单选题You are a Database Administrator with TXGlobal. You use a password file to establish remote connections to the HR database on the server located at the home office. Currently, two active remote sessions exist to this database. These sessions were established using the SYSDBA privilege from the remote machines. You accidentally deleted the password file. What will be the consequence of this action?()A Both the sessions will be killed, and no new sessions will be created using the SYSDBA or SYSOPER privilege.B Both the sessions will remain active, but no new sessions will be created using the SYSDBA or SYSOPER privilege.CBoth the sessions will be killed, but new sessions will be created using the SYSDBA or SYSOPER privilege when the database restarts.D The database will crash, and no new sessions will be created using the SYSDBA or SYSOPER privilege when the database restarts.

单选题
You are a Database Administrator with TXGlobal. You use a password file to establish remote connections to the HR database on the server located at the home office. Currently, two active remote sessions exist to this database. These sessions were established using the SYSDBA privilege from the remote machines. You accidentally deleted the password file. What will be the consequence of this action?()
A

 Both the sessions will be killed, and no new sessions will be created using the SYSDBA or SYSOPER privilege.

B

 Both the sessions will remain active, but no new sessions will be created using the SYSDBA or SYSOPER privilege.

C

Both the sessions will be killed, but new sessions will be created using the SYSDBA or SYSOPER privilege when the database restarts.

D

 The database will crash, and no new sessions will be created using the SYSDBA or SYSOPER privilege when the database restarts.


参考解析

解析: 暂无解析

相关考题:

You are the administrator of a SQL Server computer. Users report that the database times out when they attempt to modify data. You use the Current Activity window to examine locks held in the database as shown in the following screenshot.You need to discover why users cannot modify data in the database, but you do not want to disrupt normal database activities. What should you do?A.Use the spid 52 icon in the Current Activity window to discover which SQL statement is being executedB.Use the sp_who stored procedure to discover who is logged in as spid 52C.Use SQL Profiler to capture the activity of the user who is logged in as spid 52D.Use System Monitor to log the locks that are granted in the database

You work as a database administrator for Supportcenter.cn. You have been asked to use a centralized administrative tool to administer your database servers and application servers. In order to achieve the objective, which component would you configure on each database server?()A、Database ControlB、Management ServerC、Management RepositoryD、Application Server ControlE、Oracle Management Agent

You work as a database administrator for Certkiller .com. You have set the retention period for Automatic Repository (AWR) statistics to four days and collection interval to 15 minutes. You want to view the statistics collected and stored in AWR snapshot. Which two methods would you use to view the AWR statistics?()A、use enterprise managerB、use DBMS_SQL packageC、use DBMS_AWR packageD、use PRVT_WORKLOAD packageE、query the AWR snapshot repository objectsF、use DBMS_WORKLOAD_REPOSITORY package

You work as a database administrator for Supportcenter.cn. One of the database users accidentally deleted all the rows of a critical table and committed the delete at 1:30 p.m. You senior database administrator, SupportCenter, asks you to retrieve the lost data. Which two actions would you use to ensure that there is no impact on other connected users while retrieving the deleted rows?()A、Use a flashback query to retrieve the rows that were deletedB、Useconventialincremental export and then import the affected objectC、Shutdown the database inNORMALmode and restart the database instanceD、Use DBMS_META package to reconstruct the object using undo segmentsE、UseTablespacePoint in Time Recovery (TSPITR) method to recover the table and the dataF、Use Oracle DataPumptwithflashback_timeoption toentableflashback export and then import the affected object.

You are the Database Administrator for WonderWeb, which has recently acquired a media company TXGlobal. You have been assigned the task to migrate all the database applications of TXGlobal to the database server of WonderWeb. To accommodate more database applications, you need to add disks to the existing disk group. Whenever you add or remove disks from the disk group, Automatic Storage Management (ASM) rebalancing distributes the data evenly across all the disks of the disk group. Which background process performs this actual rebalancing activity, resulting in the movement of data extents in the disk groups?()  A、 ASMBB、 ARBnC、 RBAL in the ASM instanceD、 RBAL in the database instance

You have lost all your database control files. To recover them, you are going to use the results of the alter database backup controlfile to trace command. Your datafiles and your online redo logs are all intact.  Which of the following is true regarding your recovery?()  A、 You will need to open the database with the resetlogs command.B、 All you need to do is execute the trace file from SQL*Plus and it will perform the recovery for you.C、 You will use the resetlogs version of the create controlfile command.D、 You will use the noresetlogs version of the create controlfile command.E、 You will use the trace file to create a backup control file, and then you will recover the database with the recover database using backup controlfile command

You are a database administrator for your company. The company’s financial forecasting application uses a SQL Server 2005 database that enables business users to run both ad hoc and predefined queries. You suspect that some queries consume an excessive amount of server resources. You need to identify which queries consume the most resources. You want to achieve this goal as quickly as possible. What should you do?()A、Use the DBCC INPUTBUFFER command.B、Use the sys.dm_exec_query_stats dynamic management view (DMV).C、Use the sqldiag utility.D、Use the SHOWPLAN session option.

You work in a company which uses SQL Server 2008. You are the administrator of the company database. Now you are in charge of a SQL Server 2008 instance which is named Instance01. Instance01 contains a database which is named Dworks. The bulk-logged recovery mode is used by the Dworks database. You log ship the Dworks database through a WAN link. A scheduled job rebuilds the indexes of the Dworks database. You find that the size of the log backups for log shipping has been enlarged by the job. Now you have to reduce the size of the log backup.  So what action should you perform to achieve this goal?()  A、You should recreate the indexes. B、You should compress the log file backups C、You should make the Dworks database use the Full recovery mode D、You should make the Dworks database use the Simple recovery mode.

You work in a company which uses SQL Server 2008. You are the administrator of the company database. Now you are in charge of a SQL Server 2008 instance. A user reports that when he runs a query, it takes a quite long time and it is still unfinished. As the IT support, you have to verify whether the query is blocked.  Which tool should you use? () A、You should use the Database Engine Tuning Advisor tool B、You should use the Windows System Monitor tool C、You should use the Job Activity Monitor tool in Microsoft SQL Server Management Studio D、You should use the Activity Monitor tool in Microsoft SQL Server Management Studio

You work in a company which uses SQL Server 2008. You are the administrator of the company database. Now you are in charge of two SQL Server 2008 instance. The two instances are respectively named InstanceA and InstanceB. There is a database named Dworks on InstanceA. You move the Dworks database to InstanceB. A user use a SQL Server login named Mary to access the database on InstanceA with the password "Tk@87#34". On InstanceB, you create the same SQL Server login. The user tries to use the SQL Server login Mark to access the Dworks database on InstanceB. But the user gets an error message, according to the indication of the message, the access to the Dworks database has been denied. You must make sure that the user can access the Dworks database on InstanceB successfully.  So on InstanceB, which Transact-SQL statements should you execute?()  A、USE AdventureWorks;ALTER USER Mary WITH LOGIN = Mary; B、USE AdventureWorks;ALTER LOGIN Mary ENABLE; C、USE AdventureWorks;ALTER LOGIN Mary WITH PASSWORD = "Tk@87#34" UNLOCK; D、USE AdventureWorks;ALTER LOGIN Mary WITH DEFAULT_DATABASE = AdventureWorks;

ou work in a company which uses SQL Server 2008. You are the administrator of the company database. Now you are in charge of a SQL Server 2008 instance. According to the company requirement, you intend to perform an installation of an instance of SQL Server Reporting Services (SSRS) to the same machine. Now your company CIO wants version histories of all deployed reports can be kept. As a technical support, what should you do to ensure this?()A、You should use the http.sys listener to install the SSRS instance. B、You should configure the SSRS database, make it use Native mode C、You should configure the SSRS database, make it use SharePoint integrated mode D、You should use the Internet Information Services default Web site to install the SSRS instance

You work in a company which is named Wiikigo Corp. The company uses SQL Server 2008. You are the administrator of the company database. Now you are in charge of a SQL Server 2008 instance. There is a database named DB1 in the instance. In the database, a small percentage of data is modified everyday. Ever day in the morning, you have to create a read-only copy of the database for reporting purposes and make sure that you use as little disk space as possible.  In the options below, which strategy should you use? () A、You should use database snapshots B、You should use database backup and restore C、You should use database backup and restore along with compression D、You should use schema-bound views in a read-only database. The database resides on the same instance.

You work in a company which is named Wiikigo Corp. The company uses SQL Server 2008. You are the administrator of the company database. Now you are in charge of a SQL Server 2008 instance. You configure the SQL Server instance to use the -T1222 and -T1204 trace flags during startup. You must make sure that your failure recovery plan performs backup of the use of the trace flags. So what action should you perform to achieve this goal? () A、You should backup the master databaseB、You should backup the default.trc fileC、You should backup the SQL Server registry hive.D、You should backup the resource database

You work in a company which is named Wiikigo Corp. The company uses SQL Server 2008. You are the administrator of the company database. Now you are in charge of a SQL Server 2008 instance.You must make sure that all SQL Server instances are consistently configured for naming conventions, security settings, force index creation and avoidance of data fragmentation. So what action should you perform to achieve this goal?()  A、You should use the Database Engine Tuning Advisor. B、In Microsoft SQL Server Management Studio, you should create a maintenance plan C、You should use the SQL Server Configuration Manager D、In Microsoft SQL Server Management Studio, you should create a policy

You work as the exchange administrator at TestKing.com. The TestKing.com network contains an Exchange Server 2010 Organization. TestKing.com has its headquarters in Stockholm where you are located.The TestKing.com network contains a database availability group (DAG). You receive an instruction fromthe management to devise a Mailbox database security solution for the organization. Management wantsthe read/write performance to be maximized as well as ensuring that any access to the database isprohibited in the event of theft. What should you do?()A、You should recommend that management make use of DAG network encryption.B、You should recommend that management make use of Encrypted File System (EFS)C、You should recommend that management make use of Windows BitLocker Drive Encryption.D、You should recommend that management make use of Rights Management Service RMS.

You work in a company which uses SQL Server 2008. You are the administrator of the company database. Now you are in charge of a SQL Server 2008 instance. The instance contains a database named DB1. An application which is continuously connected uses DB1. The application extensively uses the INSERT command and triggers the population of multiple tables. Now you notice that the application has a poor performance. You doubt that this problem has something to do with blocking. You have to monitor the state of the instance at regular intervals while not affecting the application performance further.  Which tool should you use? () A、You should use Dynamic Management Views B、You should use SQL Server Resource Governor C、You should use SQL Server Profiler D、You should use Windows System Monitor

You work in a company which is named Wiikigo Corp. The company uses SQL Server 2008. You are the administrator of the company database. Now you are in charge of a SQL Server 2008 instance. Today you notice that applications that run on the server have poor performances. You doubt that this has something to do with table scans. You have to capture the appropriate information by using an appropriate Windows System Monitor object. In the options below, which performance object should you use? () A、You should use SQLServer:Buffer ManagerB、You should use SQLServer:Memory Manager C、You should use SQLServer:Databases D、You should use SQLServer:Access Methods

You work in a company which uses SQL Server 2008. You are the administrator of the company database. Now you are in charge of a SQL Server 2008 instance. There is a n On-Line Analytical Processing (OLAP) database named in the instance. The database contains a dimension table named Clients. Ever hour backup of data of the Clients table is performed. But the Clinets table contains redundant data. You must keep the disk space used to store the Clients table.  In the options below, which compression technology should you use?()A、You should use row compression B、You should use page compression C、You should use backup compression D、You should use windows NTFS file system compression

单选题You are a database administrator for your company. The company uses a SQL Server 2005 computer that runs Reporting Services. Reporting Services is used to produce hundreds of reports each day. You discover that the ReportServerTempDB database is growing. You need to minimize the size of the ReportServerTempDB database. What should you do?()ADecrease the time between transaction log backups of the database.BDelete report snapshot history each week.CMinimize the use of session caching in the reports.DMinimize the use of report snapshots in the reports.

单选题You work as a database administrator for Supportcenter.cn. You have been asked to use a centralized administrative tool to administer your database servers and application servers. In order to achieve the objective, which component would you configure on each database server?()ADatabase ControlBManagement ServerCManagement RepositoryDApplication Server ControlEOracle Management Agent

单选题You work in a company which uses SQL Server 2008. You are the administrator of the company database. Now you are in charge of a SQL Server 2008 instance. There is a n On-Line Analytical Processing (OLAP) database named in the instance. The database contains a dimension table named Clients. Ever hour backup of data of the Clients table is performed. But the Clinets table contains redundant data. You must keep the disk space used to store the Clients table.  In the options below, which compression technology should you use?()AYou should use row compression BYou should use page compression CYou should use backup compression DYou should use windows NTFS file system compression

单选题You work in a company which uses SQL Server 2008. You are the administrator of the company database. Now you are in charge of a SQL Server 2008 instance. The instance contains a database named DB1. An application which is continuously connected uses DB1. The application extensively uses the INSERT command and triggers the population of multiple tables. Now you notice that the application has a poor performance. You doubt that this problem has something to do with blocking. You have to monitor the state of the instance at regular intervals while not affecting the application performance further.  Which tool should you use? ()AYou should use Dynamic Management Views BYou should use SQL Server Resource Governor CYou should use SQL Server Profiler DYou should use Windows System Monitor

单选题You work in a company which uses SQL Server 2008. You are the administrator of the company database. Now you are in charge of a SQL Server 2008 instance. A user reports that when he runs a query, it takes a quite long time and it is still unfinished. As the IT support, you have to verify whether the query is blocked.  Which tool should you use? ()AYou should use the Database Engine Tuning Advisor tool BYou should use the Windows System Monitor tool CYou should use the Job Activity Monitor tool in Microsoft SQL Server Management Studio DYou should use the Activity Monitor tool in Microsoft SQL Server Management Studio

单选题You work in a company which is named Wiikigo Corp. The company uses SQL Server 2008. You are the administrator of the company database. Now you are in charge of a SQL Server 2008 instance. There is a database named DB1 in the instance. In the database, a small percentage of data is modified everyday. Ever day in the morning, you have to create a read-only copy of the database for reporting purposes and make sure that you use as little disk space as possible.  In the options below, which strategy should you use? ()AYou should use database snapshots BYou should use database backup and restore CYou should use database backup and restore along with compression DYou should use schema-bound views in a read-only database. The database resides on the same instance.

单选题You work in a company which uses SQL Server 2008. You are the administrator of the company database. Now you are in charge of a SQL Server 2008 instance. There is a database named DB1 in the instance. When you are absent, a user will use a login named Mary to log in and maintain the database snapshots. The user has to delete the database snapshots for DB1, so you have to give the appropriate permissions to the user.  So which database permission should you give the user?()ADELETE BCONTROL CDROP DATABASE DALTER ANY DATASPACE

单选题You are a database administrator for your company. You are responsible for a SQL Server 2005 database that has several indexes. You need to write a stored procedure that checks the indexes for fragmentation. Which Transact-SQL statement should you use?()ADBCC DBREINDEXBSELECT * FROM sys.dm_db_index_physical_statsCDBCC INDEXDEFRAGDSELECT * FROM sys.indexes

单选题You are the Database Administrator for WonderWeb, which has recently acquired a media company TXGlobal. You have been assigned the task to migrate all the database applications of TXGlobal to the database server of WonderWeb. To accommodate more database applications, you need to add disks to the existing disk group. Whenever you add or remove disks from the disk group, Automatic Storage Management (ASM) rebalancing distributes the data evenly across all the disks of the disk group. Which background process performs this actual rebalancing activity, resulting in the movement of data extents in the disk groups?()A ASMBB ARBnC RBAL in the ASM instanceD RBAL in the database instance