When CONFIGURE CONTROLFILE AUTOBACKUP is set to ON, RMAN automatically performs a control file autobackup in which three situations?()A、At the end of every RUN block. B、After every SET CONTROLFILE AUTOBACKUP FORMAT command. C、After every BACKUP or COPY command issued at the RMAN prompt. D、At the end of every RUN block if the last command in the block was either BACKUP or COPY. E、Whenever a BACKUP or COPY command within a RUN block is followed by a command that is neither BACKUP nor COPY. F、After every BACKUP or COPY command within a RUN block that is followed by the CONFIGURE CONTROLFILE AUTOBACKUP FORMAT command.

When CONFIGURE CONTROLFILE AUTOBACKUP is set to ON, RMAN automatically performs a control file autobackup in which three situations?()

  • A、At the end of every RUN block. 
  • B、After every SET CONTROLFILE AUTOBACKUP FORMAT command. 
  • C、After every BACKUP or COPY command issued at the RMAN prompt. 
  • D、At the end of every RUN block if the last command in the block was either BACKUP or COPY. 
  • E、Whenever a BACKUP or COPY command within a RUN block is followed by a command that is neither BACKUP nor COPY. 
  • F、After every BACKUP or COPY command within a RUN block that is followed by the CONFIGURE CONTROLFILE AUTOBACKUP FORMAT command.

相关考题:

通过改变参数“接入控制等级(ACC_CONTR_CLASS)”,可限制一些等级的用户接入,减轻网络负荷。“ACC_CONTR_CLASS”越大,其优先级越高。 A.错误B.正确

What are three necessary steps for enabling 802.1X access when configuring Layer 2 enforcement?() A. Configure a location groupB. Createan authentication protocol setC. Configure the RADIUS AV pair listD. Configure RADIUS clientsE. Configure role and role-mapping rules

Which two steps are needed when configuring multiple RPs using MSDP within a single PIM domain? () A. Configure a non-unique address on the loopback interface for use by the PIM RP.B. Configure MSDP with the unique address (router ID) as the local address of the peer.C. Configure MSDP with the non-unique address (router ID) as the local address of the peer.D. Configure a unique address on the loopback interface, used as the PIM RP.

Which action is optional when adding an authentication realm for use on an Infranet Controller? () A. Modify sign-in policy.B. Configure role mapping.C. Assign authentication server.D. Configure authentication policy.

Which additional configuration must be completed when setting up role restrictions using certificates? () A. Set up a certificate authentication server.B. Configure the authentication realm to remember certificate information.C. Configure the authentication realm to use a certificate server for authentication.D. Configure a role mapping rule requiring certification information to map user to role.

Which of the following utilities would be used to configure energy saving measures when a laptop switches to battery power?() A.MSTSCB.ACPIC.GDID.MSCONFIG

When configuring private VLANs, which configuration task must you do first?()A、Configure the private VLAN port parameters.B、Configure and map the secondary VLAN to the primary VLAN.C、Disable IGMP snooping.D、Set the VTP mode to transparent.

What is required to enable fragmentation of large FTP packets when voice quality on the network is affected by FTP transfers?()A、Configure TCP header compression on interfaceB、Configure MPL on the Frame Relay interfacesC、Configure FRF 12 fragmentation on the Frame Relay interfacesD、Fragmentation is not supported with service internetworking

You are the network administrator for Company.  Five of Company’s employees have Windows 2000 Professional portable computers. The employees use their portable computers in a network enabled docking station when they are at their desks. When the employees are working outside of the office, they use the portable computers without network connectivity. You have just installed wireless PC Card network adapters in the portable computers so that the employees can access the network when they are in conference rooms in the office building.  You need to configure the portable computers to always allow the employees to choose which network environment to use when they start their portable computers.   What should you do?()A、Configure three different hardware profiles on each portable computer.B、Configure a single hardware profile and rename it to Universal Profile.C、Configure the wireless PC Card network adapters to use Automatic Private IP Addressing      (APIPA) when they cannot detect a DHCP server.D、Instruct each employee to unplug the wireless PC Card network adapter whenever the      portable computer is attached to a network-enabled docking station.E、Configure the hardware profiles selection to wait until a hardware profile is selected.F、Configure the hardware profiles selection to select the first profile listed and set the wait time to zero seconds.G、 Configure the wireless PC Card network adapters to use DHCP to obtain their IP addresses.

What are three necessary steps for enabling 802.1X access when configuring Layer 2 enforcement?()A、Configure a location groupB、Createan authentication protocol setC、Configure the RADIUS AV pair listD、Configure RADIUS clientsE、Configure role and role-mapping rules

A policy-based IPsec VPN is ideal for which scenario?()A、when you want to conserve tunnel resourcesB、when the remote peer is a dialup or remote access clientC、when you want to configure a tunnel policy with an action of denyD、when a dynamic routing protocol such as OSPF must be sent across the VPN

Which two steps are needed when configuring multiple RPs using MSDP within a single PIM domain? ()A、Configure a non-unique address on the loopback interface for use by the PIM RP.B、Configure MSDP with the unique address (router ID) as the local address of the peer.C、Configure MSDP with the non-unique address (router ID) as the local address of the peer.D、Configure a unique address on the loopback interface, used as the PIM RP.

通过改变参数“接入控制等级(ACC_CONTR_CLASS)”,可限制一些等级的用户接入,减轻网络负荷。“ACC_CONTR_CLASS”越大,其优先级越高。

Which of the following utilities would be used to configure energy saving measures when a laptop switches to battery power?()A、MSTSCB、ACPIC、GDID、MSCONFIG

When connecting a laser printer to a network for the first time, a technician should FIRST:()A、configure the network settings on the printer.B、ensure the cable is set to TCP/IP.C、enable the printer in the BIOS.D、configure the printer as bi-directional in Windows.

A system is being planned with three production partitions, one each for an IBM i, AIX standard edition, and Power Linux applications. One fibre-channel attached TS3100 tape library will be shared between the partitions for backup. Which solution provides tape library sharing with minimum operator intervention?()A、Configure VIO Server Express Edition to control the tape library through one fibre channel card.Assign the library to the production partitions when needed.B、Configure the IBM i partition to own the tape library.Use IBM i virtualization to host a virtual tape libraryconnection to the AIX and Linux partition.Assign the library to the production partitions when needed.C、Configure a fibre channel card for each partition, and a configure fibre switch.Connect the partitions and tape library to the switch.Zone the switch so all partitions can enable the tape when needed and disable the tape when finished.D、Configure AIX to control the tape library through one fibre channel adapter.Use AIX virtualization to host a virtual tape library connection to the IBM i and Linux partitions.Assign the library to the production partitions when needed.

Which action is optional when adding an authentication realm for use on an Infranet Controller? ()A、Modify sign-in policy.B、Configure role mapping.C、Assign authentication server.D、Configure authentication policy.

Which additional configuration must be completed when setting up role restrictions using certificates? ()A、Set up a certificate authentication server.B、Configure the authentication realm to remember certificate information.C、Configure the authentication realm to use a certificate server for authentication.D、Configure a role mapping rule requiring certification information to map user to role.

Your portable computer is in sleep mode. When you resume work on the portable computer, you are not prompted for a password.  You need to ensure that you are prompted for a password each time the portable computer recovers from sleep mode.  What should you do?()A、Configure the computer to hibernate when not in use.B、In the current power plan settings, configure the computer to require a password when recovering from sleep mode.C、Configure the computer to use the High Performance power plan.D、Configure the screen saver settings to require a password on resumption of work.

Your computer has a wired network adapter and a wireless network adapter. You use the wireless network adapter only when traveling.  You need to configure the network adapter profile settings to ensure that other systems are allowed to discover your computer only when you are at home.  What are two possible ways to achieve this goal?()A、When you configure access to the wired network at home, set the wired network adapter location type to Private.B、When you configure access to the wired network at home, set the wired network adapter location type to Public.C、When you configure access to the public wireless access points, set the wireless network adapter location type to Private.D、When you configure access to the public wireless access points, set the wireless network adapter location type to Public.

Five of your company’s employees have Windows 2000 Professional portable computers. The employees use their portable computers in a network-enabled docking station when they are at their desks. When the employees are working outside of the office, they use the portable computers without network connectivity.   You have just installed wireless PC Card network adapters in the portable computers so that the employees can access the network when they are in conference rooms in the office building.   You need to configure the portable computers for optimum performance in all of the working environments. What should you do? ()A、Configure the wireless PC Card network adapters to use DHCP to obtain their IP addresses.B、Configure three different hardware profiles on each portable computer.C、Configure the wireless PC Card network adapters to use Automatic Private IP Addressing (APIPA) when they cannot detect a DHCP server.D、Instruct each employee to unplug the wireless PC Card network adapter whenever the portable computer is attached to a network-enabled.

You need to design the configuration on one Windows Server 2003 terminal server that hosts the SalesForceMax application to meet security requirements. Which three actions should you take?()A、Configure the terminal server so that users log on by using local user accountsB、Configure the terminal server so that users log on by using domain accountsC、Configure the server to run SalesForceMax in a dedicated window when a user logs on to the terminal serverD、Configure the server to allow each user to have a Windows desktop when the user logs on to the terminal serverE、Use software restriction polices in Group Policy objects (GPOs) that apply to the terminal serverF、Use Appsec.exe to restrict applications on the terminal server

A medical customer has an installed HS21 blade with no local disk. They are attempting to set up boot from SAN using a Windows 2003 CD. Which sequence is correct for this procedure? ()A、Install Windows from the CD using the QLogic driver provided on the CD, configure the LUN and zone for the target server, and then configure the blade UEFI to boot from SAN.B、Configure the LUN and zone for the target server, install Windows from the CD and press F6 when prompted to supply the driver, and then configure the QLogic adapter BIOS to boot from SAN. C、Configure the LUN and zone for the target server, configure the QLogic adapter BIOS to boot from SAN, install Windows from the CD, and then press F6 when prompted to supply the driver. D、Configure the blade UEFI to boot from SAN, configure the LUN and zone for the target server, and then install Windows from the CD using the QLogic driver provided on the CD

单选题You have enabled backup optimization in RMAN. You issue the following RMAN command to configure a redundancy-based retention policy: CONFIGURE RETENTION POLICY TO REDUNDANCY 3; Which statement is true?()AThe command fails because you cannot configure a redundancy-based retention policy when backup optimization is enabledBBackup optimization is performed, but RMAN considers the redundancy-based retention policy when it determines which datafiles should be backed upCBackup optimization is permanently disabledDBackup optimization is temporarily disabled because a redundancy-based retention policy is specified

单选题You have enabled backup optimization in RMAN. You issue the following RMAN command to configure a redundancy-based retention policy:   CONFIGURE RETENTION POLICY TO REDUNDANCY 3;   Which statement is true?()A The command fails because you cannot configure a redundancy-based retention policy when backup  optimization is enabledB Backup optimization is performed, but RMAN considers the redundancy-based retention policy when it determines which datafiles should be backed upC Backup optimization is permanently disabledD Backup optimization is temporarily disabled because a redundancy-based retention policy is specified

多选题When using Cisco Network Assistant to configure smartports, Which tow of the following roles can belong to a VLAN of the type "access" ?()APhone+DesktopBDesktopCSwitchDRouterETrunk

判断题通过改变参数“接入控制等级(ACC_CONTR_CLASS)”,可限制一些等级的用户接入,减轻网络负荷。“ACC_CONTR_CLASS”越大,其优先级越高。A对B错

多选题Your computer has a wired network adapter and a wireless network adapter. You use the wireless network adapter only when traveling.  You need to configure the network adapter profile settings to ensure that other systems are allowed to discover your computer only when you are at home.  What are two possible ways to achieve this goal?()AWhen you configure access to the wired network at home, set the wired network adapter location type to Private.BWhen you configure access to the wired network at home, set the wired network adapter location type to Public.CWhen you configure access to the public wireless access points, set the wireless network adapter location type to Private.DWhen you configure access to the public wireless access points, set the wireless network adapter location type to Public.