You want to use RMAN to create compressed backups.Which statement is true about the compression algorithms that RMAN can use?()A、The BZIP2 compression algorithm consumes more CPU resources than the ZLIB compression algorithm.B、The ZLIB compression algorithm consumes more CPU resources than the BZIP2 compression algorithm.C、The ZLIB compression algorithm provides maximum compression and produces smaller backups than the BZIP2 compression algorithm.D、Only the BZIP2 compression algorithm can be used to make compressed backups to disk.

You want to use RMAN to create compressed backups.Which statement is true about the compression algorithms that RMAN can use?()

  • A、The BZIP2 compression algorithm consumes more CPU resources than the ZLIB compression algorithm.
  • B、The ZLIB compression algorithm consumes more CPU resources than the BZIP2 compression algorithm.
  • C、The ZLIB compression algorithm provides maximum compression and produces smaller backups than the BZIP2 compression algorithm.
  • D、Only the BZIP2 compression algorithm can be used to make compressed backups to disk.

相关考题:

You create a Web application for your company‘s intranet. You want to enable users to customize their versions of the intranet home page. You create sections of content as Web Parts. You need to ensure that users can customize content at any time.Which two code segments should you use?()A.B.C.D.

You are the administrator of a SQL Server 2000 computer in your company's personnel department. Employee data is stored in a SQL Server 2000 database. A portion of the database schema is shown in the exhibit.You want to create a text file that lists these data columns in the following format title, FirstName, LastName, WorkPhone, PositionName, DepartmentName.You want to create the text file as quickly as possible. You do not expect to re-create this file, and you want to avoid creating new database objects if possible.What should you do?A.Use the bcp utility to export data from each table to a separate text file. Use format files to select the appropriate columns. Merge the data from each text file into a single text file.B.Create a view that joins data from all three tables include only the columns you want to appear in the text file. Use the bcp utility to export data from the view.C.Create a SELECT query that joins the data from the appropriate columns in the three tables. Add an INTO clause to the query to create a local temporary table. Use the bcp utility to export data from the local temporary table to a text file.D.Create a SELECT query that joins the data from the appropriate columns in the three tables. Add an INTO clause to the query to create a global temporary table. Use the bcp utility to export data from the global temporary table to a text file.

You want to create the Recovery Manager (RMAN) Virtual Private Catalog (VPC) to maintain a separation of responsibilities along with a consolidation of RMAN repository. Which condition must be met before you create the VPC?()A、A base catalog existsB、The recovery catalog is emptyC、The base recovery catalog must be droppedD、A target database is registered in the recovery catalog

In which three cases would you use the USING clause?()A、You want to create a nonequijoin.B、The tables to be joined have multiple NULL columns.C、The tables to be joined have columns of the same name and different data types.D、The tables to be joined have columns with the same name and compatible data types.E、You want to use a NATURAL join, but you want to restrict the number of columns in the join condition.

You want the size of the tablespace to increase when it is full. Which option would you use?()A、use automatic extent allocationB、disable threshold for the tablespaceC、use freelists to manage the free spaceD、use automatic segment space managementE、create the tablespace as a bigfile tablespaceF、use the RESIZE clause while creating the tablespaceG、enable AUTOEXTEND for at least one of the data files in the tablespace

You want to create a role to meet these requirements:  1:The role is to be protected from unauthorized usage.  2:The password of the role is not to be embedded in the application source code or stored in a table.  Which method would you use to restrict enabling of such roles()A、Create the role with global authentication.B、Create the role with external authentication.C、Create the role as a secure application role.D、Create the role as a password-protected role.E、Create a role and use Fine-Grained Access Control (FGAC) to secure the role.

Your database runs in NOARCHIVELOG mode, and is backed up every night using RMAN scripts. However, last night your assistant DBA performed a manual operating system backup, instead of running the scripts. Today your database crashed and you now want to use the backups from last night. What do you need todo?()A、You need to perform the restore and recover operations manually, because the backup was made manually. B、First you need to resynchronize the catalog with the control file, and then you can use RMAN to recover the database. C、First you need to add the backup to the catalog using the CATALOG command, and then you can use RMAN to recover the database. D、You can just use RMAN and recover the database, because RMAN automatically updates the catalog with the backup information.

You completed the development of a new application and want to create a new domain in a new environment for functional testing. You want to have the same settings for your new domain as your old domain, with the option of changing the configuration in the new target environment. Which two actions should you execute?()A、Use the introspect () command in WLST to gather the configuration information from the  original domain.B、Use pack/unpack to transfer the domain from one machine to another.C、Create a domain template from the original domain using the Domain Template Builder and use  the Configuration Wizard to create a new domain from the template.D、Use the Admin Console of the original domain to create a domain template from the original  domain and use the Configuration Wizard to create a new domain from the template.

What RMAN command must you use before you can back up a database using the recovery catalog?()A、 create catalogB、 install databaseC、 catalog databaseD、 merge Catalog with databaseE、 register database

You want to create a new optimized database for your transactional production environment to be used by a financial application. While creating the database, you want the Oracle software to take care of all basic settings to optimize the database performance. Which method would you use to achieve this objective?()A、Use the CREATE DATABASE .. command to create the database with Oracle-managed files. B、Use the Database Configuration Assistant (DBCA) to create the database with Oracle-managed files. C、Use Enterprise Manager to create a new database with the Online Transaction Processing (OLTP) option. D、Use Database Configuration Assistant (DBCA) to create the database with Transaction Processing template. E、Use the CREATE DATABASE .. command to create the database with Automatic Storage Management (ASM) file system.

You lost the index tablespace in your database. You decided to re-create the index tablespace and the indexes in the tablespace. What methods can you use to re-create the indexes?()A、 SQL scriptsB、 Recovery Manager (RMAN) scriptC、 Data PumpD、 SQL*LoaderE、 Flashback database

You are creating a recovery catalog for use with RMAN. You have issued these commands: SQL CREATE TABLESPACE rman_ts DATAFILE  ’/DISK1/rman_ts01.dbf’ 2 SIZE 20M 3 DEFAULT STORAGE (initial 100K next 100K pctincrease 0); SQL CREATE USER rman_db01 IDENTIFIED BY rman_db01 2 DEFAULT TABLESPACE rman_ts 3 QUOTA unlimited ON rman_ts;  Which command should you issue next?()A、RESYNC CATALOG;B、REGISTER DATABASE;C、CREATE CATALOG TABLESPACE rman_ts;D、GRANT recovery_catalog_owner TO rman_db01;

You want to create a role to meet these requirements: 1. The role is to be protected from unauthorized usage. 2. The password of the role is not to be embedded in the application source code or stored in a table. method would you use to restrict enabling of such roles()A、Create the role with external authentication.B、Create the role as a secure application role.C、Create the role as a password-protected role.D、Create a role and use Fine-Grained Access Control (FGAC) to secure the role

There was media failure and you need to check the data files for any block corruption. Which option would you use to create a report on any corruptions found within the database?() A、the DBNEWID utilityB、the DBVERIFY utilityC、the ANALYZE commandD、the RMAN REPORT commandE、the RMAN CROSSCHECK commandF、the CHECK_OBJECT procedure of the DBMS_REPAIR package

You want to implement the backup and recovery strategy in your database using Recovery Manager (RMAN). You have chosen the control file of the target database for the RMAN repository.  Which command-line RMAN command would you use to establish a local connection between RMAN and the RMAN repository if your database is using password file authentication?()A、 rman TARGET / NOCATALOGB、 rman TARGET sys/passwordC、 rman TARGET sys/password AS SYSDBAD、 rman TARGET sys/password@db_name CATALOG rman_user/rman_password@rcat

You want to use RMAN to create compressed backups.  Which statement is true about the compression algorithms that RMAN can use?()A、 The BZIP2 compression algorithm consumes more CPU resources than the ZLIB compression algorithm.B、 The ZLIB compression algorithm consumes more CPU resources than the BZIP2 compression algorithm.C、 The ZLIB compression algorithm provides maximum compression and produces smaller backups than the BZIP2 compression algorithm.D、 Only the BZIP2 compression algorithm can be used to make compressed backups to disk.

You want to create a shortcut to a folder named Project on a network share. You want this shortcut to be available when you are not connected to the network. You attempt to configure the shortcut to be available offline. However, you do not see any option, which will let you do so. What should you do?()A、Use Windows Explorer to enable caching for the Project folder.B、Use Windows Explorer to configure the Project folder on the network share with the full  control permission for your user account.C、Connect to the network before trying to make the shortcut available offlineD、Create shortcuts to each file in the Project folder and make the shortcuts to the files available  offline.

You are preparing to install Windows 2000 Professional on 100 MPS-compliant computers. Each computer has two 550-MHz processors. The Computers are configured identically. You want to use one of the computers as a reference computer for deploying Windows 2000 Professional to the remaining Computers.   You install Windows 2000 Professional on the reference computer. You view Device Manager and notice that the drivers for the second processor are not installed. You want to add support for the second processor on the remaining 99 computers. You want to accomplish this with the least amount of administrative effort.  What should you do? ()A、 Use Setup Manager to configure the reference computer, and then create a disk image. B、 Use the System Preparation Tool with the -pnp parameter to set up the reference disk, and  then create a disk image. C、 Use Device Manager to add the appropriate hardware abstraction layer (HAL) to the  reference computer to support the second processor, and then Create a disk image. D、 After imaging the reference computer, restart the reference computer in safe mode and add  the driver for the second processor.

单选题You want to create the Recovery Manager (RMAN) Virtual Private Catalog (VPC) to maintain a separation of responsibilities along with a consolidation of RMAN repository.  Which condition must be met before you create the VPC?()A A base catalog existsB The recovery catalog is emptyC The base recovery catalog must be droppedD A target database is registered in the recovery catalog

单选题There was media failure and you need to check the data files for any block corruption. Which option would you use to create a report on any corruptions found within the database?()Athe DBNEWID utilityBthe DBVERIFY utilityCthe ANALYZE commandDthe RMAN REPORT commandEthe RMAN CROSSCHECK commandFthe CHECK_OBJECT procedure of the DBMS_REPAIR package

单选题You want to implement the backup and recovery strategy in your database using Recovery Manager (RMAN). You have chosen the control file of the target database for the RMAN repository.  Which command-line RMAN command would you use to establish a local connection between RMAN and the RMAN repository if your database is using password file authentication?()A rman TARGET / NOCATALOGB rman TARGET sys/passwordC rman TARGET sys/password AS SYSDBAD rman TARGET sys/password@db_name CATALOG rman_user/rman_password@rcat

多选题In which three cases would you use the USING clause?()AYou want to create a nonequijoin.BThe tables to be joined have multiple NULL columns.CThe tables to be joined have columns of the same name and different data types.DThe tables to be joined have columns with the same name and compatible data types.EYou want to use a NATURAL join, but you want to restrict the number of columns in the join condition.

单选题You want to create the Recovery Manager (RMAN) Virtual Private Catalog (VPC) to maintain a separation of responsibilities along with a consolidation of RMAN repository. Which condition must be met before you create the VPC?()AA base catalog existsBThe recovery catalog is emptyCThe base recovery catalog must be droppedDA target database is registered in the recovery catalog

单选题Your database runs in NOARCHIVELOG mode, and is backed up every night using RMAN scripts. However, last night your assistant DBA performed a manual operating system backup, instead of running the scripts. Today your database crashed and you now want to use the backups from last night. What do you need todo?()AYou need to perform the restore and recover operations manually, because the backup was made manually. BFirst you need to resynchronize the catalog with the control file, and then you can use RMAN to recover the database. CFirst you need to add the backup to the catalog using the CATALOG command, and then you can use RMAN to recover the database. DYou can just use RMAN and recover the database, because RMAN automatically updates the catalog with the backup information.

多选题You lost the index tablespace in your database. You decided to re-create the index tablespace and the indexes in the tablespace. What methods can you use to re-create the indexes?()ASQL scriptsBRecovery Manager (RMAN) scriptCData PumpDSQL*LoaderEFlashback database

单选题You would like to create an RMAN recover catalog in which to store information about your DB01 database. You want to use the database named RCDB for the storage of your recovery catalog. The six steps you will follow to create a recover catalog are not displayed in the correct order. Which displays the correct order?() 1. Grant the appropriate privileges (CONNECT and RESOURCE) and roles  (RECOVERY_CATALOG_OWNER) to the user responsible for performing backup and recover operations.  2. Register the target database in the catalog.  3. Create the catalog using the RMAN command line interpreter.  4. Create a user and schema which will own the recovery catalog.  5. Create tablespace to hold the catalog in the database you have dedicated for your RMAN recovery catalog.  6. Connect to the target database using SYSDBA privileges.A4,1,5,6,3,2B4,3,1,5,6,2C4,5,1,3,2,6D5,4,1,3,2,6E5,4,1,3,6,2

单选题What RMAN command must you use before you can back up a database using the recovery catalog?()A create catalogB install databaseC catalog databaseD merge Catalog with databaseE register database

单选题You are creating a recovery catalog for use with RMAN. You have issued these commands: SQL CREATE TABLESPACE rman_ts DATAFILE  ’/DISK1/rman_ts01.dbf’ 2 SIZE 20M 3 DEFAULT STORAGE (initial 100K next 100K pctincrease 0); SQL CREATE USER rman_db01 IDENTIFIED BY rman_db01 2 DEFAULT TABLESPACE rman_ts 3 QUOTA unlimited ON rman_ts;  Which command should you issue next?()ARESYNC CATALOG;BREGISTER DATABASE;CCREATE CATALOG TABLESPACE rman_ts;DGRANT recovery_catalog_owner TO rman_db01;