You configured the Flash Recovery Area (FRA) for your database. The database instance is runningin ARCHIVELOG mode. The default location for the archived redo log files is the Flash Recovery Area.  Which two files are removed automaticallyif the space is required in the FRA as per the retention policy()A、flashback log filesB、backups that have become obsoleteC、copies of the data files and control filesD、archived redo log files that have multiple copies in a different archive location and not backed up

You configured the Flash Recovery Area (FRA) for your database. The database instance is runningin ARCHIVELOG mode. The default location for the archived redo log files is the Flash Recovery Area.  Which two files are removed automaticallyif the space is required in the FRA as per the retention policy()

  • A、flashback log files
  • B、backups that have become obsolete
  • C、copies of the data files and control files
  • D、archived redo log files that have multiple copies in a different archive location and not backed up

相关考题:

You create a service and deploy it on a network in a building named Building1. You will deploy the service to Building2.The service in Building1 is configured using the following discovery scopes.The service in Building2 will be configured using the following discovery scopes.You need to ensure that the client application can discover the service in Building1 or the service in Building2.Which scopes should you add to the client configuration file? ()A.B.C.D.

Your portable computer has a Virtual Private Network (VPN) connection configured. You need to connect to the VPN.What should you do?() A.AB.BC.CD.D

You work as a network engineer at TestKing.com. TestKing users have noticed extremely slow network performance, intermittent connectivity, and connection loss. After entering the show interfaces command, you notice that the Ethernet interface is configured as 100 Mbps full-duplex and that there is evidence of late collisions. What could be the cause of this problem?()A. duplex mismatchB. a routing loopC. trunking mode mismatchD. improperly configured root bridgeE. improperly configured static VLAN

You are a network administrator at TestKing, Inc. and you‘re getting complaintsthat users on the TestKing2 Ethernet network can‘t access the TestKing1 site. Totroubleshoot this, you begin by looking at the Testking1 and Testking2 routerconfigurations as shown below:Based on the above output, what is the underlying cause of this problem?()A. Link state routing protocol is missing.B. Incorrectly configured IP addressesC. IGRP is incorrectly configured.D. Frame relay is not configured.E. None of the above

You work as a network engineer at TestKing.com. You are required to allow establishment of a Telnet session with a router TestKingC.Which set command must be configured?() A.B.C.D.E.F.

You are using AutoQoS Enterprise and realize that the results are not what you expected. Whichof the following are possible reasons for AutoQoS not functioning correctly?(Choose all thatapply.)()A、The interface you configured for AutoQoS is set to half-duplexB、AutoQoS was configured on only one end of the linkC、The interface you configured for AutoQoS has no IP addressD、The interface’s bandwidth is not correctly configuredE、CEF is not enabled on the interfaceF、You enabled AutoQoS on the interface but forgot to enable globally first

You need to deploy a WSUS server in the branch office that meets the company’s technical requirements.   What should you deploy?()A、an autonomous WSUS server that is configured to download updates from Microsoft UpdateB、an autonomous WSUS server that is configured to download updates from the WSUS server in the main officeC、a WSUS server running in replica mode that is configured to download updates from Microsoft UpdateD、a WSUS server running in replica mode that is configured to download updates from the WSUS server in the main office

You work as the IT professional in an international company which is named Wiikigo. You are experiencedin implementing and administering a network operating system. You are specialized in deploying servers,configuring Windows Server 2008 Terminal services and network application services, and configuring aweb services infrastructure. A Windows Server 2008 server is contained by your company and the WebServer (IIS) server role is installed on the server. A Web site is included by the server. Since you are thetechnical report, you are required to encrypt the cookies sent from the Web site on users computers. Which Web site feature should be configured to achieve the goal?()A、To achieve the goal, Authorization Rules should be configured.B、To achieve the goal, Pages And Controls should be configured.C、To achieve the goal, SSL Settings should be configured.D、To achieve the goal, Machine Key should be configured.

You are trying to initiate an SSH connection to a remote router and are getting rejected with an error code of 0. Which of these might be the cause of the error?()A、The routers are using different SSH versions.B、You are trying to log in using invalid credentials.C、The RSA key pair is not properly configured on the SSH client.D、The RSA key pair is not properly configured on the SSH server.

You have just reinstalled a VIP 6-80 in a Cisco 7500 Series router. What must you do to bring up the port adapter interfaces?()A、All interfaces are online by default once the VIP is up and running normally.B、All interfaces must be manually brought online, even those previously configured.C、The previous VIP configuration must be reloaded to bring interfaces online.D、Any interfaces not previously configured must be manually configured and brought online.

You are maintaining the SALES database for eSoft Corporation. You have not configured ASMM on the database. You want to know what size of the SGA will provide the best performance.  Which advisor would you use to determine the suitable size of the SGA?()A、 SQL Tuning AdvisorB、 Undo AdvisorC、 ADDMD、 Memory Advisor

You work in a company which is named Wiikigo Corp. The company uses SQL Server 2008. You are the administrator of the company database. Now you are in charge of a SQL Server 2008 instance. There is an internal application which uses Analysis Services and Reporting Services. You use the application on the basis of SQL Server 2008. According to the requirement of company security policy, the surface area for all the deployed components of SQL Server 2008 should be configured. You have to implement the security policy and devise a method to evaluate the security policy against other database servers. What should you do?()  A、You should create policies based on the appropriate facets. Apply the policies against a server group. The server group includes the database servers that need to be configured B、You should create a Transact-SQL script based on the sp_configure stored procedure. Use a configuration server to run the script against a server group that includes the database servers that need to be configured C、You should edit the RSReportServer.config configuration file. Distribute the file to all database servers that need to be configured D、You should analyze your database servers by using the SQL Server Best Practices Analyzer (BPA). Implement the recommendations of the BPA

You plan to implement a WSUS server in a branch office.You need to recommend a solution for deploying the WSUS server that meets the company's technicalequirements.   What should you include in the recommendation?()A、an autonomous WSUS server that is configured to download updates from Microsoft UpdateB、an autonomous WSUS server that is configured to download updates from the WSUS server in the main officeC、a WSUS server running in replica mode that is configured to download updates from Microsoft UpdateD、a WSUS server running in replica mode that is configured to download updates from the WSUS server  in the main office

You create a Web Form. The Web Form allows users to recover their passwords. You add a PasswordRecovery server control by using the following code segment.You need to ensure that the server control generates a new password and sends it by e-mail to the users e?mail address. Which two actions should you perform?()A、Create a valid definition in the Web.config file.B、Set the passwordFormat attribute of the configured membership provider to Encrypted.C、Ensure that the enablePasswordRetrieval attribute of the configured membership provider is set to False.D、Ensure that the enablePasswordRetrieval attribute of the configured membership provider is set to True.

You work as the IT professional in an international company which is named Wiikigo. You are experiencedin implementing and administering a network operating system. You are specialized in deploying servers,configuring Windows Server 2008 Terminal services and network application services, and configuring aweb services infrastructure. You are in charge of a server that runs Windows Server 2008. The Web Server(IIS) server role and the FTP Publishing Service role service are installed on the server. You have a newFTP site added to the server. You have to make sure that the new FTP site is available. In order to makesure of this,what action should you perform?()A、In order to make sure of this, the iisreset command should be run on the server.B、In order to make sure of this, a host header file should be configured in the default Web site properties.C、In order to make sure of this, an alternate IP address should be configured in the default Web siteproperties.D、In order to make sure of this, an alternate TCP port should be configured in the FTP site properties.E、In order to make sure of this, an alternate IP address should be configured in the FTP site properties.

单选题You have just configured the network interface on systemA . The following information is  From systemB, you test the network connectivity by sending ICMP ECHO_REQUEST packets to  systemA. The following message is displayed: no answer from systemA  What is most likely the problem?()A  The interface is not plumbed.B  The interface is not configured.C  The interface does not have valid routes configured.D  The interface is not marked as

单选题You plan to implement a WSUS server in a branch office.You need to recommend a solution for deploying the WSUS server that meets the company's technicalequirements.   What should you include in the recommendation?()Aan autonomous WSUS server that is configured to download updates from Microsoft UpdateBan autonomous WSUS server that is configured to download updates from the WSUS server in the main officeCa WSUS server running in replica mode that is configured to download updates from Microsoft UpdateDa WSUS server running in replica mode that is configured to download updates from the WSUS server  in the main office

多选题You work as the IT professional in an international company which is named Wiikigo. You are experiencedin implementing and administering a network operating system. You are specialized in deploying servers,configuring Windows Server 2008 Terminal services and network application services, and configuring aweb services infrastructure. You are in charge of a server that runs Windows Server 2008. The Web Server(IIS) server role and the FTP Publishing Service role service are installed on the server. You have a newFTP site added to the server. You have to make sure that the new FTP site is available. In order to makesure of this,what action should you perform?()AIn order to make sure of this, the iisreset command should be run on the server.BIn order to make sure of this, a host header file should be configured in the default Web site properties.CIn order to make sure of this, an alternate IP address should be configured in the default Web siteproperties.DIn order to make sure of this, an alternate TCP port should be configured in the FTP site properties.EIn order to make sure of this, an alternate IP address should be configured in the FTP site properties.

单选题You work as the IT professional in an international company which is named Wiikigo. You are experiencedin implementing and administering a network operating system. You are specialized in deploying servers,configuring Windows Server 2008 Terminal services and network application services, and configuring aweb services infrastructure. A Windows Server 2008 server is contained by your company and the WebServer (IIS) server role is installed on the server. A Web site is included by the server. Since you are thetechnical report, you are required to encrypt the cookies sent from the Web site on users computers. Which Web site feature should be configured to achieve the goal?()ATo achieve the goal, Authorization Rules should be configured.BTo achieve the goal, Pages And Controls should be configured.CTo achieve the goal, SSL Settings should be configured.DTo achieve the goal, Machine Key should be configured.

单选题You are managing an Oracle Database 11g database. You want to take the backup of MULT_DATA, a big filetablespace of size 100 TB on tape drive, but you have tapedrives of only 10 GB each.Which method would accomplish the task quickly and efficiently?()Aparallel image copy backupBbackup with MAXPIECESIZE configured for the channelCparallel backup with MAXPIECESIZE configured for the channelDintrafile parallel backup

单选题You are managing an Oracle Database 11g database. You want to take the backup of MULT_DATA, a big file tablespace of size 100 TB on tape drive, but you have tapedrives of only 10 GB each.  Which method would accomplish the task quickly and efficiently?()A parallel image copy backupB backup with MAXPIECESIZE configured for the channelC parallel backup with MAXPIECESIZE configured for the channeD intrafile parallel backup

单选题You are maintaining the database of a company. The listener process, listener1, is configured for remote access. You have issued the following command:   LSNRCTLSTATUS listener1   Which information will NOT be displayed when you issue the above command?()A whether the password is set in the listener or a file or notB the number of client connections the service handler has refusedC the information will be displayed whether the instance can accept connections or notD the protocol addresses on which the listener is configured to listen

单选题You have a wireless access point that is configured to use Advanced Encryption Standard (AES) security. Apre-shared key is not configured on the wireless access point. You need to connect a computer that runsWindows 7 to the wireless access point.  Which security setting should you select for the wirelessconnection?()A802.1xBWPA-PersonalCWPA2-EnterpriseDWPA2-Personal

单选题You want to provide all users in your corporation with a single agent that provides access to multiple connection types conditionally. For example, you connect to the Junos Pulse Access Control Service if you are connected to the intranet, but you connect to the Junos Pulse Secure Access Service if you are on a remote network. Which agent should you use for this type of connection requirement?()AJunos Pulse should be configured with location awareness rules configured.BOdyssey Access Client should be installed with Host Checker configured to check the client's location.CJunos Pulse should be configured with all components installed.DAgentless access should be enabled so that clients can connect to any service without concern for installing an agent.

单选题You need to deploy a WSUS server in the branch office that meets the company’s technical requirements.   What should you deploy?()Aan autonomous WSUS server that is configured to download updates from Microsoft UpdateBan autonomous WSUS server that is configured to download updates from the WSUS server in the main officeCa WSUS server running in replica mode that is configured to download updates from Microsoft UpdateDa WSUS server running in replica mode that is configured to download updates from the WSUS server in the main office

单选题You work as a network engineer at TestKing.com. TestKing users have noticed extremely slow network performance, intermittent connectivity, and connection loss. After entering the show interfaces command, you notice that the Ethernet interface is configured as 100 Mbps full-duplex and that there is evidence of late collisions. What could be the cause of this problem?()Aduplex mismatchBa routing loopCtrunking mode mismatchDimproperly configured root bridgeEimproperly configured static VLAN

单选题You work as an Exchange Administrator for TechWorld Inc.The company has a Windows 2008 Active Directory-based contains an Exchange Server 2010 organization.You have deployed Hub Transport server, Client Access server, Unti Mailbox server in the messaging organization.You have not deployed any Edge Transport server in the messaging c following servers can be used to receive and send mail traffic to the Internet?()AServer configured with the Client Access server role.BServer configured with the Hub Transport role.CServer configured with the Mailbox role.DServer configured with the Unified Messaging server role.

多选题You are using AutoQoS Enterprise and realize that the results are not what you expected. Whichof the following are possible reasons for AutoQoS not functioning correctly?(Choose all thatapply.)()AThe interface you configured for AutoQoS is set to half-duplexBAutoQoS was configured on only one end of the linkCThe interface you configured for AutoQoS has no IP addressDThe interface’s bandwidth is not correctly configuredECEF is not enabled on the interfaceFYou enabled AutoQoS on the interface but forgot to enable globally first