单选题The data on datavg is inaccessible. Using "df" the user discovers that none of the datavg filesystems are mounted. Running "lsvg" shows only rootvg. Running "importvg -y" gives the following error: "056-056 volume cannot be varied on because pv is marked missing". Which of the following steps should be performed?()ARun cfgmgr. BRun synclvodm. CLook in errorlog for hardware problems. DBoot into service mode and run fsck on filesystems.

单选题
The data on datavg is inaccessible. Using "df" the user discovers that none of the datavg filesystems are mounted. Running "lsvg" shows only rootvg. Running "importvg -y" gives the following error: "056-056 volume cannot be varied on because pv is marked missing". Which of the following steps should be performed?()
A

Run cfgmgr. 

B

Run synclvodm. 

C

Look in errorlog for hardware problems. 

D

Boot into service mode and run fsck on filesystems.


参考解析

解析: 暂无解析

相关考题:

USER_DATA is a nonencrypted tablespace that contains a set of tables with data. You want to convert all existing data in the USER_DATA tablespace and the new data into the encrypted format.Which methodswould you use to achieve this?()A. Use Data Pump to transfer the existing data to a new encrypted tablespaceB. Use ALTER TABLE MOVE to transfer the existing data to a new encrypted tablespaceC. Use CREATE TABLE AS SELECT to transfer the existing data to a new encrypted tablespaceD. Enable row movement for each table to be encrypted and then use ALTER TABLESPACE to encrypt the tablespaceE. Encrypt the USER_DATA tablespace using the ALTER TABLESPACE statement so that all the data in the tablespace is automatically encrypted

Digital computer is controlled by internally stored programs and(66) of using common storage for all or part of a program and also for all or part of the data necessary for the execution of the programs; executing user-written or user-designated programs; performing user-designated manipulation of digitally represented discrete data, including.(67) operations and logic operations; and executing programs that(68) themselves during their execution.Analog computer's operations are analogous to the(69) of another system and that accepts, processes, and produces analog data.(70) computer integrates analog computer components and digital computer components by interconnection of digital-to-analog converters and analog-to-digital converters.A.qualifiedB.competentC.capableD.able

A system administrator notices that one of the mirrored disks, hdisk7 on datavg, has had a hardware failure. What is the best method of recover without causing additional problems?() A.unmirrorvg datavg hdisk7 reducevg datavg hdisk7 replace the physical volume, run cfgmgr extendvg datavg hdisk7 mirrovg datavg hdisk7B.varyoffvg datavg Rmdev -l hdisk7 -d Replace the physical volu,e run cfgmgr The system will automatically remirror when the disk is replacedC.unmirrorvg datavg hdisk7 rmdev -l hdisk7 - d replace the physical volume, run cfgmgr extendvg datavg hdisk7 The system will automatically remirror when the disk is replaced.D.unmirrorvg datavg hdisk7 reducevg data hdisk7 rmdev -l hdisk7 -d replace the physical volume, run cfgmgr extendvg datavg hdisk7 mirrovg datavg

ExaminetheRMANcommand:SWITCHDATAFILE’/DISK3/user_data01.dbf’;Whichcommanddoyouneedtoissuebeforeyouissuetheabovecommand,sothatRMANfindsthefileintherestoredlocationof’DISK2/user_data01.dbf’?() A.RESTOREDATAFILE’/DISK2/user_data01.dbf’B.RESTOREDATAFILE’/DISK3/user_data01.dbf’C.SETNEWNAMEFOR’/DISK3/user_data01.dbf’TO’/DISK2/user_data01.dbf’D.SETNEWNAMEFOR’/DISK2/user_data01.dbf’TO’/DISK3/user_data01.dbf’

You design a Business Intelligence (BI) solution by using SQL Server 2008.  The solution includes a SQL Server 2008 Reporting Services (SSRS) infrastructure in a scale-out deployment. All reports use a SQL Server 2008 relational database as the data source. You implement row-level security. You need to ensure that all reports display only the expected data based on the user who is viewing the report. What should you do?()A、 Store the credential of a user in the data source.B、 Configure the infrastructure to support Kerberos authentication.C、 Configure the infrastructure to support anonymous authentication by using a custom authentication extension.D、 Ensure that all report queries add a filter that uses the User.UserID value as a hidden parameter.

When a client using the SERVER_ENCRYPT authentication type connects to a server using the SERVER authentication type, what happens?()A、An error will occur.B、Data passed between the client and the server is encrypted.C、User IDs and passwords are passed to the server unencrypted.D、User IDs and passwords are encrypted before they are passed to the server.

What is the objective of the aaa authentication login console-in local command?()A、It specifies the login authentication method list named console-in using the local user database on the routerB、It specifies the login authorization method list named console-in using the local RADIUS username-password data baseC、It specifies the login authentication list named console-in using the local username- password data base on the routerD、It specifies the login authorization method list named console-in using the local username- password data base on the router

UDC是()的缩写A、User Data ConvergenceB、User Data centerC、User Data ConceptD、User Data carrier

Which benefit does digital subscriber line (DSL) systems for broadband access provide to the user?()A、Secure access to company extranetB、Dedicated lines for high security data transferC、Simple solution for high-quality digital video using coaxial cableD、Data and audio signals that share the same communications infrastructure

A SAN needs to undergo disruptive maintenance, which will effect a hosted production system with multiple applications and related volume groups, one of which, datavg, resides on the SAN. There is one spare disk in the system but it is smaller than datavg. How can application outages and risk of corruption be minimized?()A、Stop the applications in all data volume groups and shut the system down during the outage period.B、Stop the applications in datavg, unmount all datavg filesystems, varyoff datavg, and export datavg.C、Stop the applications in datavg, unmount all datavg filesystems, and reduce datavg by the SAN disks.D、Use the 'cpvg' command with the -z option to copy and compress datavg to different physical volumes.

A system administrator has a filesystem called /test/data in volume group datavg. Which of the following commands will allow the administrator to create a mirrored copy of the filesystem’s data?()A、chfsB、chlvC、mklvcopyD、mkfscopy

The data on datavg is inaccessible. Using "df" the user discovers that none of the datavg filesystems are mounted. Running "lsvg" shows only rootvg. Running "importvg -y" gives the following error: "056-056 volume cannot be varied on because pv is marked missing". Which of the following steps should be performed?()A、Run cfgmgr. B、Run synclvodm. C、Look in errorlog for hardware problems. D、Boot into service mode and run fsck on filesystems.

A system administrator notices that one of the mirrored disks, hdisk7 on datavg, has had a hardware failure. What is the best method of recover without causing additional problems?()A、unmirrorvg datavg hdisk7 reducevg datavg hdisk7 replace the physical volume, run cfgmgr extendvg datavg hdisk7 mirrovg datavg hdisk7B、varyoffvg datavg Rmdev -l hdisk7 -d Replace the physical volu,e run cfgmgr The system will automatically remirror when the disk is replacedC、unmirrorvg datavg hdisk7 rmdev -l hdisk7 - d replace the physical volume, run cfgmgr extendvg datavg hdisk7 The system will automatically remirror when the disk is replaced.D、unmirrorvg datavg hdisk7 reducevg data hdisk7 rmdev -l hdisk7 -d replace the physical volume, run cfgmgr extendvg datavg hdisk7 mirrovg datavg

You are using RMAN to perform a closed database backup of your database. You issue these RMAN commands: STARTUP MOUNT; BACKUP  FORMAT ’/BACKUP/df_%d_%s_%p.bus’  DATABASE filesperset = 2;  Which components are included in the backup?()A、Only the data files.B、Only the data files and the online logs.C、The data files, control files, and the online logs.D、The data files and control files, but not the online logs.

The application tables owned by the user TEST in a test database need to be exported to the APPS schema in the production database by using Data Pump.  Which option of Data Pump Import would you use to accomplish this?()  A、 ownerB、 touserC、 attachD、 remap_schema

Your business has departmental reports that are generated every day. Each department must use the same set of queries, but access a different subset of data in the tables, depending on which department generates the report. The format of the reports is being developed; currently, the format changes daily. How would you configure the database to ensure that each department generates its report (based on its target data) using the most recent report format every day?()A、 By having each user run the report generation procedure at the scheduled time, supplying the necessary input variables.B、 By creating a program using DBMS_JOB that accepts one or more variables, and creating a job that calls this program using DBMS_JOB.C、 By having each user schedule a job using DBMS_JOB that accepts one or more input variables and calls a procedure that generates the report.D、 By having each user create a job using DBMS_SCHEDULER that includes all the information and commands necessary to generate the report.E、 By creating a program using DBMS_SCHEDULER that accepts one or more variables, and creating a job that calls this program using DBMS_SCHEDULER.

In user-managed backup and recover procedures, how are data files backed up? ()A、Using SQL commands.B、Using SQL*Plus commands.C、Using operating system commands.D、Using Recover Manager commands.

You have a computer that runs Windows 7. The computer is a member of a domain. You share D:/data asData. You assign Everyone Full control share permissions to the folder. No other share permissions areassigned to the folder. From another computer, you attempt to create a file in the Data share by using a domain account named User1. You receive the following error message: Destination Folder Access Denied.You need to ensure that you can create files in the Data share by using the User1 account.  What should you do?()A、Create a local user named User1.B、Add User1 to the local Power Users group.C、Assign User1 Write NTFS permission on the D:///data folder.D、Assign User1 Full control share permissions to the Data share.

单选题You design a Business Intelligence (BI) solution by using SQL Server 2008.  The solution includes a SQL Server 2008 Reporting Services (SSRS) infrastructure in a scale-out deployment. All reports use a SQL Server 2008 relational database as the data source. You implement row-level security. You need to ensure that all reports display only the expected data based on the user who is viewing the report. What should you do?()A Store the credential of a user in the data source.B Configure the infrastructure to support Kerberos authentication.C Configure the infrastructure to support anonymous authentication by using a custom authentication extension.D Ensure that all report queries add a filter that uses the User.UserID value as a hidden parameter.

单选题The application tables owned by the user TEST in a test database need to be exported to the APPS schema in the production database by using Data Pump.  Which option of Data Pump Import would you use to accomplish this?()A ownerB touserC attachD remap_schema

单选题In your test database, you find that a user’s session is executing a lot of SQL statements, resulting in the generation of a large number of trace files. While investigating the reason, you find that SQL trace has been enabled at the instance level.  You want to disable SQL trace, remotely, only for that user session to reduce the volume of trace data being generated.  How do you achieve this objective?()Aby setting the SQL_TRACE parameter to FALSE in the parameter fileBby using DBMS_MONITOR.SESSION_TRACE_DISABLE to disable the tracing for the user sessionCby setting the SQL_TRACE parameter to FALSE by using the ALTER SYSTEM command in the user sessionDby setting the SQL_TRACE parameter to FALSE by using the ALTER SESSION command in the user session

多选题Examine the query and its output executed In an RDBMS Instance:Which three statements are true about the users (other than sys) in the output?()AThe C # # B_ADMIN user can perform all backup and recovery operations using RMAN only.BThe C # # C_ADMIN user can perform the data guard operation with Data Guard Broker.CThe C # # A_ADMIN user can perform wallet operations.DThe C # # D_ADMIN user can perform backup and recovery operations for Automatic Storage Management (ASM).EThe C # # B_ADMIN user can perform all backup and recovery operations using RMAN or SQL* Plus.

单选题Examine the RMAN command: SWITCH DATAFILE ’/DISK3/user_data01.dbf’; Which command do you need to issue before you issue the above command, so that RMAN finds the file in the restored location of ’DISK2/user_data01.dbf’? ()ARESTORE DATAFILE ’/DISK2/user_data01.dbf’BRESTORE DATAFILE ’/DISK3/user_data01.dbf’CSET NEWNAME FOR ’/DISK3/user_data01.dbf’ TO’/DISK2/user_data01.dbf’DSET NEWNAME FOR ’/DISK2/user_data01.dbf’ TO’/DISK3/user_data01.dbf’

单选题Your network consists of a single Active Directory domain. All servers run Windows Server 2003 Service Pack 2 (SP2). All client computers run Windows XP Professional Service Pack 3 (SP3). You have a file server that contains two volumes named C and D. Volume C contains a folder named User1data. User1 is the owner of all files in the User1data folder. You copy the User1data folder to volume D. You examine the ownership of the User1data folder on volume D and discover that your user account is listed as the owner. You need to ensure that User1 is the owner of the User1data folder on volume D. What should you do? ()AModify the Advanced Security settings for the User1data folder.BModify the Advanced Attributes settings for the User1data folder.CDelete the User1data folder on volumeDFrom Windows Explorer, move the User1data folder from volume C to volume

单选题What is the objective of the aaa authentication login console-in local command?()AIt specifies the login authentication method list named console-in using the local user database on the routerBIt specifies the login authorization method list named console-in using the local RADIUS username-password data baseCIt specifies the login authentication list named console-in using the local username- password data base on the routerDIt specifies the login authorization method list named console-in using the local username- password data base on the router

多选题Examine the statement:   SQL CREATE TABLESPACE user_data  2 EXTENT MANAGEMENT LOCAL  3 SEGMENT SPACE MANAGEMENT AUTO;   Which twp assumptions must be true for this statement to execute successfully?()AOracle Managed Files are used for this instance.BThe USER_DATA tablespace is managed using FET$/UET$ tables.CThe COMPATIBLE initialization parameter must be 9.0.0 or higher.DSpace within segments in the USER_DATA tablespace is managed with freelists.

单选题Users complain SQL statements using a particular index fail. Using DBVERIFY, you find that two separate blocks in the index have become corrupt. The database data files for user data and index are very large.  What is the least disruptive recover strategy available in Oracle9i?()ARebuild the index using the online option. BTake the individual data file offline (not the whole tablespace), restore and recover the data file from backup with RMAN, then set the data file online again. CWithout setting the individual data file offline, use RMAN with Block Media Recovery to restore and recover only those blocks. DTake the individual data file (not the whole tablespace) offline, use RMAN with Block Media Recovery to restore and recover only those blocks, then set the data file online again.

多选题USER_DATA is a nonencrypted tablespace that contains a set of tables with data. You want to convert all existing data in the USER_DATA tablespace and the new data into the encrypted format. Which methodswould you use to achieve this?()AUse Data Pump to transfer the existing data to a new encrypted tablespaceBUse ALTER TABLE MOVE to transfer the existing data to a new encrypted tablespaceCUse CREATE TABLE AS SELECT to transfer the existing data to a new encrypted tablespaceDEnable row movement for each table to be encrypted and then use ALTER TABLESPACE to encrypt the tablespaceEEncrypt the USER_DATA tablespace using the ALTER TABLESPACE statement so that all the data in the tablespace is automatically encrypted