What is the advantage of setting the ASM-preferred mirror read for the Stretch cluster configuration?()A、It improves resync operations.B、This feature enables much faster file opens.C、It improves performance as fewer extent pointers are needed in the shared pool.D、It improves performance by reading from a copy of an extent closest to the node.
What is the advantage of setting the ASM-preferred mirror read for the Stretch cluster configuration?()
- A、It improves resync operations.
- B、This feature enables much faster file opens.
- C、It improves performance as fewer extent pointers are needed in the shared pool.
- D、It improves performance by reading from a copy of an extent closest to the node.
相关考题:
What is the advantage of setting the ASM-preferred mirror read for the Stretch cluster configuration?() A. It improves resync operations.B. This feature enables much faster file opens.C. It improves performance as fewer extent pointers are needed in the shared pool.D.It improves performance by reading from a copy of an extent closest to the node.
Which two statements are true about variable extent size support for large ASM files?() A. The metadata used to track extents in SGA is reduced.B. Rebalance operations are completed faster than with a fixed extent sizeC. An ASM Instance automatically allocates an appropriate extent size.D. Resync operations are completed faster when a disk comes online after being taken offline.E. Performance improves in a stretch cluster configuration by reading from a local copy of an extent.
Which of the following improves wireless performance by allowing only one wireless transmissionon the network at a time?() A. CSMA/CAB. CSMA/CDC. Wireless encryptionD. Wireless bonding
The author uses power walking as an example mainly because______A. it is an outdoor sportB. it improves our healthC. it uses fewer resourcesD. it is recommended by experts
What Cisco Security Agent Interceptor is in charge of intercepting all read/write requests to the rc files in UNIX?()A、Configuration interceptorB、Network interceptorC、File system interceptorD、Execution space interceptor
Which of the following statements is NOT true about RMAN?()A、It improves usability by enabling you to reuse the scripts to perform recovery operations.B、It detects block corruption while restoration and recovery operations.C、It enables you to perform block media recovery.D、It is capable to recover through unrecoverable operations, with only full database backups.
You can control instance recover performance by setting parameters to define targets for()A、The size of the redo buffer in SGA. B、The instance that will perform recovery in Real Application Cluster database. C、The number of blocks to be read during instance recovery, or the time needed to complete instance recovery. D、The number of passes through the redo logs made by the recovery process to identify blocks needing recovery.
Which of the following improves wireless performance by allowing only one wireless transmissionon the network at a time?()A、CSMA/CAB、CSMA/CDC、Wireless encryptionD、Wireless bonding
A customer has a POWER6 520 system with 6 partitions. They plan to upgrade their system and need to determine the current hardware configuration of the partitions before making any upgrade decisions. What is needed to read the exported system plan and design the new system?()A、e-ConfigB、System Planning Tool (SPT)C、IBM Workload Estimator (WLE)D、IBM Performance Monitor (PM)
An administrator is planning for a six node cluster but is concerned about the administration needed tomanage user accounts throughout the cluster. What PowerHA feature could the administrator use to reducethe administration overhead?()A、LDAP Authentication ModuleB、Smart Assist for Active DirectoryC、C-SPOC for user and password managementD、File Collections designating one node as the primary authentication node
Which the two are characteristics of the Service Locator pattern?()A、 It encapsulates component lookup proceduresB、 It increases source code duplication and decreases reuseC、 It improves client performance by caching context and factory objectsD、 It degrades network performance due to increased access to distributed lookup services
Identify three benefits of Unified Auditing.()A、Decreased use of storage to store audit trail rows in the database.B、It improves overall auditing performance.C、It guarantees zero-loss auditing.D、The audit trail cannot be easily modified because it is read-only.E、It automatically audits Recovery Manager (RMAN) events.
You are managing an Oracle 11g database with ASM storage, for which the COMPATIBLE initialization parameter is set to 11.1.0. In the ASM instance, the COMPATIBLE.RDBMS attribute for the disk group is set to 10.2 and the COMPATIBLE.ASM attribute is set to 11.1. Which two statements are true in this scenario for the features enabled for ASM? ()A、The ASM-preferred mirror read feature is enabled.B、The ASM supports variable sizes for extents of 1, 8, and 64 allocation units.C、The ASM disk is dropped immediately from a disk group when it becomes unavailable.D、The RDBMS always reads the primary copy of a mirrored extent of the ASM disk group.
What are the advantages of variable extent size support for large ASM files?()A、It improves resync operations when the disk comes online after being taken offline for maintenance purposes. B、It improves performance in the extended cluster configuration by reading from a local copy of an extent. C、Fewer extent pointers are needed to describe the file and less memory is required to manage the extent maps in the shared pool.D、This feature enables faster file opens because of the reduction in the amount of memory that is required to store file extents.
Using a bitmap structure to manage database object space has several benefits over using freelist structures. Which three are benefits of managing space using automatic-segment-space managed objects?()A、It readily responds to dynamic changes for concurrent access. B、It improves performance and space utilization in a multiple-instance environment. C、It requires fewer space related options then freelist managed structures. D、It improves performance for SYSTEM tablespaces where a high degree of concurrency is required.
You add a Windows Server 2008 R2 server with the Hyper-V role installed to an existing Hyper-V failover cluster. After you move a virtual machine (VM) to the new cluster node, Microsoft System Center Virtual Machine Manager (VMM) 2008 R2 reports the status of the VM as Unsupported Cluster Configuration. You need to be able to manage the VM by using VMM. What should you do?()A、Disable TCP Chimney Offload on the new cluster nodes network adaptersB、Disable the TCP/IP Offload Engine (TOE) on the new cluster nodes network adapters.C、Move the VM configuration file to a local storage device, and update the pointer to the file.D、Update the virtual networking configuration of the new cluster node to match the virtual networking configuration of the original cluster nodes.
You are configuring a failover cluster for a database server. You are assigning four nodes to the cluster. Allnodes have access to a SAN,and adequate storage is available. Which of the following options should youchoose for your quorum configuration?()A、Node MajorityB、Node And Disk MajorityC、Node And File Share MajorityD、No Majority: Disk Only
多选题Using a bitmap structure to manage database object space has several benefits over using freelist structures. Which three are benefits of managing space using automatic-segment-space managed objects?()AIt readily responds to dynamic changes for concurrent access.BIt improves performance and space utilization in a multiple-instance environment.CIt requires fewer space related options then freelist managed structures.DIt improves performance for SYSTEM tablespaces where a high degree of concurrency is required.
单选题What is the advantage of setting the ASM-preferred mirror read for the Stretch cluster configuration?()A It improves resync operations.B This feature enables much faster file opens.C It improves performance as fewer extent pointers are needed in the shared pool.D It improves performance by reading from a copy of an extent closest to the node.
单选题An administrator is planning for a six node cluster but is concerned about the administration needed tomanage user accounts throughout the cluster. What PowerHA feature could the administrator use to reducethe administration overhead?()ALDAP Authentication ModuleBSmart Assist for Active DirectoryCC-SPOC for user and password managementDFile Collections designating one node as the primary authentication node
多选题Which two statements are true about variable extent size support for large ASM files?()AThe metadata used to track extents in SGA is reduced.BRebalance operations are completed faster than with a fixed extent sizeCAn ASM Instance automatically allocates an appropriate extent size.DResync operations are completed faster when a disk comes online after being taken offline.EPerformance improves in a stretch cluster configuration by reading from a local copy of an extent.
单选题You can control instance recover performance by setting parameters to define targets for()AThe size of the redo buffer in SGA. BThe instance that will perform recovery in Real Application Cluster database. CThe number of blocks to be read during instance recovery, or the time needed to complete instance recovery. DThe number of passes through the redo logs made by the recovery process to identify blocks needing recovery.
单选题You are configuring a failover cluster for a database server. You are assigning four nodes to the cluster. Allnodes have access to a SAN,and adequate storage is available. Which of the following options should youchoose for your quorum configuration?()ANode MajorityBNode And Disk MajorityCNode And File Share MajorityDNo Majority: Disk Only
多选题What are the advantages of variable extent size support for large ASM files?()AIt improves resync operations when the disk comes online after being taken offline for maintenance purposes.BIt improves performance in the extended cluster configuration by reading from a local copy of an extent.CFewer extent pointers are needed to describe the file and less memory is required to manage the extent maps in the shared pool.DThis feature enables faster file opens because of the reduction in the amount of memory that is required to store file extents.
单选题What is the name of the file that is used to provide the configuration setting in unattended mode?()AAnswer file.BStartup file.CUnattended configuration file.DNetwork file.
单选题What is the advantage of setting the ASM-preferred mirror read for the Stretch cluster configuration?()AIt improves resync operations.BThis feature enables much faster file opens.CIt improves performance as fewer extent pointers are needed in the shared pool.DIt improves performance by reading from a copy of an extent closest to the node.
多选题Identify three benefits of Unified Auditing.()ADecreased use of storage to store audit trail rows in the database.BIt improves overall auditing performance.CIt guarantees zero-loss auditing.DThe audit trail cannot be easily modified because it is read-only.EIt automatically audits Recovery Manager (RMAN) events.