单选题Which options must you configure while performing an automated Tablespace Point-in-Time Recovery (TSPITR) by using Recovery Manager (RMAN)?()A New channels for restore and recovery tasksB New name for the data files of the tablespaceC Auxiliary name for the data files of the tablespaceD Auxiliary destinations for an auxiliary set of data files
单选题
Which options must you configure while performing an automated Tablespace Point-in-Time Recovery (TSPITR) by using Recovery Manager (RMAN)?()
A
New channels for restore and recovery tasks
B
New name for the data files of the tablespace
C
Auxiliary name for the data files of the tablespace
D
Auxiliary destinations for an auxiliary set of data files
参考解析
解析:
暂无解析
相关考题:
Your corporate security policy requires that a user performing attacks must have limited network access and activities until an administrator can investigate.In the admin GUI, which sensor event policy action must you configure in "Configuration" >"Sensors" >"Sensor Event Policies" >[rule name] to accomplish this?()A. IgnoreB. Replace users roleC. Terminate user sessionD. Disable user account
Which statement is correct about defining an Infranet Enforcer for use as a RADIUS Client? () A. You do not need to configure a RADIUS client policy.B. You must know the exact model number of the Infranet Enforcer.C. You must specify the NACN password of the device in the RADIUS client policy.D. You do not need to designate a location group to which the Infranet Enforcer will belong.
Which statement is correct about defining an Infranet Enforcer for use as a RADIUS Client? ()A、You do not need to configure a RADIUS client policy.B、You must know the exact model number of the Infranet Enforcer.C、You must specify the NACN password of the device in the RADIUS client policy.D、You do not need to designate a location group to which the Infranet Enforcer will belong.
When you are performing media recover, and an archived log is lost or corrupt, which type of recover must you perform?()A、Until SCNB、Until timeC、Until cancelD、Recover using backup control file.
You have been tasked with installing two SRX 5600 platforms in a high-availability cluster. Which requirement must be met for a successful installation?()A、You must enable SPC detect within the configuration.B、You must enable active-active failover for redundancy.C、You must ensure all SPCs use the same slot placement.D、You must configure auto-negotiation on the control ports of both devices
You have been tasked with performing an update to the IDP attack database. Which three requirements areincluded as part of this task?()A、The IDP security package must be installed after it is downloaded.B、The device must be rebooted to complete the update.C、The device must be connected to a network.D、An IDP license must be installed on your device.E、You must be logged in as the root user
You noticed that the index tablespace in your database requires a recovery. However, instead of performing a media recovery, you decided to re-create the indexes in a new tablespace. Which two options would you use to reduce the time it takes to re-create the indexes?()A、 ONLINEB、 REVERSEC、 PARALLELD、 COMPRESSE、 NOLOGGINGF、 COMPUTE STATISTICS
You are maintaining your database in Oracle10g. While performing an incremental backup of the database, you want to back uponly those blocks that have changed since the last backup. Which file will you create to increase the performance of the backup operation while performing the incremental backup of the database?()A、 redo log filesB、 password fileC、 control fileD、 change tracking file
You are performing a database recovery because a user’s schema is dropped. While performing the recovery, you use the UNTIL SEQUENCE clause. Which type of database recovery are you performing?()A、 user managed complete recoveryB、 user managed incomplete recoveryC、 RMAN-based complete recoveryD、 RMAN-based incomplete recovery
You are performing a backup of your database across the network. While taking the backup, you want to save space on the storage media and reduce the network bandwidth. Which command will you issue to configure the required type of backup?()A、 CONFIGURE DEVICE TYPE TO sbt BACKUP TYPE TO BACKUPSET;B、 CONFIGURE DEVICE TYPE TO disk BACKUP TYPE TO COPY;C、 CONFIGURE DEVICE TYPE TO sbt BACKUP TYPE TO COMPRESSED BACKUPSET;D、 CONFIGURE DEVICE TYPE TO sbt BACKUP TYPE TO COMPRESSED COPY;
You work in a company which uses SQL Server 2008. You are the administrator of the company database. Now you are in charge of a SQL Server 2008 instance. You intend to configure FILESTREAM data, enabling FILESTREAM for file I/O streaming access and allowing remote client computers to have streaming access to FILESTREAM data. You must make sure that FILESTREAM data is enabled. In the options below, which service should you configure? () A、You should configure Distributed File SystemB、You should configure SQL ServerC、You should configure SQL Server Full TextD、You should configure SQL Server VSS Writer
You work as the enterprise exchange administrator at Xxx .Xxx is using Microsoft Exchange Server 2010 as their messaging solution.Which of the following options can be you in order to change the permissions settings for a public folder?()A、You must use the Active Directory Users and Computers.B、You must use the Microsoft Office Outlook.C、You must use the Mail Flow Troubleshooter.D、You must use the Exchange Server Jetstress 2010.
You work in a company which is named Wiikigo Corp. The company uses SQL Server 2008. You are the administrator of the company database. Now you are in charge of a SQL Server 2008 instance. Now your company CIO assigns a task to you. The company CIO wants you to configure FILESTREAM data and the two requirements below must be met: you must enable FILESTREAM for file I/O streaming access; remote client computers must be able to have streaming access to FILESTREAM data. You must make sure that FILESTREAM data is enabled. Which service should you configure? () A、You should configure SQL Server VSS Writer B、You should configure Distributed File System C、You should configure SQL Server D、You should configure SQL Server Full Text
单选题You are performing a backup of your database across the network. While taking the backup, you want to save space on the storage media and reduce the network bandwidth. Which command will you issue to configure the required type of backup?()A CONFIGURE DEVICE TYPE TO sbt BACKUP TYPE TO BACKUPSET;B CONFIGURE DEVICE TYPE TO disk BACKUP TYPE TO COPY;C CONFIGURE DEVICE TYPE TO sbt BACKUP TYPE TO COMPRESSED BACKUPSET;D CONFIGURE DEVICE TYPE TO sbt BACKUP TYPE TO COMPRESSED COPY;
单选题You work in a company which uses SQL Server 2008. You are the administrator of the company database. Now you are in charge of a SQL Server 2008 instance. You intend to configure FILESTREAM data, enabling FILESTREAM for file I/O streaming access and allowing remote client computers to have streaming access to FILESTREAM data. You must make sure that FILESTREAM data is enabled. In the options below, which service should you configure? ()AYou should configure Distributed File SystemBYou should configure SQL ServerCYou should configure SQL Server Full TextDYou should configure SQL Server VSS Writer
单选题You are performing a database recovery because a user’s schema is dropped. While performing the recovery, you use the UNTIL SEQUENCE clause. Which type of database recovery are you performing?()A user managed complete recoveryB user managed incomplete recoveryC RMAN-based complete recoveryD RMAN-based incomplete recovery
单选题You are the administrator of your company's network. A use named Michael has limited dexterity, which prevents him from using a standard keyboard to complete his daily computing tasks. You want to configure his Windows 2000 Professional computer to use the appropriate accessibility options. You logon to Michael’s computer by using Michael’s user account, which is a member of local users group. You configure the stickykeys, filterkeys and togglekeys options. You then log off. Michael logs on to the computer by using this user account. Michael is able to use the accessibility option that you have configured. However, when he returns from lunch, the accessibility options are automatically turned off. What should you do? ()AUse Accessibility Options in Control Panel to reconfigure accessibility idle time settingsBUse Accessibility Options in Control Panel to enable the FilterKeys option to reconfigure the time settingCUse Utility Manager to configure the accessibility options to start automatically when Windows 2000 Professional loadsDUse Utility Manager to increase accessibility idle time setting for Michael’s accessibility options, and save the settings.
多选题You noticed that the index tablespace in your database requires a recovery. However, instead of performing a media recovery, you decided to re-create the indexes in a new tablespace. Which two options would you use to reduce the time it takes to re-create the indexes?()AONLINEBREVERSECPARALLELDCOMPRESSENOLOGGINGFCOMPUTE STATISTICS
单选题You are maintaining your database in Oracle10g. While performing an incremental backup of the database, you want to back uponly those blocks that have changed since the last backup. Which file will you create to increase the performance of the backup operation while performing the incremental backup of the database?()A redo log filesB password fileC control fileD change tracking file
单选题Which options must you configure while performing an automated Tablespace Point-in-Time Recovery (TSPITR) by using Recovery Manager (RMAN)?()ANew channels for restore and recovery tasksBNew name for the data files of the tablespaceCAuxiliary name for the data files of the tablespaceDAuxiliary destinations for an auxiliary set of data files
单选题Your corporate security policy requires that a user performing attacks must have limited network access and activities until an administrator can investigate.In the admin GUI, which sensor event policy action must you configure in "Configuration" "Sensors" "Sensor Event Policies" [rule name] to accomplish this?()AIgnoreBReplace users roleCTerminate user sessionDDisable user account
单选题You are working on a 24X7 database. You want to design a backup strategy for your database that uses user managed backups. You want to be able to perform all backups while the database remains online. Which statement about performing user-managed backups in a 24x7 environment is true?()AYou must have change tracking enabled in your databaseBYour database must be running in NOARCHIVELOG modeCTo back up a tablespace, it must be in backup modeDTo back up a tablespace, it must first be taken offline
单选题You work in a company which uses SQL Server 2008. You are the administrator of the company database. Now you are in charge of a SQL Server 2008 instance. Now according to the requirement of the company CIO, users on the SQL Server instance must be able to use the OPENROWSET() function to query remote data source. In the options below, which sp_configure configuration option should you configure?AAgent XPs Bremote access Cremote proc trans DAd Hoc Distributed Queries
单选题You are working on a 24X7 database. You want to design a backup strategy for your database that uses user managed backups. You want to be able to perform all backups while the database remains online. Which statement about performing user-managed backups in a 24x7 environment is true?()A You must have change tracking enabled in your databaseB Your database must be running in NOARCHIVELOG modeC To back up a tablespace,it must be in backup modeD To back up a tablespace,it must first be taken offline
多选题Which two statements about the use of SCREEN options are correct? ()(Choose two.)ASCREEN options offer protection against various attacksBSCREEN options are deployed prior to route and policy processing in first path packet processingCSCREEN options are deployed at the ingress and egress sides of a packet flowDSCREEN options, you must take special care to protect OSPF
单选题You work in a company which is named Wiikigo Corp. The company uses SQL Server 2008. You are the administrator of the company database. Now you are in charge of a SQL Server 2008 instance. Now your company CIO assigns a task to you. The company CIO wants you to configure FILESTREAM data and the two requirements below must be met: you must enable FILESTREAM for file I/O streaming access; remote client computers must be able to have streaming access to FILESTREAM data. You must make sure that FILESTREAM data is enabled. Which service should you configure? ()AYou should configure SQL Server VSS Writer BYou should configure Distributed File System CYou should configure SQL Server DYou should configure SQL Server Full Text
单选题Where do you configure SCREEN options?()Azones on which an attack might arriveBzones you want to protect from attackCinterfaces on which an attack might arriveDinterfaces you want to protect from attack