Which of the following logs contains information on overall performance and events not related to user authentication?()A、SecurityB、AuditC、ApplicationD、System

Which of the following logs contains information on overall performance and events not related to user authentication?()

  • A、Security
  • B、Audit
  • C、Application
  • D、System

相关考题:

Two users share the same Windows 7 computer. The first user creates a document intended to be used by both users, and then logs off. The second user logs on and types the name of the document in the Start menu, but the document is not found. Which of the following is the problem?()A. The document is set to hidden.B. The document is locked.C. The document was saved as a system document.D. The document is owned by the first user.

While reviewing the backup logs a server administrator notices that a backup job for an application server on the same subnet has failed. Which of the following is MOST likely the problem?()A、The remote agent was not running.B、The management card has failed.C、The proxy server was blocking access.D、The hardware firewall was blocking access.

A technician installed a new application on a Windows XP desktop. When the technician tries to launch the application it crashes. Which of the following can the technician use to troubleshoot the application?()A、System logsB、Security logsC、Application logsD、Application installation logs

Two users share the same Windows 7 computer. The first user creates a document intended to be used by both users, and then logs off. The second user logs on and types the name of the document in the Start menu, but the document is not found. Which of the following is the problem?()A、The document is set to hidden.B、The document is locked.C、The document was saved as a system document.D、The document is owned by the first user.

An administrator has encountered a problem with a particular piece of software installed on the server and begins the troubleshooting process. Which of the following is the FIRST place the administrator should look for specific information about the problem?()A、The supporting documentationB、The vendor websiteC、The InternetD、The server event logs

A new server was installed for the purpose of monitoring network traffic. The network has been configured in such a way that all traffic will be mirrored out the port this server is connected to. When reviewing the network traffic logs on the server only traffic destined to the server is listed in the logs. Which of the following is preventing the server from seeing all network traffic?()A、NIC filtering is enabled.B、Port security is configured.C、NIC is not in promiscuous mode.D、NIC is in promiscuous mode.

An administrator is troubleshooting issues on an application server.After a root cause analysis,the administrator has determined that there were some unauthorized logins to the server.Which of the following locations would BEST help to determine details about the unauthorized logins?()A、Active DirectoryB、DHCP logsC、Security logsD、System logs

A server is having problems booting into the operating system.  Which of the following can provide important information to begin to trouble shoot the cause?()A、 System logsB、 Firmware updatesC、 POST messagesD、 Application logs

Which of the following can limit cabling mistakes?()A、Proper labelingB、Asset managementC、Keeping good vendor logsD、Keeping up-to-date repair logs

Which of the following commands can be used to review the system error logs?()A、 errpt -aB、 errpt -lC、 errdemon -lD、 syslogd -r

Which of the following files cannot be backed up by RMAN? ()(Choose all that apply.)A、Database datafilesB、Control filesC、Online redo logsD、Database pfilesE、Archived redo logs

Which of the following does the recover command not do?()  A、 Restore archived redo logs.B、 Apply archived redo logs.C、 Restore incremental backups.D、 Apply incremental backups.E、 Restore datafile images.

Which of the following parameters defines the location where Oracle should create archived redo logs?()A、LOG_ARCHIVE_1 B、LOG_DESTINATION_1 C、LOG_ARCHIVED_DESTINATION_1D、LOG_ARCHIVE_DEST_1E、LOG_ARCHIVE_SOURCE_1

单选题You are using Recovery wizard for performing incomplete recovery. Which of the following object types is NOT available in the Perform Recovery :Type screen?()A Whole databaseB TablespacesC DatafilesD Archive logsE Redo logs

单选题Two users share the same Windows 7 computer. The first user creates a document intended to be used by both users, and then logs off. The second user logs on and types the name of the document in the Start menu, but the document is not found. Which of the following is the problem?()AThe document is set to hidden.BThe document is locked.CThe document was saved as a system document.DThe document is owned by the first user.

多选题Which of the following files cannot be backed up by RMAN?()ADatabase datafilesBControl filesCOnline redo logsDDatabase pfilesEArchived redo logs

多选题Which of the following files cannot be backed up by RMAN? ()(Choose all that apply.)ADatabase datafilesBControl filesCOnline redo logsDDatabase pfilesEArchived redo logs

单选题You disabled the Flashback Database feature by using the following command:  SQL ALTER DATABASE FLASHBACK OFF;  What would be the effect of this command on the existing flashback logs?()AFlashback logs are not deleted.BFlashback logs are deleted automatically.CFlashback logs are deleted only if you are using Recovery Manager (RMAN).DFlashback logs are deleted only if you are using Oracle Managed Files (OMF).EFlashback logs are deleted only if you are using Automatic Storage Management (ASM).

单选题An administrator has encountered a problem with a particular piece of software installed on the serverand begins the troubleshooting process. Which of the following is the FIRST place the administrator should look for specific information about the problem?()A The supporting documentationB The vendors websiteC The InternetD The servers event logs

单选题A server is having problems booting into the operating system. Which of the following can provide important information to begin to troubleshoot the cause?()ASystem logsBFirmware updatesCPOST messagesDApplication logs

单选题Which of the following best describes a full backup? ()AAll datafiles of a database BAll datafiles, archive logs, and control files CAll datafiles and control files DAll the used blocks in a datafile

单选题Which of the following does the recover command not do?()A Restore archived redo logs.B Apply archived redo logs.C Restore incremental backups.D Apply incremental backups.E Restore datafile images.

单选题Which of the following parameters defines the location where Oracle should create archived redo logs?()ALOG_ARCHIVE_1 BLOG_DESTINATION_1 CLOG_ARCHIVED_DESTINATION_1DLOG_ARCHIVE_DEST_1ELOG_ARCHIVE_SOURCE_1