单选题Your data recovery strategy must meet the following requirements: Back up all data files and folders in C:///Data. Restore individual files and folders in C:///Data. Ensure that data is backed up to and restored from external media. What should you do?()AUse the Previous Versions feature to restore the files and folders.BUse the System Restore feature to perform backup and restore operations.CUse the NTBackup utility to back up and restore individual files and folders.DUse the Backup and Restore Center to back up and restore files.
单选题
Your data recovery strategy must meet the following requirements: Back up all data files and folders in C:///Data. Restore individual files and folders in C:///Data. Ensure that data is backed up to and restored from external media. What should you do?()
A
Use the Previous Versions feature to restore the files and folders.
B
Use the System Restore feature to perform backup and restore operations.
C
Use the NTBackup utility to back up and restore individual files and folders.
D
Use the Backup and Restore Center to back up and restore files.
参考解析
解析:
暂无解析
相关考题:
An administrator is creating a redundant environment for a current data center. A backup site must be available if the entire data center site should become unavailable. To reduce costs, this backup site does not need to be up and running at all times ready for failover. It must contain equipment and the ability to restore data from the data center.Which of the following site types should be considered to meet these requirements?()A. Hot siteB. Warm siteC. Cold siteD. Active failover site
Your data recovery strategy must meet the following requirements:·Back up all data files and folders in C:\Data.·Restore individual files and folders in C:\Data.·Ensure that data is backed up to and restored from external media.What should you do?()A.AB.BC.CD.D
Which of the following must be done to properly conduct testing of the data backup portion of a disaster recovery plan?()A、 Perform an integrity test of backup media.B、 Verify data on backup media can be read.C、 Verify that backups have occurred and were successful via the logs.D、 Restore backed up data to a test server.
An administrator is creating a redundant environment for a current data center. A backup site must be available if the entire data center site should become unavailable. To reduce costs, this backup site does not need to be up and running at all times ready for failover. It must contain equipment and the ability to restore data from the data center. Which of the following site types should be considered to meet these requirements? ()A、 Hot siteB、 Warm siteC、 Cold siteD、 Active failover site
A company has just implemented a disaster recovery plan in which critical business must be restored in a four hour window. Which of the following methods should be used to backup theservers?()A、Incremental backupB、Data only backupsC、SAN replicationD、Full backup
Which of the following statements is true regarding implementing a Flashback Table recovery? ()A、 An SCN is never used to perform a Flashback Table recovery.B、 If a significant number of changes have been made to the table, row movement must be enabled.C、 The tablespace must be offline before performing a Flashback Table recovery.D、 Flashback Table recovery is completely dependent on the availability of undo data in the undo tablespace.
You are performing a block media recovery on the tools01.dbf data file in the SALES database by using RMAN. Which two statements are correct in this scenario?()A、You must ensure that the SALES database is mounted or open.B、You must restore a backup control file to perform a block media recovery.C、You must take the tools01.dbf data file offline before you start a block media recovery.D、You must put the database in NOARCHIVELOG mode to perform a block media recovery.E、You can perform only a complete media recovery of individual blocks; point-in-time recovery of individual data blocks is not supported.
You need to recommend a backup strategy for the servers in the San Francisco office. The strategy must meet the company's technical requirements What should you include in the recommendation?()A、native-boot virtual hard disks (VHDs)B、Microsoft System Center Data Protection Manager 2010C、system restore pointsD、Windows Server Backup
Your data recovery strategy must meet the following requirements: Back up all data files and folders in C:///Data. Restore individual files and folders in C:///Data. Ensure that data is backed up to and restored from external media. What should you do?()A、Use the Previous Versions feature to restore the files and folders.B、Use the System Restore feature to perform backup and restore operations.C、Use the NTBackup utility to back up and restore individual files and folders.D、Use the Backup and Restore Center to back up and restore files.
You need to design a strategy to move confidential data from research users’ client computers to ATLFP2. Your solution must meet the business requirements. What should you instruct the research users to do?()A、Move the encrypted data to a folder on ATLFP2 over an IPSec connectionB、Move the encrypted data to an Encrypting File System (EFS) folder on ATLFP2 over an IPSec connectionC、Move the encrypted data to a new server that is not a member of the domain, and then move it to ATLFP2D、Move the encrypted data to a compressed folder on ATLFP2 by using Web Distributed Authoring and Versioning (WebDAV) over SSL
Your network is configured as shown in the following diagram. Each office contains a server that has the File Services server role installed. The servers have a shared folder named Resources. You need to plan the data availability of the Resources folder. Your plan must meet the following requirements: èIf a WAN link fails,the files in the Resources folder must be available in all of the offices. èIf a single server fails, the files in the Resources folder must be available in each of the branch offices,and the users must be able to use existing drive mappings. èYour plan must minimize network traffic over the WAN links. What should you include in your plan?()A、a stand-alone DFS namespace that uses DFS Replication in a full mesh topologyB、a domain-based DFS namespace that uses DFS Replication in a full mesh topologyC、a stand-alone DFS namespace that uses DFS Replication in a hub and spoke topologyD、a domain-based DFS namespace that uses DFS Replication in a hub and spoke topology
单选题Which of the following statements is true regarding implementing a Flashback Table recovery? ()A An SCN is never used to perform a Flashback Table recovery.B If a significant number of changes have been made to the table, row movement must be enabled.C The tablespace must be offline before performing a Flashback Table recovery.D Flashback Table recovery is completely dependent on the availability of undo data in the undo tablespace.
单选题Which of the following must be done to properly conduct testing of the data backup portion of a disaster recovery plan?()A Perform an integrity test of backup media.B Verify data on backup media can be read.C Verify that backups have occurred and were successful via the logs.D Restore backed up data to a test server.
单选题Your network consists of a single Active Directory domain. The network contains 20 file servers that run Windows Server 2008 R2. Each file server contains two volumes. One volume contains the operating system. The other volume contains all data files. You need to plan a recovery strategy that meets the following requirements: èAllows the operating system to be restored èAllows the data files to be restored èEnsures business continuity èMinimizes the amount of time to restore the server What should you include in your plan?()AWindows Deployment Services (WDS)BWindows Automated Installation Kit (Windows AIK) and folder redirectionCthe Multipath I/O feature and Volume Shadow CopiesDthe Windows Server Backup feature and System Image Recovery
单选题Which options must you configure while performing an automated Tablespace Point-in-Time Recovery (TSPITR) by using Recovery Manager (RMAN)?()ANew channels for restore and recovery tasksBNew name for the data files of the tablespaceCAuxiliary name for the data files of the tablespaceDAuxiliary destinations for an auxiliary set of data files
单选题In Recovery Manager (RMAN), you are taking image copies of the data files of your production database and rolling them forward at regular intervals. You attempt to restart your database. After a regular maintenance task, you realize that one of the data files that belongs to the USERS tablespace is damaged and you need to recover the data file by using the image copy. Because a media failure caused the data file to be damaged, you want to place the d ata file in a different location while restoring the file. Which option must you consider for this task?()Ausing only the RMAN SWITCH command to set the new location for the data fileBplacing the database in the MOUNT state for the restore and recovery operations.Cusing an RMAN RUN block with the SET NEWNAME and then the SWITCH command.Dconfiguring two channels: one for the restore operation and the other for the recovery operation
单选题Your company has Windows Server 2008 R2 file servers. You need to recommend a data recovery strategy that meets the following requirements: èBackups must have a minimal impact on performance. èAll data volumes on the file server must be backed up daily. èIf a disk fails, the recovery strategy must allow individual files to be restored. èUsers must be able to retrieve previous versions of files without the intervention of an administrator. What should you recommend?()ADeploy File Server Resource Manger (FSRM). Use Windows Server Backup to perform a daily backup to an external disk.BDeploy Windows Automated Installation Kit (Windows AIK). Enable shadow copies for the volumes that contain shared user data. Store the shadow copies on a separate physical disk.CUse Windows Server Backup to perform a daily backup to an external disk. Enable shadow copies for the volumes that contain shared user data. Store the shadow copies on a separate physical disk.DUse Windows Server Backup to perform a daily backup to a remote network share. Enable shadow copies for the volumes that contain shared user data. Store the shadow copies in the default location.
多选题Which two features of RMAN would must likely influence your decision to incorporate RMAN into your backup and recover strategy, if your most important requirement is to reduce the time ofrecovery?()ARMAN’s powerful command language.BRMAN backups can be parallelized.CRMAN allows for incremental block-level backups.DRMAN backup, restore, and recovery scripts can be stored.
单选题Your network contains Microsoft System Center Virtual Machine Manager and 10 Hyper-V hosts. You plan to convert all of the domain controllers to virtual machines (VMs). You need to recommend a recovery solution for the domain controllers. The solution must meet the following requirements: - Prevent inconsistencies in the Active Directory database. - Provide for the recovery of accidentally deleted Active Directory objects. - Provide for recovery if an administrator incorrectly modifies system settings. What should you include in the recommendation?()AVM snapshotsBa VM checkpointCWindows Server Backup from within the VMsDWindows Server Backup from the Hyper-V hosts
单选题While working on the database, you receive the following error: 01578: ORACLE data block corrupted (file# 6, block # 54) ORA-01110 : data file 6: ’u01/oracle/oradata/data1.dbf’ You decide to recover the corrupted data block by using the Block Media Recovery feature. Which option is NOT a disadvantage of using block media recovery?()A Block Media Recovery must be used with RMAN.B You must perform complete recovery of individual blocks.C You must have a full RMAN backup, not an incremental backup.D You must use the DBVERIFY utility before using the Block Media Recovery feature.
单选题In your production database, users report that they are unable to generate reports on an important table because it does not contain any data. While investigating the reason, you realize that another user executed the TRUNCATE TABLE command, which accidentally caused the data to be lost. Now you want to recover the lost data of the table without affecting objects in other schemas. Which method must you use to recover the lost data?()AComplete Recovery with online redo logBComplete Recovery with archived redo logCTablespace Point-in-Time Recovery (TSPITR)DIncomplete Recovery with system change number (SCN)
单选题In your production database, users report that they are unable to generate reports on an important table because it does not contain any data. While investigating the reason, you realize that another user executed the TRUNCATE TABLE command, which accidentally caused the data to be lost. Now you want to recover the lost data of the table without affecting objects in other schemas. Which method must you use to recover the lost data?()A Complete Recovery with online redo logB Complete Recovery with archived redo logC Tablespace Point-in-Time Recovery (TSPITR)D Incomplete Recovery with system change number (SCN)
单选题In Recovery Manager (RMAN), you are taking image copies of the data files of your production database and rolling them forward at regular intervals. You attempt to restart your database. After a regular maintenance task, you realize that one of the data files that belongs to the USERS tablespace is damaged and you need to recover the data file by using the image copy. Because a media failure caused the data file to be damaged, you want to place the data file in a different location while restoring the file. Which option must you consider for this task?()Ausing only the RMAN SWITCH command to set the new location for the data fileBplacing the database in the MOUNT state for the restore and recovery operations.Cusing an RMAN RUN block with the SET NEWNAME and then the SWITCH command.Dconfiguring two channels: one for the restore operation and the other for the recovery operation
多选题You need to design Group Policy object (GPO) settings to support the use of the Encrypting File System (EFS). Your solution must meet business and security requirements. Which two actions should you perform?()ADesignate a data recovery agent and issue an EFS certificate to the data recovery agent. Export the private key and restrict access to the exported keyBMake the data recovery agent a local administrator on all client computersCRemove the default data recovery agent from the Default Domain Policy GPO. Then, include the new data recovery agent insteadDDelete the Default Domain Policy GPO. Configure a new GPO linked to the domain that does not specify a data recovery agent