Add Maria's user account to the Interactive group.C.Add Maria's user account to the Power Users group.D.Add Maria's user account to the Administrators group.E.Add Maria's user account to the Backup Operators group.
You are configuring captive portal on your SRX Series device for guest user access.When would you use the redirect-traffic all command?() A. When you want all unauthenticated traffic to be redirectedB. When you want all clear text traffic to be redirected.C. When you want all authenticated traffic to be redirected.D. When you want all encrypted traffic to be redirected.
Your network contains a file server named Server1 that runs Windows Server 2003 Service Pack 2 (SP2).Server1 is configured as shown in the following table.A user named User1 belongs to the Helpdesk group and the Support group.You need to configure security to meet the following requirements:·Prevent User1 from changing files and folders in the Apps share.·Allow User1 to open and run applications in the Apps share.What should you do?()A. Onthe Apps share, assign User1 the Read share permission.B. On the Apps folder, deny User1 the Write NTFS permission.C. On the Apps folder, deny User1 the Modify NTFS permission.D. On the Apps folder, assign User1 the Read Execute NTFS permission.
You want to migrate your application from the development environment to the production environment. While doing the task, you want the database objects owned by the user DEVUSER in the development environment to be moved to the user APPS in the production environment. Which option of Oracle Data Pump Import would you use to achieve this objective?()A、ownerB、touserC、includeD、schemasE、fromuserF、transformG、remap_schemaH、remap_datafileI、reuse_datafilesJ、remap_tablespace
Because of a logical corruption in your production database, you wanted to perform Tablespace Point in Time Recovery (TSPITR). But before you start the recovery, you queried the TS_PITR_OBJECTS_TO_BE_DROPPED view and realized that there are a large number of objects that would be dropped when you start the recovery by using this method. You want to preserve these objects. Which option must you use to perform TSPITR and preserve the object?()A、Perform Export before TSPITR and Import after TSPITRB、Move objects to another schema that has the same tablespace assignedC、Perform Incomplete Recovery before TSPITR with the Log Sequence Number (LSN)D、Perform Incomplete Recovery before TSPITR with the System Change Number (SCN)
In which scenario will you use the Flashback Transaction Query feature?()A、 when you want to restore an important table that is dropped from the Recycle BinB、 when you want to obtain the SQL statements to undo the deletion of some important records from a table by a transactionC、when you want to restore a dropped user’s schemaD、 when a row of a table is updated many times within a specific time period and you want all the versions of the row in the specified time period
You want to move all the objects of the APPS user in the test database to the DB_USER schema of the production database. Which option of IMPDP would you use to accomplish this task?()A、FULLB、SCHEMASC、REMAP_SCHEMAD、REMAP_DATAFILESE、REMAP_TABLESPACE
You want to move all objects of the APPS user in the test database to the DB_USER schema of theproduction database. Which option of IMPDP would you use to accomplish this task()A、FULLB、SCHEMASC、TRANSFORMD、REMAP_SCHEMAE、REMAP_TABLESPACE
You are the network administrator for Blue Yonder Airlines. You plan to create an Active Directory domain named blueyonderairlines.com that will have a functional level of Windows Server 2003. Your company has one main office and four branch offices, which are all located in one country. A central security department in the main office is responsible for creating and administering all user accounts in all offices. Each office has a local help desk department that is responsible for resetting passwordswithin the individual department’s office only. All user accounts are located in the default Users container. You need to create an organizational unit (OU) structure to support the delegation of authority requirements. You want to minimize the amount of administrative effort required to maintain the environment. What should you do?()A、 Create a toplevel OU named BlueYonderAirlines_Users under the blueyonderairlines.com domain. Create a separate child OU for each office under BlueYonderAirlines_Users. Move the user accounts of all employees in each office to the child OU for that office.B、 Create a toplevel OU named Main_Office under the blueyonderairlines.com domain. Move the user accounts of all users in the main office to the Main_Office OU.Create a separate child OU for each branch office under the Main_Office OU. Move the user accounts of all users in each branch office to the child OU for that office.C、 Create a toplevel OU named BlueYonderAirlines_Users under the blueyonderairlines.com domain. Create a child OU named Central_Security under BlueYonderAirlines_Users. Move the user accounts of the central security department users to the Central_Security OU.Create a child OU named Help_Desk under BlueYonderAirlines_Users. Move the user accounts of the help desk users to the Help_Desk OU.D、 Create a toplevel OU named BlueYonderAirlines_Users under the blueyonderairlines.com domain. Create a child OU named Central_Security under BlueYonderAirlines_Users. Move the user accounts of the central security department users to the Central_Security OU.Create a separate child OU under BlueYonderAirlines_Users for each office. Move the user accounts of the help desk users in each office to the child OU for that office.
You want users to log on to Active Directory by using a new User Principal Name (UPN). You need to modify the UPN suffix for all user accounts. Which tool should you use()A、DsmodB、NetdomC、RedirusrD、Active Directory Domains and Trusts
You are a network administrator of an organization. Maria and John are your network assistant. You have grant then the rights to modify the user properties in the computer management. You want to audit the modification in user accounts. What should you do?()A、Turn on auditing for objects in the Local Security Policy and Select 'Process Tracking'.B、Turn on auditing for objects in the Local Security Policy and Select 'Object Access'. C、Use Windows Explorer to turn on auditing for the specific files.D、Have the administrator for domains log you on as an administrator and enable auditing for a specific file.E、Turn on auditing for objects in the Local Security Policy and Select 'Account Management'.F、Allow only one account at a time to log on to your shared folder. Check the event viewer to see who logged on.
You need to design an access control and permission strategy for user objects in Active Directory.What should you do?()A、Make the members of the AdvancedSupport security group members of the Domain Admins security groupB、Give each desktop support technician permission to reset passwords for the top-level OU that contains user accounts at their own locationC、Delegate full control over all OUs that contain user accounts to all AllSupport security groupD、Change the permissions on the domain object and its child objects so that the BasicSupport security group is denied permissions. Then, add a permission to each OU that contains user accounts that allows AllSupport security group members to reset passwords in that OU
Your company has a single Active Directory directory service domain that includes a main office and two branch offices. Each branch office has its own Active Directory site. All user accounts are placed into organizational units (OUs) based on department. Multiple Group Policy objects (GPOs) are linked at the domain, the site, and the OU levels. A user in Atlanta transfers to a different branch office and joins a different department. You move her user account into the corresponding OU. After logging on to her new client computer, the user notices that the desktop settings are different from the settings she had in her previous location. You need to find out the effect of all GPOs on the user. What should you do?()A、 Use the Security Configuration and Analysis snap-in.B、 Use the Resultant Set of Policy snap-in.C、 Run the Secedit /analyze command.D、 Run the Secedit /validate command.
You are the network administrator for your company. The network consists of a single Active Directory domain. User and group objects for the sales department are located in an organizational unit (OU) named Sales. Peter and Mary are administrators for your company. Peter is responsible for managing Sales user objects. Mary is responsible for managing Sales group objects. You need to delegate Peter and Mary control over only the objects for which they are responsible. What should you do?()A、 In the Sales OU, create two new OUs. Name one OU SalesUsers and place all user objects for the sales department in this OU. Name the other OU SalesGroups and place all group objects for the sales department in this OU. Grant Peter and Mary full control over the Sales OU.B、 On the Sales OU, grant Peter the right to manage user objects. On the Sales OU, grant Mary the right to manage group objects.C、 In the Sales OU, create a new OU. Name this OU SalesGroups. Place all Sales groups in theSalesGroups OU.Grant Peter the right to manage all objects in the Sales OU. Grant Mary the right to manage all objects in the SalesGroups OU.D、 On the Sales OU, deny Peter the right to manage group objects. On the Sales OU, deny Mary the right to manage user objects.
单选题You are configuring captive portal on your SRX Series device for guest user access.When would you use the redirect-traffic all command?()AWhen you want all unauthenticated traffic to be redirectedBWhen you want all clear text traffic to be redirected.CWhen you want all authenticated traffic to be redirected.DWhen you want all encrypted traffic to be redirected.
单选题What will be the result of using the SQL DROP USER SCOTT CASCADE; command?()A The user, Scott, is dropped, all the objects in Scott’s schema are placed in the Recycle Bin, and the objects that are already in the Recycle Bin are dropped.B The user, Scott, is dropped, all the objects in Scott’s schema are placed in the Recycle Bin, and all the objects in the Recycle Bin, belonging to the user Scott, are not dropped.C The user, Scott, is dropped, all the objects in the Scott’s schema are not placed in the Recycle Bin, and the objects in the Recycle Bin, belonging to the user, Scott, are not dropped.D The user, Scott, is dropped, all the objects in Scott’s schema are not placed in the Recycle Bin, and the objects in the Recycle Bin are dropped.
单选题You are the network administrator for Blue Yonder Airlines. You plan to create an Active Directory domain named blueyonderairlines.com that will have a functional level of Windows Server 2003. Your company has one main office and four branch offices, which are all located in one country. A central security department in the main office is responsible for creating and administering all user accounts in all offices. Each office has a local help desk department that is responsible for resetting passwordswithin the individual department’s office only. All user accounts are located in the default Users container. You need to create an organizational unit (OU) structure to support the delegation of authority requirements. You want to minimize the amount of administrative effort required to maintain the environment. What should you do?()A Create a toplevel OU named BlueYonderAirlines_Users under the blueyonderairlines.com domain. Create a separate child OU for each office under BlueYonderAirlines_Users. Move the user accounts of all employees in each office to the child OU for that office.B Create a toplevel OU named Main_Office under the blueyonderairlines.com domain. Move the user accounts of all users in the main office to the Main_Office OU.Create a separate child OU for each branch office under the Main_Office OU. Move the user accounts of all users in each branch office to the child OU for that office.C Create a toplevel OU named BlueYonderAirlines_Users under the blueyonderairlines.com domain. Create a child OU named Central_Security under BlueYonderAirlines_Users. Move the user accounts of the central security department users to the Central_Security OU.Create a child OU named Help_Desk under BlueYonderAirlines_Users. Move the user accounts of the help desk users to the Help_Desk OU.D Create a toplevel OU named BlueYonderAirlines_Users under the blueyonderairlines.com domain. Create a child OU named Central_Security under BlueYonderAirlines_Users. Move the user accounts of the central security department users to the Central_Security OU.Create a separate child OU under BlueYonderAirlines_Users for each office. Move the user accounts of the help desk users in each office to the child OU for that office.
单选题You want to move all objects of the APPS user in the test database to the DB_USER schema of the productiondatabase. Which option of IMPDP would you use to accomplish this task()AFULLBSCHEMASCTRANSFORMDREMAP_SCHEMAEREMAP_TABLESPACE
单选题You want users to log on to Active Directory by using a new Principal Name (UPN). You need to modify the UPN suffix for all user accounts. Which tool should you use()ADsmodBNetdomCRedirusrDActive Directory Domains and Trusts
多选题Your company has an Active Directory Domain Services (AD DS) domain. All servers run Windows Server 2008 R2. You use a virtual desktop infrastructure (VDI) environment to provide access to applications. All virtual desktop computer objects are located in an organizational unit (OU) named VirtualDesktops. All client computer objects are located in an OU named Desktops. You need to ensure that all existing users receive the same desktop shortcuts, and that they are not able to modify the shortcuts from virtual desktops. Which two actions should you perform?()ACreate a mandatory user profile.BCreate a new default user profile.CCreate a Group Policy object (GPO) that configures the user profile. Link the GPO to the Desktops OU.DCreate a Group Policy object (GPO) that configures the user profile. Link the GPO to the VirtualDesktops OU.
单选题Because of a logical corruption in your production database, you wanted to perform Tablespace Point in Time Recovery (TSPITR). But before you start the recovery,you queried the TS_PITR_OBJECTS_TO_BE_DROPPED view and realized that there are a large number of objects that would be dropped when you start the recovery by using this method. You want to preserve these objects. Which option must you use to perform TSPITR and preserve the object?()A Perform Export before TSPITR and Import after TSPITRB Move objects to another schema that has the same tablespace assignedC Perform Incomplete Recovery before TSPITR with the Log Sequence Number (LSN)D Perform Incomplete Recovery before TSPITR with the System Change Number (SCN)
单选题You want to migrate your application from the development environment to the production environment. While doing the task, you want the database objects owned by the user DEVUSER in the development environment to be moved to the user APPS in the production environment. Which option of Oracle Data Pump Import would you use to achieve this objective?()AownerBtouserCincludeDschemasEfromuserFtransformGremap_schemaHremap_datafileIreuse_datafilesJremap_tablespace
单选题In which scenario will you use the Flashback Transaction Query feature?()A when you want to restore an important table that is dropped from the Recycle BinB when you want to obtain the SQL statements to undo the deletion of some important records from a table by a transactionCwhen you want to restore a dropped user’s schemaD when a row of a table is updated many times within a specific time period and you want all the versions of the row in the specified time period
单选题You want to move all objects of the APPS user in the test database to the DB_USER schema of theproduction database. Which option of IMPDP would you use to accomplish this task()AFULLBSCHEMASCTRANSFORMDREMAP_SCHEMAEREMAP_TABLESPACE
多选题USER_DATA is a nonencrypted tablespace that contains a set of tables with data. You want to convert all existing data in the USER_DATA tablespace and the new data into the encrypted format. Which methodswould you use to achieve this?()AUse Data Pump to transfer the existing data to a new encrypted tablespaceBUse ALTER TABLE MOVE to transfer the existing data to a new encrypted tablespaceCUse CREATE TABLE AS SELECT to transfer the existing data to a new encrypted tablespaceDEnable row movement for each table to be encrypted and then use ALTER TABLESPACE to encrypt the tablespaceEEncrypt the USER_DATA tablespace using the ALTER TABLESPACE statement so that all the data in the tablespace is automatically encrypted