You have two database servers SEMP and SACCT. The database in the SEMP server maintains the employeeinformation and the database in the SACCT server maintains the accounts payable information. The employeessubmit the expense reports to the accounts payable department. A user of the accounts payable databasewants to extract the employee information from the database in the SEMP server for cross-verification.  Whichschema object enables the user to access the information from the remote database()A、ClusterB、Database linkC、Mapping tableD、Materialized view

You have two database servers SEMP and SACCT. The database in the SEMP server maintains the employeeinformation and the database in the SACCT server maintains the accounts payable information. The employeessubmit the expense reports to the accounts payable department. A user of the accounts payable databasewants to extract the employee information from the database in the SEMP server for cross-verification.  Whichschema object enables the user to access the information from the remote database()

  • A、Cluster
  • B、Database link
  • C、Mapping table
  • D、Materialized view

相关考题:

You are the database administrator of a SQL Server 2000 computer. The server contains your company's Accounts database. Hundreds of users access the database each day.Because you have had power interruptions in the past, you want to perfect the physical integrity of the Accounts database. You do not want to slow down server operations.What should you do?A.Enable the torn page detection database option for each database.B.Disable write caching on all disk controllers.C.Ensure that write caching disk controllers have battery backups.D.Create a database maintenance plan to check database integrity and make repairs each night.

You are the administrator of two SQL Server 2000 computers. One of these servers contains a 4-GB database named marketing. You want to remove the marketing database from one server and add it to the other as quickly as possible.What should you do?A.Detach the database from the original server by using the sp_detach_db stored procedure. Copy the database and the transaction log files to the new server, and attach them by using the sp_attach_db stored procedure.B.Use the DTS export wizard to transfer all database objects from the original server to the new server. Drop the database from the original server.C.Run a full backup of the database on the original server. Create a new database named marketing on the new server. Restore the backup in the new marketing database. Drop the database from the original server.D.Shut down the original server. Copy the database and the transaction log files to the new server. Use the DISK INIT and DISK REFIT statements to attach the data file to the new server. Drop the database from the original server.

You are the administrator of three SQL Server 2000 computers at Five Lakes Publishing. One server, FLPSQL01, stores order data. You want to be able to use the other two servers, FLPSQL02 and FLPSQL03, to answer queries and run report. The planned network configuration is shown in the exhibit.You want to use the database Maintenance Plan wizard to configure log shipping from FLPSQL01 to FLPSQL02 and FLPSQL03. You do not want users to add any new data on FLPSQL02 and FLPSQL03, but they must be able to run queries and reports.Which two actions should you take? (Each correct answer presents part of the solution. Choose two)A.Set the database load state for each destination server to No recovery mode.B.Set the database load state for each destination server to standby mode.C.Enable the allow database to assume primary role option for both destination servers.D.Enable the allow database to assume primary role option for one destination server and then disable this option for other destination server.E.Disable the allow database to assume primary role option for both destination servers.

You are the administrator of two Microsoft Windows 2000 advanced server computers. On these servers, you are configuring a database that will store accounting information for your company.The data must be available at all times. Interruptions in data connectivity should not last longer than five minutes. Any changes to the database should not require you to reconfigure the client computers.How should you configure the database?A.Configure the database on the two servers as a SQL Server 2000 cluster.B.Configure the database on one server, and then configure a standby database on the second server.C.Configure the database on each server. Use Microsoft Distributed Transaction Coordinator to keep the two servers perfectly synchronized.D.Configure the database as a federated database, and then partition half the data on each server.

You are the administrator of a SQL Server 2000 computer. Your company purchased an accounting application from a vendor. The application stores its data in a database named Accounting on the server. The tables in this database contain columns that function as primary keys, but PRIMARY KEY and FOREIGN KEY constraints are not used.You need to replicate data from this database to another SQL Server computer. This server will use the replicated data to generate reports. Most reports will run each month, but the accounting department needs to have the ability to run reports at any time. Reports should be accurate through the last full working day.You cannot make any changes to the database, but you need to implement replication. Which two actions should you take? (Each correct answer presents part of the solution. Choose two)A.Implement merge replication.B.Implement snapshot replication.C.Implement transactional replication.D.Schedule replication to run continuously.E.Schedule replication to run during off-peak hours.

A database administrator wants to design a multi-partition database that can take advantage of both intra-partition parallelism and inter-partition parallelism. Which configuration will allow the use of these types of parallelism while using the least number of hardware components (servers, processors)? ()A、one server having at least two processors  B、two servers having one processor and one logical database partition  C、one server having four processors and two logical database partitions  D、two servers each having four processors and two logical database partitions

You work as a database administrator for Supportcenter.cn. You want to administer your database servers, which are running on different host machines, using the Web-enabled grid control interface. You have configured the agent on the host machines. You have started the Oracle Database 10g Grid Control utility on your machine. Which two additional components would you configure to achieve this objective?()A、Application Server ControlB、Oracle Management ServiceC、Oracle Enterprise Manager RepositoryD、Oracle Enterprise Manager Database Control

Your multitenant container database, CDB1, is running in ARCHIVELOG mode and has two pluggable databases, HR_PDB and ACCOUNTS_PDB. An RMAN backup exists for the database. You issue the command to open ACCOUNTS_PDB and find that the USERDATA.DBF data file for the default permanent tablespace USERDATA belonging to ACCOUNTS_PDB is corrupted. What should you do before executing the commands to restore and recover the data file in ACCOUNTS_PDB?()A、Place CDB1 in the mount stage and then the USERDATA tablespace offline in ACCOUNTS_PDb.B、Place CDB1 in the mount stage and issue the ALTER PLUGGABLE DATABASE accounts_pdb CLOSE IMMEDIATE command.C、Issue the ALTER PLUGGABLE DATABASE accounts_pdb RESTRICTED command.D、Take the USERDATA tablespace offline in ACCOUNTS_PDb.

You have two database servers SEMP and SACCT. The database in the SEMP server maintains theemployee information and the database in the SACCT server maintains the accounts payable  information.The employees submit the expense reports to the accounts payable department. A user of the accountspayable database wants to extract the employee information from the database in the SEMP server for cross-verification.  Which schema object enables the user to access the information from the remote database()A、ClusterB、Database linkC、Mapping tableD、Materialized view

You work as a database administrator for Certkiller .com. You have been asked to use a centralized administrative tool to administer your database servers and application servers. In order to achieve the objective, which component would you configure on each database server?()A、Database ControlB、Management ServerC、Management RepositoryD、Application Server ControlE、Oracle Management Agent

You work in a company which is named Wiikigo Corp. The company uses SQL Server 2008. You are the administrator of the company database. Now you are in charge of a SQL Server 2008 instance. There is an internal application which uses Analysis Services and Reporting Services. You use the application on the basis of SQL Server 2008. According to the requirement of company security policy, the surface area for all the deployed components of SQL Server 2008 should be configured. You have to implement the security policy and devise a method to evaluate the security policy against other database servers. What should you do?()  A、You should create policies based on the appropriate facets. Apply the policies against a server group. The server group includes the database servers that need to be configured B、You should create a Transact-SQL script based on the sp_configure stored procedure. Use a configuration server to run the script against a server group that includes the database servers that need to be configured C、You should edit the RSReportServer.config configuration file. Distribute the file to all database servers that need to be configured D、You should analyze your database servers by using the SQL Server Best Practices Analyzer (BPA). Implement the recommendations of the BPA

You have a Microsoft Internet Security and Accelerator (ISA) 2006 server that provides all Internet accessfor your company.  You have two Mailbox servers configured in a database availability group (DAG), two Client Accessservers, and two Hub Transport servers.  You need to recommend changes to the environment to ensure that users can access Outlook Web App(OWA) from the Internet if any single server fails.  What should you recommend?()A、Configure a Client Access server array.B、Deploy a second ISA server and create an ISA server array.C、Implement Windows Network Load Balancing for the Client Access servers.D、Deploy two Edge Transport servers that are configured to use EdgeSync synchronization.

You need to design a Windows Server Update Services (WSUS) infrastructure that meets the  following requirements:   èThe updates must be distributed from a central location.   èAll computers must continue to receive updates in the event that a server fails. What should you include in your design?()A、Configure two WSUS servers in a Microsoft SQL Server 2008 failover cluster. Configure each WSUS  server to use a local database.B、Configure a single WSUS server to use multiple downstream servers. Configure each WSUS server touse a RAID 1 mirror and a local database.C、Configure a single WSUS server to use multiple downstream servers. Configure each WSUS server to  use a RAID 5 array and a local database.D、Configure a Microsoft SQL Server 2008 failover cluster. Configure two WSUS servers in a Network Load Balancing cluster. Configure WSUS to use the remote SQL Server 2008 database instance.

You work in a company which uses SQL Server 2008. You are the administrator of the company database. Now you are in charge of a SQL Server 2008 instance. There is a database named DB01 in the instance. The company CIO wants all the application developers can capture traces to troubleshoot the application that uses the database DB1, and they can perform this by using SQL Server Profiler. But they have to be given as little permission as possible. The company CIO assigns this task to you.  So what action should you perform to achieve this goal?()  A、All the SQL Server logins of the application developers have to be added to a fixed server role. B、All the database users of the application developers have to be added to a fixed database role C、All SQL Server logins of the application developers should be given the appropriate server-level permissions. D、All database users of the application developers should be given the appropriate database-level permissions.

You have an Exchange Server 2010 organization that contains 20 Mailbox servers.You plan to create 10 mailbox databases on each Mailbox server. You need to create a naming convention for all mailbox databases.  What should you include in your naming convention()?  A、For each mailbox database, provide a database name that is unique within the organization.B、For each mailbox database, provide a database name that is unique within the Mailbox server.C、For each mailbox database file, provide a file name that is unique within the organization.D、For each mailbox database file, provide a file name that is unique within the Mailbox server.

You have an Exchange Server 2010 organization.The organization contains two Mailbox servers named Server1 and Server2.Both servers are members of a database availability group (DAG) named DAG1.Server1 and Server2 have a copy of a mailbox database named DB1.You need to remove the copy of DB1 from Server1.What should you do?()A、From the Exchange Management Shell, run Clean-MailboxDatabase -Identity DB1.B、From the Exchange Management Shell, run Remove-MailboxDatabase -Identity DB1/Server1.C、From the Exchange Management Console (EMC), right-click the database copy and select Remove.D、From the Exchange Management Console (EMC), right-click DAG1 and select Manage Database Availability Group Membership.Remove Server1 from the list and click Manage.

You have an Exchange Server 2010 organization that contains three Mailbox servers.All Mailbox servers are members of a database availability group (DAG) and have a public folder database.The Active Directory forest contains one site.You create a new site and install new Exchange Server 2010 servers in the site.You need to ensure that public folders are stored on servers in both sites.What should you do?()A、Create a public folder database on a server in the new site. Modify the replication settings for all public foldersB、Create a public folder database on a server in the new site.Run the Set-DatabaseAvailabilityGroup cmdlet from a server in the new siteC、Configure clustered continuous replication (CCR) on two servers in the new site. Modify the replication settings for all public folder databasesD、Configure standby continuous replication (SCR) on a server in the new site. Run the Enable-StorageGroupCopy cmdlet from a server in the new site

Your company has a single Active Directory domain. You have 30 database servers that run Windows Server 2008 R2.   The computer accounts for the database servers are stored in an organizational unit (OU) named Data.   The user accounts for the database administrators are stored in an OU named Admin. The database administrators are members of a global group named D_Admins.   You must allow the database administrators to perform administrative tasks on the database servers. You must prevent the database administrators from performing administrative tasks on other servers. What should you do?()A、Deploy a Group Policy to the Data OU.B、Deploy a Group Policy to the Admin OU.C、Add D_Admins to the Domain Admins global group.D、Add D_Admins to the Server Operators built-in local group.

You are the administrator of a Microsoft Windows Server 2003 computer named Server1. SQL Server 2005 is installed on Server1 to host a database named MedDB. The MedDB database serves as the backend database for a new client/server application named MedDATA. Installation of the MedDATA application creates the database schema, application roles, and administrative accounts. It also sets all of the default permissions. You need to establish a permissions baseline for all objects in the MedDB database.  What should you do?()A、Use the SQL Server 2005 Management Studio to review the permissions of the default database objects.B、Query the sys.server_permissions table on Server1.C、Execute the sp_helplogins system stored procedure for each of the default users that the MedDATA application creates.D、Query the sys.database_permissions and sys.database_principals tables in the MedDB database.

You are the network administrator for TestKing. The network consists of a single Active Directory domain named testking.com. All domain controller run Windows Server 2003. employes three database administrators who administer seven databases servers that run Windows Server 2003. The database administrators occasionally restore a database server after a disaster. To restore a server, database administrators need the rights required to perform the following tasks: 1. Back up files and folders 2. Restore files and folders. 3. Restore the System State data. You need to assign the database administrators the rights that they require to perform the specified tasks. For security reasons, you must not assign the administrators more rights than they require to perform the tasks. What should you do?()A、Add the database administrators' user accounts to the Administrators group on each of the database servers.B、Add the database administrators' user accounts to the Power Users group on each of the database servers.C、Add the database administrators' user accounts to the Backup Operators group on each of the database servers.D、Add the database administrators' user accounts to the Backup Operators group on one of the domain controllers.E、Add the database administrators' user accounts to the Server Operators group on one of the domain controllers.

单选题You work as a database administrator for Supportcenter.cn. You have been asked to use a centralized administrative tool to administer your database servers and application servers. In order to achieve the objective, which component would you configure on each database server?()ADatabase ControlBManagement ServerCManagement RepositoryDApplication Server ControlEOracle Management Agent

单选题You have two database servers SEMP and SACCT. The database in the SEMP server maintains theemployee information and the database in the SACCT server maintains the accounts payable  information.The employees submit the expense reports to the accounts payable department. A user of the accountspayable database wants to extract the employee information from the database in the SEMP server for cross-verification.  Which schema object enables the user to access the information from the remote database()AClusterBDatabase linkCMapping tableDMaterialized view

单选题A database administrator wants to design a multi-partition database that can take advantage of both intra-partition parallelism and inter-partition parallelism. Which configuration will allow the use of these types of parallelism while using the least number of hardware components (servers, processors)? ()Aone server having at least two processors  Btwo servers having one processor and one logical database partition  Cone server having four processors and two logical database partitions  Dtwo servers each having four processors and two logical database partitions

单选题You have two database servers SEMP and SACCT. The database in the SEMP server maintains the employeeinformation and the database in the SACCT server maintains the accounts payable information. The employeessubmit the expense reports to the accounts payable department. A user of the accounts payable databasewants to extract the employee information from the database in the SEMP server for cross-verification.  Whichschema object enables the user to access the information from the remote database()AClusterBDatabase linkCMapping tableDMaterialized view

单选题You have an Exchange 2010 that contain DAG named DAG1.DAG1 contains two Mailbox Servers named Server1 and Server2.5 Mailbox Database are replicated in DAG1.You need to install Exchange Rollup update on Server1.The solution must not prevent user from accessing their Mailboxes. What should you do first?()ARun the Set-MailboxDatabase cmdlet, and then configure all mailbox Database copies as lagged copiesBRun the Suspend- MailboxDatabasecopy cmdlet, and then switch over all mailbox database to Server2CRun the Update- MailboxDatabasecopy cmdlet, and then modify the mailbox database Activation preferenceDRun the Set-DatabaseAvailabilityGroup cmdlet, and then enable Datacenter Activation Coordination

单选题You work in a company which is named Wiikigo Corp. The company uses SQL Server 2008. You are the administrator of the company database. Now you are in charge of a SQL Server 2008 instance. There is an internal application which uses Analysis Services and Reporting Services. You use the application on the basis of SQL Server 2008. According to the requirement of company security policy, the surface area for all the deployed components of SQL Server 2008 should be configured. You have to implement the security policy and devise a method to evaluate the security policy against other database servers. What should you do?()AYou should create policies based on the appropriate facets. Apply the policies against a server group. The server group includes the database servers that need to be configured BYou should create a Transact-SQL script based on the sp_configure stored procedure. Use a configuration server to run the script against a server group that includes the database servers that need to be configured CYou should edit the RSReportServer.config configuration file. Distribute the file to all database servers that need to be configured DYou should analyze your database servers by using the SQL Server Best Practices Analyzer (BPA). Implement the recommendations of the BPA

单选题You have an Exchange Server 2010 organization that contains 20 Mailbox servers.You plan to create 10 mailbox databases on each Mailbox server. You need to create a naming convention for all mailbox databases.  What should you include in your naming convention()?AFor each mailbox database, provide a database name that is unique within the organization.BFor each mailbox database, provide a database name that is unique within the Mailbox server.CFor each mailbox database file, provide a file name that is unique within the organization.DFor each mailbox database file, provide a file name that is unique within the Mailbox server.