Core files required for user applications are stored in which of the following locations?()A、Program filesB、Temporary filesC、WindowsD、Documents and settings

Core files required for user applications are stored in which of the following locations?()

  • A、Program files
  • B、Temporary files
  • C、Windows
  • D、Documents and settings

相关考题:

Identify two situations in which you can use Data Recovery Advisor for recovery. ()(Choose two.) A. The user has dropped an important table that needs to be recovered.B. The database files are corrupted when the database is open.C. You are not able to start up the database instance because the required database files are missing.D. The archived log files are missing for which backup is not available.

Which command would allow you to compare two files stored on your router?() A.user@hostfile show filename1 compare filename2B.user@hostfile compare files filename1 filename2C.user@hostcompare files filename1 filename2D.user@hostcompare filename1 filename2

A user copied files from a CD and now the files can only be opened as read-only. Which of the following utilities can be used to allow the user the ability to edit the files?() A.EDITB.CHMODC.ATTRIBD.CONVERT

In the parameter file of the production database, the BACKGROUND_DUMP_DEST parameter is set to $ORACLE_HOME/users. Which two types of files would you find in this location?()A、the alert log fileB、the core dump filesC、the change tracking fileD、the user session trace filesE、the database audit trail filesF、the background process trace files

You configured the Flash Recovery Area (FRA) for your database. The database instance is running inARCHIVELOG mode. The default location for the archived redo log files is the Flash Recovery Area.  Which twofiles are removed automatically if the space is required in the FRA as per the retention policy()A、Flashback log filesB、Backups that have become obsoleteC、User managed backups of the data files and control filesD、Archived redo log files that have multiple copies in a different archive location and not backed up

A user states that when the user copies files from ‘My Documents’ to a network share, the files are no longer available locally. Which of the following BEST describes the reason the files are no longer visible?()A、The user copied to a read-only folder share.B、The user changed the attributes of the files.C、The user copied the files from the local My Documents folder.D、The user moved instead of copied the files.

A user copied files from a CD and now the files can only be opened as read-only. Which of the following utilities can be used to allow the user the ability to edit the files?()A、EDITB、CHMODC、ATTRIBD、CONVERT

Which of the following access levels allows a user to perform normal day to day work with their own files but does not allow them to change system files or computer performance?()A、AdministratorB、UserC、GuestD、Power user

A user reports that they are unable to open any audio files. Yesterday, the user uninstalled third party music software. Which of the following is the MOST likely cause of the user’s error?()A、The file associations were not returned after the software was uninstalled.B、The user is not opening the files correctly.C、The uninstalled software has corrupted all the audio files on the computer.D、The sound card is not properly configured.

Which command will set the core size file to unlimited for the user ‘webapp’?()A、no -p ’core=-1’ webappB、chuser ’core=-1’ webappC、setsenv -attr ’core=unlimited’ webappD、chsec -f ’/etc/security/limits’ ’core=-1’ webapp

Identify two situations in which you can use Data Recovery Advisor for recovery.() A、 The user has dropped an important table that needs to be recovered.B、 The database files are corrupted when the database is open.C、 You are not able to start up the database instance because the required database files are missing.D、 The archived log files are missing for which backup is not available.

You created a profile APP_USER and assigned it to the users. After a month, you decide to drop theprofile.Some user sessions are currently connected to the database instance and are using the APP_USERprofile. This command is used to drop the profile: SQL DROP PROFILE app_user;  Which statement describes the result()A、The command produces an error.B、The profile is dropped and current user sessions use the DEFAULT profile immediately.C、The profile is dropped and only the subsequent user sessions use the DEFAULT profile.D、The profile is dropped, the sessions are terminated, and the subsequent user sessions use theDEFAULT profile.

单选题Examine the following values of the initialization parameters in the database having the SID ORCL:   BACKGROUND_DUMP_DEST=/u01/app/oracle/product/11.1.0/db_1/bdump USER_DUMP_DEST=/u01/app/oracle/product/11.1.0/db_1/udump CORE_DUMP_DEST=/u01/app/oracle/product/11.1.0/db_1/cdump DIAGNOSTIC_DEST=   The environment variables have the following value:   ORACLE_BASE=/u01/app/oracle  ORACLE_HOME=/u01/app/oracle/product/11.1.0/db_1   What is the location of the Automatic Diagnostic Repository (ADR) home?()A /u01/app/oracle/product/11.1.0/db_1B /u01/app/oracleC $ORACLE_HOME/bdumpD $ORACLE_HOME/log

多选题Identify two situations in which you can use Data Recovery Advisor for recovery.()AThe user has dropped an important table that needs to be recovered.BThe database files are corrupted when the database is open.CYou are not able to start up the database instance because the required database files are missing.DThe archived log files are missing for which backup is not available.

单选题Which command will set the core size file to unlimited for the user‘webapp’?()Ano -p 'core=-1' webappBchuser 'core=-1' webappCsetsenv -attr 'core=unlimited' webappDchsec -f '/etc/security/limits' 'core=-1' webapp

单选题A user named User1 has a computer named Computer1 that runs Windows XP Professional. User1 has a folder that contains encrypted files. You purchase a new computer named Computer2. You back up User1's files and restore them to Computer2. You need to ensure that User1 can access the encrypted files on Computer2. What should you do?()AInstruct User1 to create a new user certificate on Computer2.BInstruct User1 to take ownership of the encrypted files on Computer2.CInstruct User1 to import the user certificate from Computer1 to Computer2.  DLog on to Computer2 by using the local administrator account. Configure User1 as the recovery agent account.

多选题Your database operates in ARCHIVELOG mode and all the tablespaces are online. Due to a user error, you decided to perform an incomplete recovery.  Which two tasks would you be required to perform in the recovery process? ()Aopen the database with the RESETLOGS optionBopen the database with the RESTRICTED optionCrecover all the data files to the same system change number (SCN)Drecover to the required SCN only that data file in which the error occurred

多选题Your network consists of three Active Directory forests. Forest trust relationships exist between all forests. Each forest contains one domain. All domain controllers run Windows Server 2008 R2. Your company has three network administrators. Each network administrator manages a forest and the Group Policy objects (GPOs) within that forest.   You need to create standard GPOs that the network administrators in each forest will use. The GPOs must meet the following requirements:   èThe GPOs must only contain settings for either user configurations or computer configurations. èThe number of GPOs must be minimized.   Which two actions should you perform?()AExport the new GPOs to .cab files. Ensure that the .cab files are available to the network administrator  in each forest.BCreate two new GPOs. Configure both GPOs to use the required user configurations and the required  computer configurations.CCreate two new GPOs. Configure one GPO to use the required user configuration. Configure the other GPO to use the required computer configuration.DBack up the Sysvol folder that is located on the domain controller where the new GPOs were created. Provide the backup to the network administrator in each forest.

单选题Core files required for user applications are stored in which of the following locations?()AProgram filesBTemporary filesCWindowsDDocuments and settings

单选题A user reports that they are unable to open any audio files. Yesterday, the user uninstalled third party music software. Which of the following is the MOST likely cause of the user’s error?()AThe file associations were not returned after the software was uninstalled.BThe user is not opening the files correctly.CThe uninstalled software has corrupted all the audio files on the computer.DThe sound card is not properly configured.

多选题Identify two situations in which you can use Data Recovery Advisor for recovery. ()(Choose two.)AThe user has dropped an important table that needs to be recovered.BThe database files are corrupted when the database is open.CYou are not able to start up the database instance because the required database files are missing.DThe archived log files are missing for which backup is not available.

多选题Your database operates in ARCHIVELOG mode and all the tablespaces are online. Due to a user error, you decided to perform an incomplete recovery. Which two tasks would you be required to perform in the recovery process?()Aopen the database with the RESTRICTED optionBopen the database with the RESETLOGS optionCrecover to the required SCN only that data file in which the error occurredDrecover all the data files to the same system change number (SCN)

单选题You created a profile APP_USER and assigned it to the users. After a month, you decide to drop theprofile.Some user sessions are currently connected to the database instance and are using the APP_USERprofile. This command is used to drop the profile: SQL DROP PROFILE app_user;  Which statement describes the result()AThe command produces an error.BThe profile is dropped and current user sessions use the DEFAULT profile immediately.CThe profile is dropped and only the subsequent user sessions use the DEFAULT profile.DThe profile is dropped, the sessions are terminated, and the subsequent user sessions use theDEFAULT profile.

单选题The instance abnormally terminates because of a power outage. Which statement is true about redolog files during instance recovery()AInactive and current redo log files are required to accomplish recovery.BOnline and archived redo log files are required to accomplish instance recovery.CAll redo log entries after the last checkpoint are applied from redo log files to data files.DAll redo log entries recorded in the current redo log file until the checkpoint position are applied to datafiles.

单选题A user states that when the user copies files from ‘My Documents’ to a network share, the files are no longer available locally. Which of the following BEST describes the reason the files are no longer visible?()AThe user copied to a read-only folder share.BThe user changed the attributes of the files.CThe user copied the files from the local My Documents folder.DThe user moved instead of copied the files.

单选题You have two computers named Computer1 and Computer2. The computers run Windows XP Professional and are joined to an Active Directory domain. Computer1 contains the recovery agent certificate for the domain. A domain user named User1 encrypts files on Computer2 in a folder named C:/User1.  The user leaves the company and the administrator deletes User1’s account. You need to decrypt the files encrypted by User1. What should you do?()ALog on to Computer2 by using the domain administrator account. At the command prompt, run cipher.exe /u c:/user1/*.*. BCreate a new domain user account named User1. Log on to Computer2 as User1. Modify the properties of the encrypted files. CRemove Computer2 from the domain. Log on to Computer2 by using the local administrator account. Modify the properties of the encrypted files. DBack up the encrypted files on Computer2. Restore the files on Computer1. Log on to Computer1 by using the recovery agent account and modify the properties of the encrypted files.

单选题Given classes defined in two different files: What is required at line 5 in class SomeApp to use the process method of BitUtils?()A process(bytes);B BitUtils.process(bytes);C app.BitUtils.process(bytes);D util.BitUtils.process(bytes);E import util.BitUtils.*; process(bytes);F SomeApp cannot use the process method in BitUtils.

多选题In the parameter file of the production database, the BACKGROUND_DUMP_DEST parameter is set to $ORACLE_HOME/users. Which two types of files would you find in this location?()Athe alert log fileBthe core dump filesCthe change tracking fileDthe user session trace filesEthe database audit trail filesFthe background process trace files