You have joined a new organization as a Database Administrator. The Security Administrator in your organization has kept human errors, such as erroneously dropping users, tables, and important data, to a minimum by carefully granting only the necessary privileges to each user. As a result of several ongoing transactions within your database, you discover that the flashback logs are rapidly increasing in the flash recovery area. To avoid out-of-space errors, you decide to delete the flashback logs from the flash recovery area. How can you delete the flashback logs from the database if your database is up and running?()A、 Shut down the database using the SHUTDOWN command. Mount the database using the STARTUP MOUNT EXCLUSIVE command and disable Flashback Database using the ALTER DATABASE FLASHBACK OFF statement.B、 Change the parameter setting in the SPFILE for the DB_RECOVERY_FILE_DEST parameter using the ALTER SYSTEM SET DB_RECOVERY_FILE_DEST=’’ SCOPE=BOTH statement while the database is up and running.C、 Shut down the database using the SHUTDOWN command. Mount the database using the STARTUP MOUNT EXCLUSIVE command. Change the parameter setting in the SPFILE for the DB_RECOVERY_FILE_DEST parameter using the ALTER SYSTEM SET DB_RECOVERY_FILE_DEST=’’ SCOPE=BOTH statement. Disable Flashback Database using the ALTER DATABASE FLASHBACK OFF statement.D、 Change the parameter setting in the SPFILE for the DB_RECOVERY_FILE_DEST parameter using the ALTER SYSTEM SET DB_RECOVERY_FILE_DEST=’’ SCOPE=BOTH statement. Shut down the database using the SHUTDOWN command. Mount the database using the STARTUP MOUNT EXCLUSIVE command and disable Flashback Database using the ALTER DATABASE FLASHBACK OFF statement.
You have joined a new organization as a Database Administrator. The Security Administrator in your organization has kept human errors, such as erroneously dropping users, tables, and important data, to a minimum by carefully granting only the necessary privileges to each user. As a result of several ongoing transactions within your database, you discover that the flashback logs are rapidly increasing in the flash recovery area. To avoid out-of-space errors, you decide to delete the flashback logs from the flash recovery area. How can you delete the flashback logs from the database if your database is up and running?()
- A、 Shut down the database using the SHUTDOWN command. Mount the database using the STARTUP MOUNT EXCLUSIVE command and disable Flashback Database using the ALTER DATABASE FLASHBACK OFF statement.
- B、 Change the parameter setting in the SPFILE for the DB_RECOVERY_FILE_DEST parameter using the ALTER SYSTEM SET DB_RECOVERY_FILE_DEST=’’ SCOPE=BOTH statement while the database is up and running.
- C、 Shut down the database using the SHUTDOWN command. Mount the database using the STARTUP MOUNT EXCLUSIVE command. Change the parameter setting in the SPFILE for the DB_RECOVERY_FILE_DEST parameter using the ALTER SYSTEM SET DB_RECOVERY_FILE_DEST=’’ SCOPE=BOTH statement. Disable Flashback Database using the ALTER DATABASE FLASHBACK OFF statement.
- D、 Change the parameter setting in the SPFILE for the DB_RECOVERY_FILE_DEST parameter using the ALTER SYSTEM SET DB_RECOVERY_FILE_DEST=’’ SCOPE=BOTH statement. Shut down the database using the SHUTDOWN command. Mount the database using the STARTUP MOUNT EXCLUSIVE command and disable Flashback Database using the ALTER DATABASE FLASHBACK OFF statement.
相关考题:
What is necessary for your query on an existing view to execute successfully? () A. The underlying tables must have data.B. You need SELECT privileges on the view.C. The underlying tables must be in the same schema.D. You need SELECT privileges only on the underlying tables.
You are the administrator of a database that contains 64 lookup tables. These tables store static data that should not change. However, users report that some of this data is being changed. You need to prevent users from modifying the data.You want to minimize changes to your security model and to your database applications. How should you modify the database?A.Create a filegroup named LOOKUP. Move the lookup tables to this filegroup. Select the read only check box for the filegroup.B.Create a database role named datamodifier. Grant SELECT permissions to the datamodifier role. Add all users to the role.C.Deny INSERT, UPDATE, and DELETE permissions for all users. Create stored procedures that modify data in all tables except lookup tables. Require users to modify data through these stored procedures.D.Create a view of the lookup tables. Use the view to allow users access to the lookup tables.
A data file became corrupted in your database due to bad sectors on the disk. Because of corruption, you lost all the important tables in that data file. Which method would you use for recovery?()A、flash back all the tables in the data file, one by oneB、restore the data file to a new location and perform a media recoveryC、flash back the database; there is no need to restore the data fileD、restore the data file from the most recent backup and flash back the database
You have an Exchange Server 2010 organization.You need to identify whether an administrator has made a configuration change in the Exchange organization.What should you run?()A、Get-EventLogLevelB、Get-ExchangeServerC、Exchange Best Practices AnalyzerD、Microsoft Baseline Security Analyzer (MBSA)
What is necessary for your query on an existing view to execute successfully? ()A、The underlying tables must have data.B、You need SELECT privileges on the view.C、The underlying tables must be in the same schema.D、You need SELECT privileges only on the underlying tables.
You work as a database administrator for Certkiller .com. Your database is in NOARCHIVELOG mode. The database has been configured with three redo logs groups, and there have been five log switches. You lost one non-system-critical data file from your database. Which method would you use to recover the data file?()A、Restore all the data files and open the databaseB、Create the data file and performtablespacerecoveryC、No need to restore any file, just recover the databaseD、Restore only the system data file and recover the databaseE、Restore only lost date file and performtablespacerecovery
Your database is in NOARCHIVELOG mode. After which two operations you should take the backup of control file?()A、adding a new user to the databaseB、dropping a user from the databaseC、dropping a table from the databaseD、dropping a data file from a tablespaceE、adding a new tablespace to the database
A data file become corrupted in your database due to bad sectors on the disk. Because of corruption, you lost all the important tables in that data file. Which method would you use for recovery?()A、 Flash back all the tables in the data file, one by one.B、 Restore the data file to a new location and perform a media recovery.C、 Flash back the database, there is no need to restore the data file.D、 Restore the data file from the most recent backup and flash the database.
You have a large amount of historical data in an operating system file. Some analysts in your organization need to query this data. The file is too large to load into your current database. Which is the most effective method to accomplish the task?()A、Upgrade the hardware/memory to accommodate the data.B、Load the data into your database by using the PARALLEL clause.C、Give analysts DBA privilege, so that they can query DBA_EXTERNAL_TABLES.D、Use an external table so you can have the metadata available in your database, but leave the data in the operating system files.
While creating a database using Database Configuration Assistant tool, you created a database default temporary tablespace. Which activity would cause the default temporary tablespace of the database to be used?()A、the CREATE TABLE .. commandB、sorting of the SYSTEM tablespace’s dataC、sorting of data required by recursive SQL statementsD、the CREATE TABLE .. ORGANIZATION EXTERNAL .. commandE、sorting of data if the users have not been allocated temporary tablespace explicitlyF、sorting of data if the users have been allocated temporary tablespace explicitly
There is a problem with one of the disks used for your database and your system administrator informs you that the disk needs to be replaced. The replacement disk will not be available until tomorrow. There was only one data file on this disk; it belongs to the USERS tablespace in your PROD database. Your PROD database runs in ARCHIVELOG mode and nightly online backups are taken. The users need to be able to access the data in the USERS tablespace before the replacement disk arrives. You have already taken the USERS tablespace offline and have restored the data file from last night’s backup to a new disk. Which additional steps are required in order to make the USERS tablespace available?()A、Only bring the tablespace back online.B、Only recover the tablespace and then bring the tablespace back online.C、Shut down the database, recover the data file and then start up the database.D、Issue the ALTER DATABASE RENAME FILE command, recover the tablespace, and then bring the tablespace online.E、Recover the tablespace, issue the ALTER DATABASE RENAME FILE command, and then bring the tablespace online.
You were recently hired by an organization as a database administrator. You are asked to find out whether the currently functional listener process, named L1, has been password protected or not. You are not familiar with the file system of the new organization. How would you accomplish the task?()A、by using the STATUS command of the Listener control utilityB、by using the STATUS L1 command of the Listener control utilityC、by using the SHOW RULES command of the Listener control utilityD、by using the SET PASSWORD command of the Listener control utilityE、by searching for the PASSWORD_LISTENER entry in the listener.ora file
In which two cases would you use an outer join? ()A、The tables being joined have NOT NULL columns.B、The tables being joined have only matched data.C、The columns being joined have NULL values.D、The tables being joined have only unmatched data.E、The tables being joined have both matched and unmatched data.F、Only when the tables have a primary key/foreign key relationship.
Flashback Database is enabled in your Oracle 10g database. One of your database users erroneously purged an important table residing in his schema. The table was purged sometime between 10:00 P.M. and 10:30 P.M. The next day, you decide to flash back the database. Before you flash back the database, you want to ensure that you have all the necessary flashback data. Which dynamic performance view must you use to determine whether you have the required flashback data to recover the purged table?()A、 V$DATABASEB、 V$UNDOSTATC、 V$FLASHBACK_DATABASE_LOGD、 V$FLASHBACK_DATABASE_STAT
You have an Exchange Server 2010 organization.You create a distribution group for all users in your company.You need to ensure that new users can add their mailboxes to the distribution group.What should you do?()A、Modify the group scope of the distribution group.B、Modify the approval mode of the distribution group.C、Modify the security settings of the distribution group.D、Modify the authentication settings of the ECP virtual directory.
You have an Exchange Server 2010 organization. You have a global security group named Legal that contains all the members of your companys legaldepartment. The companys security policy states that the Legal group must be able to search all mailboxes for e-mailmessages that contain specific keywords. You need to recommend a solution for the organization that complies with the security policy. What should you include in the solution?()A、a Discovery Management role groupB、a legal holdC、administrator audit loggingD、Mailbox journaling
You have an Exchange Server 2010 organization. You plan to delegate Exchange administrative rights to some users in the organization. You need to recommend a solution that tracks all changes made to the Exchange organization. What should you include in the solution?()A、administrator audit loggingB、circular loggingC、diagnostic loggingD、Windows Security Auditing
You are an IIS Web server administrator implementing authentication settings for a new Web site.According to the requirements for the Human Resources Web site, users should be prompted forauthentication information when they attempt to access the site. The site will be accessed only by userswho have accounts in your organization’s Active Directory domain. You have already configured the filesystem permissions for the content based on the appropriate settings. You also want to maximize securityof the site. Which two actions should you take to meet these requirements?()A、Enable Windows authentication.B、Enable basic authentication.C、Disable anonymous authentication.D、Enable anonymous authentication.
You have an Exchange organization.All servers in the organization have Exchange Server 2010 Service Pack 1 (SP1) installed. The organization contains two Mailbox servers named Server1 and Server2.Each Mailbox server has one mailbox database and one public folder database. You discover that all users create public folders on Server1 only. You need to ensure that all users create public folders on Server2 only. What should you do?()A、Move all mailboxes to Server2.B、Modify the properties of both mailbox databases.C、Remove all public folder replicas from Server1.D、Modify the properties of both public folder databases.
You have an Exchange Server 2010 organization. You need to recommend a mailbox storage management solution for your organization to meet thefollowing requirements: .Apply quota limits for users by department.Automatically apply quota limits for new users What should you recommend?()A、A storage group for each department.B、A mailbox database for each department.C、An organizational unit for each department.D、A managed folder mailbox policy for each department.
You are a systems administrator responsible for managing a Windows Server 2008 Web server. Recently,your organization set up a new IIS Web site that will be accessed by users outside of your organizations.Consultants should be able to connect to this Web site, using IIS Manager. Your organization’s securitypolicy prevents you from creating domain accounts or local user accounts for these users. You attempt touse the IIS Manager Permissions feature for the Web site. However, when you click Allow User, you areable to select only Windows users. How can you resolve this problem?()A、Verify that Management Service has been started.B、Reconfigure the file system permissions for the root folder of the Web site.C、Reconfigure Management Service to enable Windows And IIS Manager Credentials.D、Verify the Authentication settings for the Web site.
You are employed as the exchange administrator at TestKing.com. The TestKing.com network containsan Exchange Server 2010 Organization. TestKing.com has its headquarters in Chicago and a branchoffice in Dallas. TestKing.com has a global security group named TestFinance. TestFinance contains all the users in theFinance department. A new TestKing.com policy state that TestFinance have the nesessary permissons tosearch the mailboxes for e-mail messages containing certain words. The CIO wants you to recommend asolution that will comply with the new policy. What should you do?()A、Your solution should include a finance hold.B、Your solution should include mailbox journaling.C、Your solution should include a Discovery Management role group.D、Your solution should include administrator audit logging.
单选题You have an Exchange Server 2010 organization. You plan to delegate Exchange administrative rights to some users in the organization. You need to recommend a solution that tracks all changes made to the Exchange organization. What should you include in the solution?()Aadministrator audit loggingBcircular loggingCdiagnostic loggingDWindows Security Auditing
单选题You have an Exchange Server 2010 organization. You need to recommend a mailbox storage management solution for your organization to meet thefollowing requirements: .Apply quota limits for users by department.Automatically apply quota limits for new users What should you recommend?()AA storage group for each department.BA mailbox database for each department.CAn organizational unit for each department.DA managed folder mailbox policy for each department.
单选题You have an Exchange Server 2010 organization.You need to identify whether an administrator has made a configuration change in the Exchange organization.What should you run?()AGet-EventLogLevelBGet-ExchangeServerCExchange Best Practices AnalyzerDMicrosoft Baseline Security Analyzer (MBSA)
多选题In which two cases would you use an outer join? ()AThe tables being joined have NOT NULL columns.BThe tables being joined have only matched data.CThe columns being joined have NULL values.DThe tables being joined have only unmatched data.EThe tables being joined have both matched and unmatched data.FOnly when the tables have a primary key-foreign key relationship.
单选题There is a problem with one of the disks used for your database and your system administrator informs you that the disk needs to be replaced. The replacement disk will not be available until tomorrow. There was only one data file on this disk; it belongs to the USERS tablespace in your PROD database. Your PROD database runs in ARCHIVELOG mode and nightly online backups are taken. The users need to be able to access the data in the USERS tablespace before the replacement disk arrives. You have already taken the USERS tablespace offline and have restored the data file from last night’s backup to a new disk. Which additional steps are required in order to make the USERS tablespace available?()AOnly bring the tablespace back online.BOnly recover the tablespace and then bring the tablespace back online.CShut down the database, recover the data file and then start up the database.DIssue the ALTER DATABASE RENAME FILE command, recover the tablespace, and then bring the tablespace online.ERecover the tablespace, issue the ALTER DATABASE RENAME FILE command, and then bring the tablespace online.