Which of the following environment variables specifies a non-default location for the listener configuration file?()A、LSN_ADMINB、TNS_ADMINC、ADMIN_TNSD、TSN_ADMIN
Which of the following environment variables specifies a non-default location for the listener configuration file?()
- A、LSN_ADMIN
- B、TNS_ADMIN
- C、ADMIN_TNS
- D、TSN_ADMIN
相关考题:
You execute the following statement in a Microsoft Windows environment. There are no conflicts in the path name definitions.C: \> mysqld – install Mysql56 – defaults – file = C :\my –opts.cnf What is the expected outcome?()A.Mysql is installed as the Windows service name Mysql56, and uses c: \my-opts.cnf as the configuration fileB.An error message is issued because – install is not a valid option for mysqldC.A running Mysql 5.6 installation has its runtime configuration updated with the server variables set in c: \my-opts.cnfD.Mysqld acts as an MSI installer and installs the Mysql 5.6 version, with the c: \my-opts.cnf configuration file
Given the following router output,which configuration file will the router use at its next reload?() A.configB.clientqos.cnfC.startup-configD.running-configuration
Which statement is true regarding Dynamic Service Registration?()A、Dynamic service registration requires configuration in the listener .ora file.B、Dynamic service registration can be used only with an Oracle9/instance.C、Dynamic service registration cannot register a local listener that does not use TCP/IP or port 1521.D、The PMON background process automatically registers each database instance if the necessary parameters have been set in the database initialization parameter file.
You are the Database Administrator (DBA) of your company. You execute the following statement on an Oracle 10g instance: SQL ALTER SYSTEM SWITCH LOGFILE; Which two tasks are performed when the statement is executed? ()A、 The DBWn process writes to the datafile.B、 Changes in the background process are recorded.C、 The log file is updated with the current SCN number.D、 The System Change Number (SCN) is recorded in the control file.E、 The changes to the listener configuration in the listener.ora file are recorded.
Which of the following is an accurate description of the command copy startup-configftp://kevin:cisco@192.168.1.74?()A、The configuration on the FTP server is copied to RAMB、The command is not valid on a Cisco routerC、The configuration file in RAM is copied to an FTP serverD、The configuration file in NVRAM is copied to an FTP serverE、The configuration on the FTP server is copied to NVRAMF、The configuration will be copied from NVRAM to an FTP server with a filename of Kevin
When you use the Oracle Net Configuration Assistant to specify the naming method, which file is updated?()A、INIT.ORAB、SQLNET.ORAC、LISTENER.ORAD、TNSNAMES.ORA
Which statement correctly describes the change tracking writer (CTWR) background process?()A、 It keeps track of changes in the background processes.B、 It records the system change number (SCN) in the control file.C、 It writes audit records for user changes to the change tracking file.D、 It records any changes to the listened configuration in the listener.ora file.E、 It records any changes to the database parameters in the change tracking file.F、 It records the physical location of all the changes that are made to the database in the change tracking file.
Which of the following specifies a set of consistent requirements for a workstation or server?()A、Vulnerability assessmentB、Imaging softwareC、Patch managementD、Configuration baseline
Which of the following tools is used to report the location of logical partitions of a file system on a physical volume?()A、 lsfsB、 iostatC、 lslv -pD、 lsvg -p
Because of changes in an application environment, the /etc/inittab file needs to be modified. Which of the following commands would be used to accomplish this in a supported manner()A、viB、chitabC、chssysD、chrsrc
In a DNS environment, the zone file that maps hostnames to IP address (sometimes called the named.hosts file), is created on which of the following servers?()A、CacheB、PrimaryC、SecondaryD、Primary and secondary
A user would like their shell prompt to reflect the current directory. Which of the following environment variables can be set to accomplish this?()A、PS1B、PATHC、PROMPTD、LOCPATH
You execute the following statement in a Microsoft Windows environment. There are no conflicts in the path name definitions. C: /> mysqld – install Mysql56 – defaults – file = C :/my –opts.cnf What is the expected outcome?()A、Mysql is installed as the Windows service name Mysql56, and uses c: /my-opts.cnf as the configuration fileB、An error message is issued because – install is not a valid option for mysqldC、A running Mysql 5.6 installation has its runtime configuration updated with the server variables set in c: /my-opts.cnfD、Mysqld acts as an MSI installer and installs the Mysql 5.6 version, with the c: /my-opts.cnf configuration file
Which modifier is used to change listener parameters in the Listener Control utility environment?()A、SETB、ALTERC、CHANGED、UPDATE
Which of the following files can be used to configure connection pooling in the shared server environment?()A、INIT.ORAB、SQLNET.ORAC、TNSNAMES.ORAD、SERVICES.ORAE、LISTENER.ORA
The listener has shut down unexpectedly. You want to view the listener log file and listener trace file to find the cause of the problem. How can you view the contents of the listener log file and the listener trace file?()A、 Open the file at the location specified by the BACKGROUND_DUMP_DEST parameter in the pfile.B、 Open the file at the location specified by the USER_DUMP_DEST parameter in the pfile.C、 Issue the SERVICES command at the LSNRCTL prompt.D、 Issue the STATUS command at the LSNRCTL prompt.
Anyone who knows just the host name and the listener name can have full control over the listener. They can stop the listener and also obtain detailed information about the listener, database, and the configuration of the application. How would you avoid this scenario?()A、lock the listenerB、hide the listenerC、create multiple listenersD、run listener on a remote clientE、set a password for the listenerF、store listener.ora in a non-default location
You are maintaining the database of a company. The listener process, listener1, is configured for remote access. You have issued the following command: LSNRCTLSTATUS listener1 Which information will NOT be displayed when you issue the above command?() A、 whether the password is set in the listener or a file or notB、 the number of client connections the service handler has refusedC、 the information will be displayed whether the instance can accept connections or notD、 the protocol addresses on which the listener is configured to listen
Which of the following file should be configured for dynamic service registration?()A、LISTENER.ORAB、SQLNET.ORAC、INIT.ORAD、TNSNAMES.ORA
单选题Which of the following tools is used to report the location of logical partitions of a file system on a physical volume?()A lsfsB iostatC lslv -pD lsvg -p
单选题The listener has shut down unexpectedly. You want to view the listener log file and listener trace file to find the cause of the problem. How can you view the contents of the listener log file and the listener trace file?()A Open the file at the location specified by the BACKGROUND_DUMP_DEST parameter in the pfile.B Open the file at the location specified by the USER_DUMP_DEST parameter in the pfile.C Issue the SERVICES command at the LSNRCTL prompt.D Issue the STATUS command at the LSNRCTL prompt.
单选题Given the following router output,which configuration file will the router use at its next reload?()A configB clientqos.cnfC startup-configD running-configuration
单选题You are maintaining the database of a company. The listener process, listener1, is configured for remote access. You have issued the following command: LSNRCTLSTATUS listener1 Which information will NOT be displayed when you issue the above command?()A whether the password is set in the listener or a file or notB the number of client connections the service handler has refusedC the information will be displayed whether the instance can accept connections or notD the protocol addresses on which the listener is configured to listen
单选题Anyone who knows just the host name and the listener name can have full control over the listener. They can stop the listener and also obtain detailed information about the listener, database, and the configuration of the application. How would you avoid this scenario?()Alock the listenerBhide the listenerCcreate multiple listenersDrun listener on a remote clientEset a password for the listenerFstore listener.ora in a non-default location
单选题Which of the following is an accurate description of the command copy startup-configftp://kevin:cisco@192.168.1.74?()AThe configuration on the FTP server is copied to RAMBThe command is not valid on a Cisco routerCThe configuration file in RAM is copied to an FTP serverDThe configuration file in NVRAM is copied to an FTP serverEThe configuration on the FTP server is copied to NVRAMFThe configuration will be copied from NVRAM to an FTP server with a filename of Kevin
多选题You are the Database Administrator (DBA) of your company. You execute the following statement on an Oracle 10g instance: SQL ALTER SYSTEM SWITCH LOGFILE; Which two tasks are performed when the statement is executed? ()AThe DBWn process writes to the datafile.BChanges in the background process are recorded.CThe log file is updated with the current SCN number.DThe System Change Number (SCN) is recorded in the control file.EThe changes to the listener configuration in the listener.ora file are recorded.
单选题Which of the following environment variables specifies a non-default location for the listener configuration file?()ALSN_ADMINBTNS_ADMINCADMIN_TNSDTSN_ADMIN