While selecting files during an interactive restore with ufsrestore, you are interrupted by a junior  administrator before you can complete the file selection process and start the restore. After answering the administrator’s question, you realize that you have forgotten which files you had already selected for the restore.  How can you determine which files are already marked for extraction and restore? ()A、 You can use the ls subcommand of ufsrestore.B、 You can use the add subcommand of ufsrestore.C、 You can use the select subcommand of ufsrestore.D、 You can view the selected files as they are marked with a plus sign (+) in the list that is permanently displayed in the upper half of the interactive ufsrestore screen view.

While selecting files during an interactive restore with ufsrestore, you are interrupted by a junior  administrator before you can complete the file selection process and start the restore. After answering the administrator’s question, you realize that you have forgotten which files you had already selected for the restore.  How can you determine which files are already marked for extraction and restore? ()

  • A、 You can use the ls subcommand of ufsrestore.
  • B、 You can use the add subcommand of ufsrestore.
  • C、 You can use the select subcommand of ufsrestore.
  • D、 You can view the selected files as they are marked with a plus sign (+) in the list that is permanently displayed in the upper half of the interactive ufsrestore screen view.

相关考题:

● The most common non-behavioral reason for projects being completed behind schedule and over budget is:A Selecting the wrong person as the project managerB Selecting the wrong person as the sponsorC Accepting a high-risk projectD Ill-defined requirementsE All of the above

In the last sentence of the second paragraph, the pronoun 'it 'refers to '_____. A.fitting our actions to those of other people appropriatelyB.identification of other people's statusesC.selecting one's own statusesD.selecting one's own statuses

Which two operations are NOT performed by the DUPLICATE command in Recovery Manager (RMAN)while duplicating a running database?() A. Creating the control file for the duplicate databaseB. Restoring the target data files to the duplicate databaseC. Performing complete recovery using all available backupsD. Generating a new, unique DBID for the duplicate databaseE. Copying the online redo log files from the target database to the duplicate database

With which three tasks does the IPS Policies Wizard help you? ()A、Selecting the interface to which the IPS rule will be appliedB、Selecting the Signature Definition File (SDF) that the router will useC、Selecting the direction of traffic that will be inspectedD、Selecting the inspection policy that will be applied to the interface

You decided to change the location of the flash recovery area. You executed the following command:   ALTER SYSTEM SET DB_RECOVERY_FILE_DEST=’+disk1’ SCOPE=BOTH SID=’*’;   Which statement is true?()A、 The location can be changed only if the flash recovery area is empty.B、 After executing the command, all new flash recovery area files will be created in the new location.C、 The command will generate an error because you cannot change the flash recovery area while the database is open.D、 All the existing files in the flash recovery area will be moved to the new location and all new Flash Recovery Area files will be created in the new location.

While performing the backup of the flash recovery area, you notice that one of the archived redo log files is missing. You have multiple destinations for archived redo log files. What implications does it have on the backup of the flash recovery area?()A、The backup fails because one of the archived redo log files is missing. B、The backup succeeds but it would be without the missing archived log. C、During backup, you are prompted for the alternative destination for the missing archived redo log file. D、The backup succeeds because it fails over to one of the alternative archived redo log destinations.

You are the network administrator for The network consists of a single Active Directory domain named The domain contains Windows Server 2003 computers and Windows XP Professional computers. All confidential company files are stored on a file server named TestKing1. The written company security states that all confidential data must be stored and transmitted in a secure manner. To comply with the security policy, you enable Encrypting File System (EFS) on the confidential files. You also add EFS certificates to the data decryption field (DDF) of the confidential files for the users who need to access them. While performing network monitoring, you notice that the confidential files that are stored on TestKing1 are being transmitted over the network without encryption. You must ensure that encryption is always used when the confidential files on TestKing1 are stored and transmitted over the network. What are two possible ways to accomplish this goal? ()(Each correct answer presents a complete solution. Choose two)A、Enable offline files for the confidential files that are stored on TestKing1, and select the Encrypt offline files to secure data check box on the client computers of the users who need to access the files.B、Use IPSec encryption between TestKing1 and the client computers of the users who need to access the confidential files.C、Use Server Message Block (SMB) signing between TestKing1 and the client computers of the users who need to access the confidential files.D、Disable all LM and NTLM authentication methods on TestKing1.E、Use IIS to publish the confidential files. Enable SSL on the IIS server. Open the files as a Web folder.

You are working with a team of developers on a Web site. You copy the Web site from the staging server to work on it locally. While making changes, you create new C# source code files and delete old ones. You need to ensure that your changes propagate to the staging server without affecting any files that you have not modified. Which tool should you use? ()A、XCOPYB、the Copy Web toolC、the Publish Web toolD、a Web Setup project

You need to enhance performance of foreground and background applications. How can you configure Windows 2000 Professional to process both foreground and background applications at the same priority? ()A、By selecting the applications options in the performance options dialog box.B、By selecting the application services option in the performance options dialog box.C、By selecting the background option in the performance options dialog box.D、By selecting the background services option in the performance options dialog box.

单选题While selecting files during an interactive restore with ufsrestore, you are interrupted by a junior  administrator before you can complete the file selection process and start the restore. After answering the administrator’s question, you realize that you have forgotten which files you had already selected for the restore.  How can you determine which files are already marked for extraction and restore? ()A You can use the ls subcommand of ufsrestore.B You can use the add subcommand of ufsrestore.C You can use the select subcommand of ufsrestore.D You can view the selected files as they are marked with a plus sign (+) in the list that is permanently displayed in the upper half of the interactive ufsrestore screen view.

单选题You decided to change the location of the flash recovery area. You executed the following command: Which statement is true?()AThe location can be changed only if the flash recovery area is empty.BAfter executing the command, all new flash recovery area files will be created in the new location.CThe command will generate an error because you cannot change the flash recovery area while the database is open.DAll the existing files in the flash recovery area will be moved to the new location, and all new Flash Recovery Area files will be created in the new location.

单选题Which of the following RAID configurations provides the BEST performance for database files while still providing redundancy?()ARAID 0BRAID 1CRAID 3DRAID 5

单选题Which options must you configure while performing an automated Tablespace Point-in-Time Recovery (TSPITR) by using Recovery Manager (RMAN)?()ANew channels for restore and recovery tasksBNew name for the data files of the tablespaceCAuxiliary name for the data files of the tablespaceDAuxiliary destinations for an auxiliary set of data files

单选题You decided to change the location of the flash recovery area. You executed the following command:   ALTER SYSTEM SET DB_RECOVERY_FILE_DEST=’+disk1’ SCOPE=BOTH SID=’*’;   Which statement is true?()A The location can be changed only if the flash recovery area is empty.B After executing the command, all new flash recovery area files will be created in the new location.C The command will generate an error because you cannot change the flash recovery area while the database is open.D All the existing files in the flash recovery area will be moved to the new location and all new Flash Recovery Area files will be created in the new location.

单选题You are working with a team of developers on a Web site. You copy the Web site from the staging server to work on it locally. While making changes, you create new C# source code files and delete old ones. You need to ensure that your changes propagate to the staging server without affecting any files that you have not modified. Which tool should you use? ()AXCOPYBthe Copy Web toolCthe Publish Web toolDa Web Setup project

多选题Which three statements are true about the stages of database startup?()AData files and redo log files can be renamed at the MOUNT stage.BControl files are read at the OPEN stage for the location of data files.CControl files are required to bring the database to the NOMOUNT stage.DData files and redo log files are made available to users at the OPEN stage.EData files and online redo log files are checked for consistency while opening the database

单选题You need to enhance performance of foreground and background applications. How can you configure Windows 2000 Professional to process both foreground and background applications at the same priority? ()ABy selecting the applications options in the performance options dialog box.BBy selecting the application services option in the performance options dialog box.CBy selecting the background option in the performance options dialog box.DBy selecting the background services option in the performance options dialog box.

单选题Which options must you configure while performing an automated Tablespace Point-in-Time Recovery (TSPITR) by using Recovery Manager (RMAN)?()A New channels for restore and recovery tasksB New name for the data files of the tablespaceC Auxiliary name for the data files of the tablespaceD Auxiliary destinations for an auxiliary set of data files

多选题Which two operations are NOT performed by the DUPLICATE command in Recovery Manager (RMAN)while duplicating a running database?()ACreating the control file for the duplicate databaseBRestoring the target data files to the duplicate databaseCPerforming complete recovery using all available backupsDGenerating a new, unique DBID for the duplicate databaseECopying the online redo log files from the target database to the duplicate database

单选题While planning to manage more than one database in your system, you perform the following activities:  1. Organize different categories of files into independent subdirectories.  2. Use consistent naming convention for database files.  3. Separate administrative information pertaining to each database.  Which option corresponds to the type of activities performed by you?()AOracle Managed FilesBOracle Grid ArchitectureCOptimal Flexible ArchitectureDOracle database architecture

单选题You are the network administrator for The network consists of a single Active Directory domain named All network servers run Windows Server 2003. Confidential files are stored on a member server named TK1. The computer object for TK1 resides in an organizational unit (OU) named Confidential. A Group Policy object (GPO) named GPO1 is linked to the Confidential OU. To audit access to the confidential files, you enable auditing on all private folders on TK1. Several days later, you review the audit logs. You discover that auditing is not successful. You need to ensure that auditing occurs successfully. What should you do?()AStart the System Event Notification Service (SENS) on TK1.BStart the Error Reporting service on TK1.CModify the Default Domain Controllers GPO by selecting Success and Failure as the Audit Object Access setting.DModify GPO1 by selecting Success and Failure as the Audit Object Access setting.

单选题While performing the backup of the flash recovery area, you notice that one of the archived redo log files is missing. You have multiple destinations for archived redo log files.  What implications does it have on the backup of the flash recovery area?()A The backup fails because one of the archived redo log files is missing.B The backup succeeds but it would be without the missing archived log.C During backup,you are prompted for the alternative destination for the missing archived redo log file.D The backup succeeds because it fails over to one of the alternative archived redo log destinations.