You are using replication and the binary log files on your master server consume a lot of disk space. Which two steps should you perform to safely remove some of the older binary log files?()A、Use the command PURGE BINARY LOGS and specify a binary log file name or a date and time to remove unused filesB、Execute the PURGE BINARY LOGE NOT USED commandC、Remove all of the binary log files that have a modification date earlier than todayD、Edit the .index file to remove the files you want to deleteE、Ensure that none of the attached slaves are using any of the binary logs you want to delete

You are using replication and the binary log files on your master server consume a lot of disk space. Which two steps should you perform to safely remove some of the older binary log files?()

  • A、Use the command PURGE BINARY LOGS and specify a binary log file name or a date and time to remove unused files
  • B、Execute the PURGE BINARY LOGE NOT USED command
  • C、Remove all of the binary log files that have a modification date earlier than today
  • D、Edit the .index file to remove the files you want to delete
  • E、Ensure that none of the attached slaves are using any of the binary logs you want to delete

相关考题:

You are using replication and the binary log files on your master server consume a lot of disk space. Which two steps should you perform to safely remove some of the older binary log files?() A.Use the command PURGE BINARY LOGS and specify a binary log file name or a date and time to remove unused filesB.Execute the PURGE BINARY LOGE NOT USED commandC.Remove all of the binary log files that have a modification date earlier than todayD.Edit the .index file to remove the files you want to deleteE.Ensure that none of the attached slaves are using any of the binary logs you want to delete

An administrator account is granted the CREATE SESSION and SET CONTAINER system privileges.A multitenant container database (CDB) instant has the following parameter set:THREADED_EXECUTION = FALSEWhich four statements are true about this administrator establishing connections to root in a CDB that has been opened in read only mode?()A. You can conned as a common user by using the connect statement.B. You can connect as a local user by using the connect statement.C. You can connect by using easy connect.D. You can connect by using OS authentication.E. You can connect by using a Net Service name.F. You can connect as a local user by using the SET CONTAINER statement.

You are the administrator of a SQL Server 2000 computer. Your company purchased an accounting application from a vendor. The application stores its data in a database named Accounting on the server. The tables in this database contain columns that function as primary keys, but PRIMARY KEY and FOREIGN KEY constraints are not used.You need to replicate data from this database to another SQL Server computer. This server will use the replicated data to generate reports. Most reports will run each month, but the accounting department needs to have the ability to run reports at any time. Reports should be accurate through the last full working day.You cannot make any changes to the database, but you need to implement replication. Which two actions should you take? (Each correct answer presents part of the solution. Choose two)A.Implement merge replication.B.Implement snapshot replication.C.Implement transactional replication.D.Schedule replication to run continuously.E.Schedule replication to run during off-peak hours.

You are the administrator of an Active Directory domain named Auser reports that he cannot log on to a Windows Server 2003 computer that containsa critical application.You discover that the organizational unit (OU) in which the server is located wasdeleted. You discover that the user rights for this server are controlled by GroupPolicy.You need to restore access to the server. You need to achieve this goal by using theminimum amount of administrative effort.What should you do?()A. Perform a normal restoration of the System State data for the domain controller. Force replication.B. Perform an authoritative restoration of the System State data for the domain controller. Mark the OU for replication.C. Re-create the OU that was deleted. Reapply Group Policy, and then add the computer account and any necessary users or groups.D. Perform an Automated System Recovery (ASR) restoration on the domain controller.

You are a network administrator for Your network consists of a single Active Directory domain named All servers run Windows Server 2003.A help desk user reports that a user object was accidentally deleted and the user can no longer log on to the domain and access resources. You confirm that the user object was included in the most recent backup.You need to enable the user to log on to the domain. You must ensure that the user retains access to resources.What should you do?()A. Install a new domain controller. Install Active Directory from media by using the most recent backup. Manually initiate replication.B. Decrease the garbage collection interval. Perform a nonauthorative restoration of Active Directory by using the most recent backup.C. Perform a nonauthorative restoration of Active Directory by using the most recent backup. Authoritatively restore the user object that was deleted.D. Re-create a user object that has the same user principal name (UPN) as the user object that was deleted. Authoritatively restore this user object.

You work in a company which uses SQL Server 2008. You are the administrator of the company database. Now you are in charge of a SQL Server 2008 instance which is named Instance01. Instance01 contains a database which is named SellingHelp. There isthe Products table in the SellingHelp database. Now according to the company requirement, the Products table has to be replicated to the SQL Server instances installed in laptopscomputers. You have to create a Replication topology to perform this. The Products table is updated from Instance01 when the laptops reconnect to the corporate network. The Products table on Instance01 is frequently updated between reconnections. You must make sure that you can implement the Replication topology along with the Subscription type successfully and meanwhile reduce the bandwidth usage to the least.  So what action should you perform to achieve this goal?()  A、You should implement the Snapshot Replication topology along with a Push Subscription. B、You should implement the Merge Replication topology along with a Pull Subscription. C、You should implement the Snapshot Replication topology along with a Pull Subscription. D、You should implement the Transactional Replication topology along with a Pull Subscription

You want to check the EMP table in the user, Scott’s schema for block corruption. You also want to fix the corrupted blocks, if any. How will you accomplish the required task?()A、by using the ANALYZE utilityB、by using the DBVERIFY utilityC、by using the DB_BLOCK_CHECKING parameterD、by using the DBMS_REPAIR package

You work as a Web Developer at Certkiller.com. You are in the process of creating a Webapplication using Microsoft ASP.NET 3.5.  An exception management framework is not used in the Web application. You need to ensure thatthe application log the unhandled exceptions automatically to the event log. You need to configurethe Web.config file to accomplish this. Identify the configuration that will assist you in thisscenario?()A、You should consider using the healthMonitoring enabled="true"/ configuration.B、You should consider using the deployment retail="true"/ configuration.C、You should consider using the customErrors mode="On"/ configuration.D、You should consider using the trace enabled="true"/ configuration.

You are designing a site topology to meet the business and technical requirements. What should you do?()A、Increase the replication interval between sites.B、Use SMTP as the transport protocol for replication.C、Create site links to represent the physical topology.  D、Disable the Knowledge Consistency Checker (KCC) and manually configure site replication.

Your company has a main office and a branch office You deploy a read-only domain controller (RODC) that runs Microsoft Windows Server 2008 to the branch office You need to ensure that users at the branch office are able to log on to the domain by using the RODC What should you do()A、Add another RODC to the branch officeB、Configure a new bridgehead server in the main officeC、Configure the Password Replication Policy on the RODCD、Decrease the replication interval for all connection objects by using the Actrve Directory Sites and Services console

You need to recommend a solution for Group Policy that meets the companys technical requirements.What should you recommend?()A、Create a Central Store.B、Enable folder redirection.C、Modify the File Replication Service (FRS) settings for SYSVOL.D、Configure SYSVOL to use Distributed File System (DFS) Replication.

You have an Exchange Server 2003 organization.  Users access public folders by using Microsoft Office Outlook 2003 and Outlook Web App. You plan to transition the organization to Exchange Server 2010.  You need to ensure that users can access public folders after their mailboxes have been moved to Exchange Server 2010.  What should you do?()A、Enable public folder referrals.B、Run the New Organization Relationship wizard.C、Create public folder replicas on an Exchange Server 2010 server.D、Run the Microsoft Exchange Inter-Organization Replication tool from an Exchange Server 2003server.

You are the administrator of an Active Directory domain named A user reports that he cannot log on to a Windows Server 2003 computer that contains a critical application. You discover that the organizational unit (OU) in which the server is located was deleted. You discover that the user rights for this server are controlled by Group Policy. You need to restore access to the server. You need to achieve this goal by using the minimum amount of administrative effort. What should you do?()A、Perform a normal restoration of the System State data for the domain controller. Force replication.B、Perform an authoritative restoration of the System State data for the domain controller. Mark the OU for replication.C、Re-create the OU that was deleted. Reapply Group Policy, and then add the computer account and any necessary users or groups.D、Perform an Automated System Recovery (ASR) restoration on the domain controller.

Your company has an Active Directory Domain Services (AD DS) domain. All servers run Windows Server 2008 R2. All client computers run Windows 7. You virtualize applications by using Microso ft Application Virtualization (App - V). You are deploying servers to five new branch offices. Each branch office will stream virtual applications from a local file server and perform application sequencing locally. You need to replicate application packages to all file servers and minimize bandwidth usage. What should you do?()A、Create a Distributed File System (DFS) root on each file server.B、On each file server, add the BranchCache for network files role service.C、Create an Active Directory Distributed Fi le System (DFS) root target folder.D、Create a Distributed File System Replication (DFSR) full mesh replication group.

Your company has a main office and three branch offices. The company has an Active Directory forest that has a single domain. Each office has one domain controller. Each office is configured as an Active Directory site. All sites are connected with the DEFAULTIPSITELINK object. You need to decrease the replication latency between the domain controllers. What should you do()A、Decrease the cost between the connection objects.B、Decrease the replication interval for all connection objects.C、Decrease the replication interval for the DEFAUL TIPSITELINK object.D、Decrease the replication schedule for the DEFAUL TIPSITELINK object.

单选题You have a database availability group (DAG) that contains two servers named MBX1 and MBX2.You discover that a mailbox database named DB2 is in a FailedAndSuspended state on MBX2.You need to reseed DB2 to MBX2.You must achieve this goal by using the minimum amount of administrative effort.What should you do?()AFrom the Services console, restart the Microsoft Exchange Replication Service.BFrom the Exchange Management Console, run the Add Mailbox Database Copy wizard.CFrom the Exchange Management Shell, run the Update-MailboxDatabaseCopy cmdlet.DFrom the Exchange Management Shell, run the Restore-DatabaseAvailabilityGroup cmdlet.

单选题Your network consists of a single Active Directory domain. All domain controllers run Windows Server 2003. You upgrade all domain controllers to Windows Server 2008. You need to ensure that the Sysvol share replicates by using DFS Replication (DFS-R). What should you do()AFrom the command prompt, run netdom /reset.BFrom the command prompt, run dfsutil /addroot.sysvol.CRaise the functional level of the domain to Windows Server 2008.DFrom the command prompt, run dcpromo /unattend:unattendfile.xml

多选题You are using replication and the binary log files on your master server consume a lot of disk space. Which two steps should you perform to safely remove some of the older binary log files?()AUse the command PURGE BINARY LOGS and specify a binary log file name or a date and time to remove unused filesBExecute the PURGE BINARY LOGE NOT USED commandCRemove all of the binary log files that have a modification date earlier than todayDEdit the .index file to remove the files you want to deleteEEnsure that none of the attached slaves are using any of the binary logs you want to delete

单选题You want the ability to recovery any time within the last seven days and therefore you configured the recovery window retention policy using the command:   RMAN CONFIGURE RETENTIOH POLICY TO RKCOVFRY WINDOW OF 7 DAYS;   After configuring the recovery window, you performed the database backup as follows:()A Backup RB1 at log sequence number 12871 on 5th JanB Backup RB2 at log sequence number 15622 on 12th JanC Backup RB3 at log sequence 16721 on 15th JanD On 20th Jan when the log sequence number was 18112 you realize that there Is a need to a point in time at the beginning of the recovery window. You have all an hived redo log files to date.

多选题What are four capabilities of the mysql client program?()ACreating, dropping, and modifying tables and indexesBInitiating a binary backup of the database by using the START BACKUP commandCDisplaying replication status informationDShutting down the server by using the SHUTDOWN commandECreating and dropping databasesFCreating and administering users

单选题You work in a company which uses SQL Server 2008. You are the administrator of the company database. Now you are in charge of a SQL Server 2008 instance which is named Instance01. Instance01 contains a database which is named SellingHelp. There isthe Products table in the SellingHelp database. Now according to the company requirement, the Products table has to be replicated to the SQL Server instances installed in laptopscomputers. You have to create a Replication topology to perform this. The Products table is updated from Instance01 when the laptops reconnect to the corporate network. The Products table on Instance01 is frequently updated between reconnections. You must make sure that you can implement the Replication topology along with the Subscription type successfully and meanwhile reduce the bandwidth usage to the least.  So what action should you perform to achieve this goal?()AYou should implement the Snapshot Replication topology along with a Push Subscription. BYou should implement the Merge Replication topology along with a Pull Subscription. CYou should implement the Snapshot Replication topology along with a Pull Subscription. DYou should implement the Transactional Replication topology along with a Pull Subscription

单选题You want to check the EMP table in the user, Scott’s schema for block corruption. You also want to fix the corrupted blocks, if any. How will you accomplish the required task?()Aby using the ANALYZE utilityBby using the DBVERIFY utilityCby using the DB_BLOCK_CHECKING parameterDby using the DBMS_REPAIR package

多选题You are the Exchange administrator of the Xxx Corporation’s Exchange 2010 organization.You have configured a Database Availability Group (DAG) named DAG01.You need to change the replication port used by the DAG.What are two things that you must do?()AUse the Exchange Management Console (EMC) to change the TCP port used for replication.BUse the Exchange Management Shell to change the TCP port used for replication.CModify the Windows Firewall exceptions on each member of the DAG to open the replication port.DModify the Windows Firewall exceptions on the witness server of the DAG to open the replication port.EUse the Exchange Management Shell to configure the DAG IP address of 0.0.0.0.FUse the Exchange Management Shell to change the DAG IP address to 127.0.0.1.

单选题You are a network administrator for Your network consists of a single Active Directory domain named All servers run Windows Server 2003. A help desk user reports that a user object was accidentally deleted and the user can no longer log on to the domain and access resources. You confirm that the user object was included in the most recent backup. You need to enable the user to log on to the domain. You must ensure that the user retains access to resources. What should you do?()AInstall a new domain controller. Install Active Directory from media by using the most recent backup. Manually initiate replication.BDecrease the garbage collection interval. Perform a nonauthorative restoration of Active Directory by using the most recent backup.CPerform a nonauthorative restoration of Active Directory by using the most recent backup. Authoritatively restore the user object that was deleted.DRe-create a user object that has the same user principal name (UPN) as the user object that was deleted. Authoritatively restore this user object.

单选题Certkiller .com has a main office and branch office in another city. You are assigned to deploy and implement a Read-only Domain Controller (RODC) at the branch office. You deploy a RODC that runs Windows Server 2008.  What should you do to ensure that the users at the branch office can log on to the domain using RODC()AUse Password Replication Policy on the RODCBAdd RODC to the main officeCDeploy and configure a new bridgehead server in the branch officeDDeploy and configure a Password Replication Policy on the RODC in the main office

单选题You are designing a site topology to meet the business and technical requirements.  What should you do?()A Increase the replication interval between sites,B Use SMTP as the transport protocol for replication.C Create site links to represent the physical topology.D Disable the Knowledge Consistency Checker (KCC) and manually configure site replication.