An administrator attends a management meeting to further explain a problem that occurred Several weeks ago. A quick review of existing log files reveals that all logs from that period are gone.  Which logfile may be reviewed for specific event detail at this late date?()A、 clcornd.logB、 clverify.logC、 clstrhist.logD、 cluster.mmddyyyy

An administrator attends a management meeting to further explain a problem that occurred Several weeks ago. A quick review of existing log files reveals that all logs from that period are gone.  Which logfile may be reviewed for specific event detail at this late date?()

  • A、 clcornd.log
  • B、 clverify.log
  • C、 clstrhist.log
  • D、 cluster.mmddyyyy

相关考题:

Examine the following scenario:The target database instance is running. The most recent backup available for the target database was taken two days ago. Log files switches have occurred in last two days. The target database is duplicated on the same host, using the Recovery Manager (RMAN) duplicate command as follows:Which statement is true about the duplicate database in this scenario?()A. It contains data till the last backupB. It contains all data from target database until the current timeC. It contains all data from only the committed transactions in the target databaseD. It contains all data except that which is used by the transactions in the current online redo file of target database

A System p administrator needs to document system changes that have occurred recently. The company has a policy of making all possible changes via the smit interface.  Which of the following files would show the commands that have been performed from within smit and their resulting output()A、/smit.logB、/smit.scriptC、/var/log/smit.logD、/.history

Redo log files are not multiplexed in your database. Redo log blocks are corrupted in group 2, and archiving has stopped. All the redo logs are filled and database activity is halted. Database writer has written everything to disk. Which command would you execute to proceed further?()A、RECOVER LOGFILE BLOCK GROUP 2;B、ALTER DATABASE DROP LOGFILE GROUP 2;C、ALTER DATABASE CLEAR LOGFILE GROUP 2;D、ALTER DATABASE RECOVER LOGFILE GROUP 2;E、ALTER DATABASE CLEAR UNARCHIVED LOGFILE GROUP 2;

An administrator has encountered a problem with a particular piece of software installed on the server and begins the troubleshooting process. Which of the following is the FIRST place the administrator should look for specific information about the problem?()A、The supporting documentationB、The vendor websiteC、The InternetD、The server event logs

An administrator migrates from AIX 5.3 to AIX 6.1. Upon completion, a client questions why files are missing from /tmp. How should the administrator respond to the client?()A、Explain that the files never existed in the first place.B、Explain that during a Migration install the /tmp filesystem is overwritten.C、Explain that after a Migration install, all system filesystems will be empty.D、Explain that /tmp is temporary storage and files are automatically removed every 30 days.

When you are allowing RMAN to backup your archived redo log files,how does RMAN know which archived redo logs to back up from your archive log destination?()A、RMAN keeps a list of archive logs in a text file.B、The DBA must manually tell RMAN which archive logs to backup.C、RMAN has access to target control file and/or catalog information.D、RMAN looks at the ARCHIVE_LOG_DEST parameter of your target database and backs up all archive logs found.

A media failure has occurred. This has resulted in all the members of the next hop log group being rendered inaccessible to the log writer process (LGWR) at a log switch. How does this failure affect the operational database?()A、 The database re-created the missing redo log files automatically.B、 The database continues to function normally with the existing files.C、 The database allows only queries, no other statements are allowed.D、 The database returns and error and the database instance shuts down.E、 The user sessions that generate redo logs are terminated automatically.

In which scenario will you perform a user-managed incomplete recovery?()A、 when a table is dropped and stored in the Recycle BinB、when a table is dropped and purged from the Recycle BinC、 when you are required to recover an existing table to its previous stateD、 when you are required to view all the versions of a row of an existing table between a specific time period

The loss of which two types of files may require a recovery with the RESETLOGS option?()A、 control filesB、 password fileC、 archived log filesD、 system-critical data files for which all the redo entries are presentE、 non-system-critical data files for which all the redo entries are present

Which statement is true about FLUSH LOGS command?()A、It requires the RELOAD, FILE, and DROP privilegesB、It closes and reopens all log filesC、It closes and sends binary log files to slave serversD、It flushes dirty pages in the buffer pool to the REDO logs

In which scenario is a Database Administrator NOT required to perform an incomplete recovery?()A、 when all the online redo log groups are multiplexed and one of the members of a group is missingB、 when all the online redo log groups are not multiplexed and one log group is missingC、 when all the control files are missingD、 when some important tables are deleted from the database and purged from the Recycle Bin

You discover audit log entries that report attempts to log on to your computer. You need to be notified of all logon attempts that occur on your computer.  What should you do?()A、Enable the Problem Reporting feature for all users.B、Configure a custom view to monitor failed logon events on your computer.C、Use the Computer Management console to connect to your computer from another computer and monitor the audit logs.D、In the Event Viewer window, attach a task to a failed logon event. Configure this task to send an e-mail message to your e-mail account.

You have an Exchange Server 2010 organization.You need to determine why a remote SMTP server rejects e-mail sent from your organization.What should you do?()A、Review the application event logs.B、Review the message tracking logs.C、Set the Protocol logging level to Verbose on the Receive connectors and then review the protocol log files.D、Set the Protocol logging level to Verbose on the Send connectors and then review the protocol log files.

You are planning the migration of an existing application to Windows Azure.  The application includes a trace listener that produces log files.   The log files must be transferred to the Windows Azure Storage service each day with the minimum amount of effort.   You need to recommend an approach for transferring the log files.  What should you recommend?()A、 Perform on-demand transfers of custom error logs.B、 Perform on-demand transfers of Windows Azure logs.C、 Configure scheduled transfers of custom error logs.D、 Configure scheduled transfers of Windows event logs.

You work as a network Exchange administrator at Company.com.The Company.com network currently consists of a single Active Directory forest containing a single domain named Company.com.The Company.com organization makes use of Microsoft Exchange Server 2010 as their messaging solution.During routine monitoring you discover that a remote SMTP server rejects e-mail messages sent from your company.You receive an instruction from management to identify the reason for this dilemma. What should you do?()A、You should consider having the message tracking logs reviewed.B、You should consider having the Protocol logging level set to Verbose on the Receive connectors.Thereafter the protocol log files should be reviewed.C、You should consider having the Protocol logging level set to Verbose on the Send connectors.D、You should consider having the application event logs reviewed.

You have a share on your local computer. Someone has been intentionally damaging your files.  You want to be able to know which account is doing this. What do you do? ()A、Turn on auditing for objects in the Local Security Policy and Select 'Process Tracking'. B、Turn on auditing for objects in the Local Security Policy and Select 'Object Access'. C、Use Windows Explorer to turn on auditing for the specific files. D、Have the administrator for domains log you on as an administrator and enable auditing for a  specific file. E、Turn on auditing for objects in the Local Security Policy and Select 'Account Management'. F、Allow only one account at a time to log on to your shared folder. Check the event viewer to  see who logged on.

You have an Exchange organization.All servers in the organization have Exchange Server 2010 Service Pack 1 (SP1) installed.You need to identify why a remote SMTP server rejects e-mail sent from the organization. What should you do?()A、Modify the diagnostic logging level on the MSExchangeTransportService object, and then review the Application event logB、Modify the connectivity log settings on the Transport server, and then review the connectivity logs.C、Modify the message tracking settings on the Transport server, and then review the message tracking logs.D、Modify the protocol logging level on the Send connectors, and then review the protocol logs.

单选题A media failure has occurred. This has resulted in all the members of the next log group being rendered inaccessible to the log writer process (LGWR) at a log switch. How does this failure affect the operational database?()A The database allows only queries; no other statements are allowed.B The database re-creates the missing redo log files automatically.C The database continues to function normally with the existing files.D The database returns an error and the database instance shuts down.E The user sessions that generate redo logs are terminated automatically.

多选题The loss of which two types of files may require a recovery with the RESETLOGS option?()Acontrol filesBpassword fileCarchived log filesDsystem-critical data files for which all the redo entries are presentEnon-system-critical data files for which all the redo entries are present

单选题You have an Exchange Server 2010 organization.You need to determine why a remote SMTP server rejects e-mail sent from your organization.What should you do?()AReview the application event logs.BReview the message tracking logs.CSet the Protocol logging level to Verbose on the Receive connectors and then review the protocol log files.DSet the Protocol logging level to Verbose on the Send connectors and then review the protocol log files.

单选题You are planning the migration of an existing application to Windows Azure.  The application includes a trace listener that produces log files.   The log files must be transferred to the Windows Azure Storage service each day with the minimum amount of effort.   You need to recommend an approach for transferring the log files.  What should you recommend?()A Perform on-demand transfers of custom error logs.B Perform on-demand transfers of Windows Azure logs.C Configure scheduled transfers of custom error logs.D Configure scheduled transfers of Windows event logs.

单选题An administrator attends a management meeting to further explain a problem that occurred Several weeks ago. A quick review of existing log files reveals that all logs from that period are gone.  Which logfile may be reviewed for specific event detail at this late date?()A clcornd.logB clverify.logC clstrhist.logD cluster.mmddyyyy

单选题An administrator has encountered a problem with a particular piece of software installed on the serverand begins the troubleshooting process. Which of the following is the FIRST place the administrator should look for specific information about the problem?()A The supporting documentationB The vendors websiteC The InternetD The servers event logs

单选题In which scenario is a Database Administrator NOT required to perform an incomplete recovery?()A when all the online redo log groups are multiplexed and one of the members of a group is missingB when all the online redo log groups are not multiplexed and one log group is missingC when all the control files are missingD when some important tables are deleted from the database and purged from the Recycle Bin

单选题A System p administrator needs to document system changes that have occurred recently. The company has a policy of making all possible changes via the smit interface.  Which of the following files would show the commands that have been performed from within smit and their resulting output()A/smit.logB/smit.scriptC/var/log/smit.logD/.history

单选题You work as a database administrator for Certkiller .com. Redo log files are not multiplexed in your database. Redo log blocks are corrupted in group 2, and archiving has stopped. All the redo logs are filled and database activity is halted. Database writer has written everything to disk.  Which command would you execute to proceed further?()ARECOVER LOFIEL BLOCK GROUP 2;BALTER DATABASE DROP LOGFILE GROUP 2;CALTER DATABASE CLEAR LOGFILE GROUP 2;DALTER DATABASE RECOVER LOGFILE GROUP 2;EALTER DATABASE CLEAR UNARCHIVED LOGFILE GROUP 2;

单选题An administrator has encountered a problem with a particular piece of software installed on the server and begins the troubleshooting process. Which of the following is the FIRST place the administrator should look for specific information about the problem?()AThe supporting documentationBThe vendor websiteCThe InternetDThe server event logs