Which two tasks can be performed when WLST is in OFFLINE mode?()A、modifying the configuration of an online domainB、modifying the configuration of an offline domainC、viewing runtime performance data in ONLINE modeD、viewing runtime performance data in OFFLINE modeE、creating and extending domains

Which two tasks can be performed when WLST is in OFFLINE mode?()

  • A、modifying the configuration of an online domain
  • B、modifying the configuration of an offline domain
  • C、viewing runtime performance data in ONLINE mode
  • D、viewing runtime performance data in OFFLINE mode
  • E、creating and extending domains

相关考题:

You have enabled backup optimization for the RMAN environment.Identify two criteria on which RMAN will skip the file, if it has already been backed up.() A. The data file backup is done with multiple channelsB. The data files is in the read-write mode after being backed up in the read only modeC. The backup was taken after the data files was taken offline-normal or is in the read only modeD. The data file backup complies with the back retention policy and the backup duplexing feature

Which two activities are NOT supported by the Data Recovery Advisor?() A. Diagnose and repair a data file corruption offline.B. Diagnose and repair a data file corruption online.C. Diagnose and repair failures on a standby database.D. Recover from failures in the Real Application Cluster (RAC) environment.

You have enabled backup optimization for the RMAN environment. Identify two criteria on which RMAN will skip the file, if it has already been backed up.() (Choose two.) A. The data file backup is done with multiple channelsB. The data files is in the read-write mode after being backed up in the read only modeC. The backup was taken after the data files was taken offline-normal or is in the read only modeD. The data file backup complies with the back retention policy and the backup duplexing feature

Which two statements are true about variable extent size support for large ASM files?() A. The metadata used to track extents in SGA is reduced.B. Rebalance operations are completed faster than with a fixed extent sizeC. An ASM Instance automatically allocates an appropriate extent size.D. Resync operations are completed faster when a disk comes online after being taken offline.E. Performance improves in a stretch cluster configuration by reading from a local copy of an extent.

Which two statements are true when using the configure exclusive CLI command?()A、Multiple users can enter configuration mode and have their own private configuration.B、When a user commits, only the user's changes are committed.C、A message indicates which other users are in configuration mode and what portion of the configuration they are editing.D、Only a single user can edit the configuration.

Your test database is configured to run in NOARCHIVELOG mode. One of the data files in the USERS tablespace is lost due to a media failure. You notice that all the online redo logs have been overwritten sincethe last backup.  What would you do to recover the data file()A、Take the USERS tablespace offline and re-create the lost data file.B、Shut down the instance, restore the data file from the last consistent backup, and restart the databaseinstance.C、Shut down the instance, restore all the database files from the last consistent backup, and restart thedatabase instance.D、Take the USERS tablespace offline, restore all the data files of the USERS tablespace from the lastconsistent backup, and make the tablespace online

You have enabled backup optimization for the RMAN environment. Identify two criteria on which RMAN will skip the file, if it has already been backed up.() (Choose two.)A、The data file backup is done with multiple channelsB、The data files is in the read-write mode after being backed up in the read only modeC、The backup was taken after the data files was taken offline-normal or is in the read only modeD、The data file backup complies with the back retention policy and the backup duplexing feature

Which of the following would be used to monitor unauthorized access to data files?()A、Performance Log and AlertsB、Event ViewerC、Security Configuration and AnalysisD、IP Security Monitor

WebSphere Application Server supports performance data collection using the Performance Monitoring Infrastructure (PMI).  Which tool supports PMI and would be best to analyze the WebSphere Commerce runtime EJB, JVM and thread pool stats?()A、WebSphere Commerce AnalyzerB、Tivoli Performance Viewer.C、Tivoli Web Site Analyzer.D、DB2 Intelligent Miner for Data.

You work as a database administrator for Supportcenter.cn. You are using Recovery Manager (RMAN) to perform backups in your databases. Which four backup operations can be performed using RMAN?()A、A backup of the target database when it is mountedB、A backup of online redo log files when the database is openC、A backup of only used data blocks in the file beingbeingbackup upD、A backup of online, read/write data files when the database is openE、A backup of only those data blocks that have changed since a previous backupF、A backup of online, read/write data files when the database is in the NOMOUNT state.

When an UNDO segment is created manually by you, its availability status is set to which of the following automatically by Oracle?()A、Online B、Pending online C、Offline D、Stale

Which two activities are NOT supported by the Data Recovery Advisor?()A、Diagnose and repair a data file corruption offline.B、Diagnose and repair a data file corruption online.C、Diagnose and repair failures on a standby database.D、Recover from failures in the Real Application Cluster (RAC) environment.

You executed the following command in Recovery Manager (RMAN) to perform a backup of the DETTBS tablespace: RMAN BACKUP TABLESPACE DETTBS;  Under which conditions would this command execute successfully? ()A、 The database is in NOMOUNT state.B、 The database is in NOARCHIVELOG mode and the tablespace is online.C、 The database is in NOARCHIVELOG mode and the tablespace is offline.D、 The database is in ARCHIVELOG mode and the tablespace is offline.E、 The database is in ARCHIVELOG mode and the tablespace is online.

Which two statements are true about checkpointing()A、The checkpoint frequency decreases with the smaller redo log file size.B、It ensures that all committed data is written to the data files during normal shutdown.C、The frequent full checkpoint in a database can cause the overall degradation of the database performance.D、It prompts the Checkpoint (CKPT) process to write data to the data files and redo information to the online redo log files.

You have enabled backup optimization for the RMAN environment. Identify two criteria on which RMAN will skip the file, if it has already been backed up.()A、 The data file backup is done with multiple channelsB、 The data files is in the read-write mode after being backed up in the read only modeC、 The backup was taken after the data files was taken offline-normal or is in the read only modeD、 The data file backup complies with the back retention policy and the backup duplexing fe ture

Which statement is true about the loss of system-critical data files in ARCHIVELOG mode?()A、The data files can be recovered till the last committed transaction.B、The data files can be recovered without shutting down the database.C、The data file is taken offline automatically; the database remains open.D、The data files can be recovered to the time of the most recent backup.

In what state are the datafiles of a tablespace after a TSPITR has been successfully completed?()  A、 The datafiles have an ONLINE status.B、 The datafiles have an OFFLINE status.C、 The datafiles have an ONLINE status and are in hot backup mode prepared for an online backup.D、 The datafiles have an OFFLINE status and are in hot backup mode for an online backup.E、 The datafiles are in STANDBY mode.

Which files must be synchronized in order for a database to start?()A、temp filesB、online data filesC、offline data filesD、read only data files

In which situation would you use the Oracle Shared Server configuration?()A、when performing export and import using Oracle Data PumpB、when performing backup and recovery operations using Oracle Recovery ManagerC、when performing batch processing and bulk loading operation in a data warehouse environment D、in an online transaction processing (OLTP) system where large number of client sessions are idle most of the time

Users complain SQL statements using a particular index fail. Using DBVERIFY, you find that two separate blocks in the index have become corrupt. The database data files for user data and index are very large.  What is the least disruptive recover strategy available in Oracle9i?()A、Rebuild the index using the online option. B、Take the individual data file offline (not the whole tablespace), restore and recover the data file from backup with RMAN, then set the data file online again. C、Without setting the individual data file offline, use RMAN with Block Media Recovery to restore and recover only those blocks. D、Take the individual data file (not the whole tablespace) offline, use RMAN with Block Media Recovery to restore and recover only those blocks, then set the data file online again.

Which two activities are NOT supported by the Data Recovery Advisor (DRA)()A、Recover from failures in the RAC environment.B、Diagnose and repair a data file corruption online.C、Diagnose and repair a data file corruption offline.D、Diagnose and repair failures on a standby database

Two data files have been deleted at the operating system level by accident. Your database is running in ARCHIVELOG mode and online backups are taken nightly. One of the data files that has been deleted belongs to the USERS tablespace on the other belongs to the SYSTEM tablespace. How can you recover from this situation?()A、Shut down the database, restore the two data files and then start up the database. B、Take the system and users tablespace offline, restore the two data files, recover the two datafiles, and then bring the SYSTEM and USERS tablespaces online. C、Shut down the database, restore the two data files, start up the database in MOUNT mode, recover the two data files, and then alter the database open. D、Take the SYSTEM and USERS tablespaces offline, recover the two datafiles and then bring the SYSTEM and USERS tablespaces online.

多选题You work as a database administrator for Supportcenter.cn. You are using Recovery Manager (RMAN) to perform backups in your databases. Which four backup operations can be performed using RMAN?()AA backup of the target database when it is mountedBA backup of online redo log files when the database is openCA backup of only used data blocks in the file beingbeingbackup upDA backup of online, read/write data files when the database is openEA backup of only those data blocks that have changed since a previous backupFA backup of online, read/write data files when the database is in the NOMOUNT state.

单选题WebSphere Application Server supports performance data collection using the Performance Monitoring Infrastructure (PMI).  Which tool supports PMI and would be best to analyze the WebSphere Commerce runtime EJB, JVM and thread pool stats?()AWebSphere Commerce AnalyzerBTivoli Performance Viewer.CTivoli Web Site Analyzer.DDB2 Intelligent Miner for Data.

多选题Which two tasks can be performed when WLST is in OFFLINE mode?()Amodifying the configuration of an online domainBmodifying the configuration of an offline domainCviewing runtime performance data in ONLINE modeDviewing runtime performance data in OFFLINE modeEcreating and extending domains

单选题In what state are the datafiles of a tablespace after a TSPITR has been successfully completed?()A The datafiles have an ONLINE status.B The datafiles have an OFFLINE status.C The datafiles have an ONLINE status and are in hot backup mode prepared for an online backup.D The datafiles have an OFFLINE status and are in hot backup mode for an online backup.E The datafiles are in STANDBY mode.

多选题Which two statements are true about checkpointing()AThe checkpoint frequency decreases with the smaller redo log file size.BIt ensures that all committed data is written to the data files during normal shutdown.CThe frequent full checkpoint in a database can cause the overall degradation of the database performance.DIt prompts the Checkpoint (CKPT) process to write data to the data files and redo information to the online redo log files.