单选题The staff is not able to access a database server.  The server has an ’Operating System not found’error and is set to boot from a fiber channel SAN. All other database servers are set to boot from the SAN and access the same switch and data as this database server. Which of the following is the MOST likely cause of the problem?()AThe SAN is offlineBFiber channel switchCMultiple failed drives in the SANDHBA

单选题
The staff is not able to access a database server.  The server has an ’Operating System not found’error and is set to boot from a fiber channel SAN. All other database servers are set to boot from the SAN and access the same switch and data as this database server. Which of the following is the MOST likely cause of the problem?()
A

The SAN is offline

B

Fiber channel switch

C

Multiple failed drives in the SAN

D

HBA


参考解析

解析: 暂无解析

相关考题:

Your database instance is running.You are not able to access Oracle Enterprise Manager Database Control because the listener is not started.Which tool or utility would you use to start the listener?() A. Oracle Net ManagerB. Listener Control utilityC. Database Configuration AssistantD. Oracle Net Configuration Assistant

You are the administrator of two SQL Server 2000 computers. One of these servers contains a 4-GB database named marketing. You want to remove the marketing database from one server and add it to the other as quickly as possible.What should you do?A.Detach the database from the original server by using the sp_detach_db stored procedure. Copy the database and the transaction log files to the new server, and attach them by using the sp_attach_db stored procedure.B.Use the DTS export wizard to transfer all database objects from the original server to the new server. Drop the database from the original server.C.Run a full backup of the database on the original server. Create a new database named marketing on the new server. Restore the backup in the new marketing database. Drop the database from the original server.D.Shut down the original server. Copy the database and the transaction log files to the new server. Use the DISK INIT and DISK REFIT statements to attach the data file to the new server. Drop the database from the original server.

Which of the following is the MOST effective method to restrict staff members from accessing a service on a company server?() A. Implement ACLs.B. Disable accounts for staff members who do not require server access.C. Implement anti-spam software on the server.D. Implement anti-virus software on the server.

Which of the following statements allows BOB to revoke access to the SAMPLE database from user TOM?() A.REVOKE ACCESS ON DATABASE FROM USER bobB.REVOKE CONNECT ON DATABASE FROM USER tomC.REVOKE tom FROM ACCESS ON DATABASE BY USER bobD.REVOKE tom FROM CONNECT ON DATABASE BY USER bob

The company requires that every staff member ___________ able to use a computer.A.isB.will beC.would beD.be

The database instance has the following parameter setting: OS_AUTHENT_PREFIX = OPS$ OS_ROLES = FALSE  REMOTE_OS_AUTHENT = FALSE REMOTE_OS_ROLES = FALSE TIMED_OS_STATISTICS = 0  You have a local operating system user SKD. You create a database user OPS$SKD, and then  assignexternal authentication. The user OPS$SKD has the CREATE SESSION privilege.  What would youachieve by the above process()A、The database user OPS$SKD will be able to administer the database.B、The authentication detail for the database user OPS$SKD is recorded in the password file.C、The local operating system user SKD will be able to access the database instance without specifying the username and password.D、The database user OPS$SKD has to login with the password of the local operating system user SKD to access the database instance.

The staff is not able to access a database server.  The server has an ’Operating System not found’error and is set to boot from a fiber channel SAN. All other database servers are set to boot from the SAN and access the same switch and data as this database server. Which of the following is the MOST likely cause of the problem?()A、The SAN is offlineB、Fiber channel switchC、Multiple failed drives in the SAND、HBA

Which of the following is the MOST effective method to restrict staff members from accessing a service on a company server?()A、 Implement ACLs.B、 Disable accounts for staff members who do not require server access.C、 Implement anti-spam software on the server.D、 Implement anti-virus software on the server.

A staff member reports that they cannot access the shared folder on the network; however, other staff members are reporting that they can access the shared folder. Which of the following is the BEST way to identify the problem?()A、The administrator should monitor all traffic between the staff member and the server.B、The administrator should reconfigure the RAID configuration to allow more space.C、The administrator should map a drive using the net use command.D、The administrator should allow the staff member to use a USB drive.

Which of the following statements allows BOB to revoke access to the SAMPLE database from user TOM?()A、REVOKE ACCESS ON DATABASE FROM USER bobB、REVOKE CONNECT ON DATABASE FROM USER tomC、REVOKE tom FROM ACCESS ON DATABASE BY USER bobD、REVOKE tom FROM CONNECT ON DATABASE BY USER bob

Your database instance is running. You are not able to access Oracle Enterprise Manager Database Control because the listener is not started.  Which tool or utility would you use to start the listener?()A、 Oracle Net ManagerB、 Listener Control utilityC、 Database Configuration AssistantD、 Oracle Net Configuration Assistant

You are designing a strategy to ensure that VPN users are able to access all internal resources.  What should you do?()A、 Specify a static routing table entry on VPN1 for the Dallas network.B、 Specify a static routing table entry on VPN1 for the Seattle network.C、 Implement Internet Authentication Service (IAS) on VPN1.D、 Define a User Class option for Routing  Remote Access Clients on the DHCP Server.

You are configuring a failover cluster for a database server. You are assigning four nodes to the cluster. Allnodes have access to a SAN,and adequate storage is available. Which of the following options should youchoose for your quorum configuration?()A、Node MajorityB、Node And Disk MajorityC、Node And File Share MajorityD、No Majority: Disk Only

You need to design the database permissions for access from the terminals to the database server. Which action or actions should you perform?()A、Create a database role named BankTerminals.B、Grant the BankTerminals role the Execute permission for the WoodgroveBanking database.C、Grant database access to the Windows Bank Terminals group, and add the group to the BankTerminals role.D、Grant the BankTerminals role the Execute permission for the Bank schema.E、Grant the Windows Bank Terminals group the Execute permission for the Bank schema.F、Grant the BankTerminals role the Execute permission for all stored procedures and user-defined functions in the Bank schema.

多选题A Mysql instance is running on a dedicated server. Developers access the server from the same network subnet. Users access the database through an application that is running on a separate server in a DMZ. Which two will optimize the security of this setup?()ADisabling connections from named pipes or socket files (depending on the operating system of the server)BEnabling and using SSL for connections to the Mysql databaseCInstalling Mysql on the application server, and running the database and application on the same serverDStarting the server with – bind- address=0.0.0.0 specifiedERunning the server with – skip-networking specifiedFLimiting logins to originate from the application server or the server's subnet'

单选题You install Windows 2000 Professional on your portable computer. You create a new dial up connection to connect to your company’s remote access server. You connect to the remote access server by using the dial up connection. You can connect to the servers on the same segment as the remote access server. You cannot access the shared resources that are on the remote segments from the remote access server. What should you do? ()AConfigure the company remote access server to accept multilink connections.BConfigure the TCP/IP program for the dial up connection to disable IP header compression.CConfigure the TCP/IP properties for the dial up connection to use the default gateway on theremote network.DGrant your user account dial in permission on the company remote access server.

单选题The database instance has the following parameter setting: OS_AUTHENT_PREFIX = OPS$ OS_ROLES = FALSE REMOTE_OS_AUTHENT = FALSE REMOTE_OS_ROLES = FALSE TIMED_OS_STATISTICS = 0 You have a local operating system user SKD.You create a database user OPS$SKD, and then assign external authentication. The user OPS$SKD has theCREATE SESSION privilege.  What would you achieve by the above process()AThe database user OPS$SKD will be able to administer the database.BThe authentication detail for the database user OPS$SKD is recorded in the password file.CThe local operating system user SKD will be able to access the database instance without specifying theusername and password.DThe database user OPS$SKD has to login with the password of the local operating system user SKD toaccess the database instance.

单选题Your database instance is running. You are not able to access Oracle Enterprise Manager Database Control because the listener is not started.  Which tool or utility would you use to start the listener?()A Oracle Net ManagerB Listener Control utilityC Database Configuration AssistantD Oracle Net Configuration Assistant

多选题You need to design the database permissions for access from the terminals to the database server. Which action or actions should you perform?()ACreate a database role named BankTerminals.BGrant the BankTerminals role the Execute permission for the WoodgroveBanking database.CGrant database access to the Windows Bank Terminals group, and add the group to the BankTerminals role.DGrant the BankTerminals role the Execute permission for the Bank schema.EGrant the Windows Bank Terminals group the Execute permission for the Bank schema.FGrant the BankTerminals role the Execute permission for all stored procedures and user-defined functions in the Bank schema.

单选题Your database instance is running.You are not able to access Oracle Enterprise Manager Database Control because the listener is not started.Which tool or utility would you use to start the listener?()AOracle Net ManagerBListener Control utilityCDatabase Configuration AssistantDOracle Net Configuration Assistant

单选题You work as a database administrator for Certkiller .com. While loading data into the Certkiller STAFF table using Oracle Enterprise Manager 10g Database Control, you find the status of the job as failed. On further investigation, you find the following error message in the output log: ORA-01653 unable to extend table HR. Certkiller STAFF by 8 intablespaceUSERS Which task would you perform to load the data successfully without affecting the users who are accessing the table?()ARestart the database instance and run the jobBTruncate the Certkiller STAFF table and run the jobCDelete all rows from the Certkiller STAFF table and run the jobDIncrease the size of the USERStablespacethe and run the jobEIncrease the size of the database default permanenttablespaceand run the job

单选题You are configuring a failover cluster for a database server. You are assigning four nodes to the cluster. Allnodes have access to a SAN,and adequate storage is available. Which of the following options should youchoose for your quorum configuration?()ANode MajorityBNode And Disk MajorityCNode And File Share MajorityDNo Majority: Disk Only

单选题Which of the following is the MOST effective method to restrict staff members from accessing a service on a company server?()A Implement ACLs.B Disable accounts for staff members who do not require server access.C Implement anti-spam software on the server.D Implement anti-virus software on the server.

单选题In your Certkiller .com production database, you find that the database users are able to create and read files with unstructured data, available in any location on the host machine from an application.  You want to restrict the database users to access files in a specific location on the host machine.  What could do to achieve this?()AModify the value for the UTL_FILE_DIR parameter in the parameter fileBGrant read and write privilege on the operating system path to the database usersCModify the value for the LDAP_DIRECTORY_ACCESS parameter in the parameter fileDModify the value for the PLSQL_NATIVE_LIBRARY_DIR parameter in the parameter fileECreate a directory object referring to the operating system path, and grant read and write privilege on the directory object to the database users

单选题You use a Windows 2000 Professional desktop computer. The corporate product information is stored on this computer. You want other users on the network to be able to read the product information on your computer. You use Windows Explorer to share the product information folder on the network. You want Sales staff to be able to keep a copy of the product information on their portable computers when they travel. Other users should not be able to synchronize the product information.  What should you do?()AUse Synchronization manager to configure synchronization to occur when users are connected to the LAN connection.BUse Windows Explorer to grant Sales Staff Special access for the reports on the network share.CUse Windows Explorer to enable automatic caching for documents on the network share.DCreate a new share for the Sales users only and enable caching on that share only.

单选题you configure a new file server that runs windows server 2008. Users access shared files on the file server. Users report that they are unable to access the shared files.The TCP/IP properties for the file server are configured as shown in the following exhibit.You need to ensure that users are able to access the shared files. What should you do?()AConfigure a static IP address.BConfigure the default gateway.CConfigure the DNS server address.DAdd the domain to the DNS suffix on the network interface.

单选题The database instance has the following parameter setting: OS_AUTHENT_PREFIX = OPS$ OS_ROLES = FALSE  REMOTE_OS_AUTHENT = FALSE REMOTE_OS_ROLES = FALSE TIMED_OS_STATISTICS = 0  You have a local operating system user SKD. You create a database user OPS$SKD, and then  assignexternal authentication. The user OPS$SKD has the CREATE SESSION privilege.  What would youachieve by the above process()AThe database user OPS$SKD will be able to administer the database.BThe authentication detail for the database user OPS$SKD is recorded in the password file.CThe local operating system user SKD will be able to access the database instance without specifying the username and password.DThe database user OPS$SKD has to login with the password of the local operating system user SKD to access the database instance.

单选题A staff member reports that they cannot access the shared folder on the network; however, other staff members are reporting that they can access the shared folder. Which of the following is the BEST way to identify the problem?()AThe administrator should monitor all traffic between the staff member and the server.BThe administrator should reconfigure the RAID configuration to allow more space.CThe administrator should map a drive using the net use command.DThe administrator should allow the staff member to use a USB drive.