单选题In your production database, users report that they are unable to generate reports on an important table because it does not contain any data. While investigating the reason, you realize that another user executed the TRUNCATE TABLE command, which accidentally caused the data to be lost. Now you want to recover the lost data of the table without affecting objects in other schemas.  Which method must you use to recover the lost data?()A Complete Recovery with online redo logB Complete Recovery with archived redo logC Tablespace Point-in-Time Recovery (TSPITR)D Incomplete Recovery with system change number (SCN)

单选题
In your production database, users report that they are unable to generate reports on an important table because it does not contain any data. While investigating the reason, you realize that another user executed the TRUNCATE TABLE command, which accidentally caused the data to be lost. Now you want to recover the lost data of the table without affecting objects in other schemas.  Which method must you use to recover the lost data?()
A

 Complete Recovery with online redo log

B

 Complete Recovery with archived redo log

C

 Tablespace Point-in-Time Recovery (TSPITR)

D

 Incomplete Recovery with system change number (SCN)


参考解析

解析: 暂无解析

相关考题:

You realize that the control file is damaged in your production database.After restoring the control file from autobackup, what is the next step that you must do to proceed with the database recovery?()A. Mount the databaseB. Open the database in NORMAL modeC. Open the database in RESTRICTED modeD. Open the database with the RESETLOGS option

You are using a recovery catalog to maintain Recovery Manager (RMAN) backup information for yourproduction database. You have registered your production database and are performing regular backups.Because of a new requirement you have added a few new tablespaces to your production database and youwant them to be included in backups.Identify two options for completing this task. ()(Choose two.)A. Reregistering the target database in recovery catalogB. Transporting the new tablespaces to the recovery catalog databaseC. Syncronizing the recovery catalog with the target database control fileD. Performing a fresh backup of the target database to include the new data files in the catalog database

In your multitenant container database (CDB) containing pluggable databases (PDB), users complain about performance degradation.How does real-time Automatic database Diagnostic Monitor (ADDM) check performance degradation and provide solutions?()A. It collects data from SGA and compares it with a preserved snapshot.B. It collects data from SGA, analyzes it, and provides a report.C. It collects data from SGA and compares it with the latest snapshot.D. It collects data from both SGA and PGA, analyzes it, and provides a report

You are the administrator of a database that contains 64 lookup tables. These tables store static data that should not change. However, users report that some of this data is being changed. You need to prevent users from modifying the data.You want to minimize changes to your security model and to your database applications. How should you modify the database?A.Create a filegroup named LOOKUP. Move the lookup tables to this filegroup. Select the read only check box for the filegroup.B.Create a database role named datamodifier. Grant SELECT permissions to the datamodifier role. Add all users to the role.C.Deny INSERT, UPDATE, and DELETE permissions for all users. Create stored procedures that modify data in all tables except lookup tables. Require users to modify data through these stored procedures.D.Create a view of the lookup tables. Use the view to allow users access to the lookup tables.

Which report will provide information on the most recently completed  plan?()A、 Report 08 - Job HistogramB、 Report 07 - Job History ListingC、 Report 10B - Actual Production DetailD、 Report 11 - Planned Production Schedule

You realize that the control file is damaged in your production database.After restoring the control file from autobackup, what is the next step that you must do to proceed with the database recovery?()A、Mount the databaseB、Open the database in NORMAL modeC、Open the database in RESTRICTED modeD、Open the database with the RESETLOGS option

You have been recently hired as a database administrator. Your senior manager asks you to study the production database server and submit a report on the settings done by the previous DBA.  While observing the server settings, you find that the following parameter has been set in the parameter file of the database:  REMOTE_OS_AUTHENT = TRUE  What could have been the reason to set this parameter as TRUE?()A、to enable operating system authentication for a remote clientB、to restrict the scope of administration to identical operating systemsC、to allow the start up and shut down of the database from a remote clientD、to enable the administration of the operating system from a remote clientE、to disable the administration of the operating system from a remote client

Your production database uses an Automatic Storage Management (ASM) instance to manage its files.  You want to add a new disk group to the ASM instance to manage the increased data load.  What action would you perform to include the new disk group in the ASM instance without causing any impact on the currently connected users?()A、mount the new disk group in the ASM instanceB、restart the ASM instance and the production database instanceC、register the new disk groups in the production database instanceD、restart the ASM instance without restarting the production database instanceE、include the new disk group in the ASM_DISKSTRING parameter in the parameter file and restart the ASM instance

There is a problem with one of the disks used for your database and your system administrator informs you that the disk needs to be replaced. The replacement disk will not be available until tomorrow.  There was only one data file on this disk; it belongs to the USERS tablespace in your PROD database. Your PROD database runs in ARCHIVELOG mode and nightly online backups are taken. The users need to be able to access the data in the USERS tablespace before the replacement disk arrives. You have already taken the USERS tablespace offline and have restored the data file from last night’s backup to a new disk. Which additional steps are required in order to make the USERS tablespace available?()A、Only bring the tablespace back online.B、Only recover the tablespace and then bring the tablespace back online.C、Shut down the database, recover the data file and then start up the database.D、Issue the ALTER DATABASE RENAME FILE command, recover the tablespace, and then bring the tablespace online.E、Recover the tablespace, issue the ALTER DATABASE RENAME FILE command, and then bring the tablespace online.

You work as a database administrator at Certkiller .com. In your production database there is a job, CALC_STAT, which has been scheduled to run every Friday at 5.00 p.m. CALC_STATupdates the optimizer statistics for the objects owned by the APPSschema. You want the task to be generic, thereby allowing users to modify the attributes of the task at run time without affecting the original task.Which component of Oracle Scheduler must you define to achieve this?()A、 WindowB、 ProgramC、 Job classD、 Window group

单选题There is a problem with one of the disks used for your database and your system administrator informs you that the disk needs to be replaced. The replacement disk will not be available until tomorrow.  There was only one data file on this disk; it belongs to the USERS tablespace in your PROD database. Your PROD database runs in ARCHIVELOG mode and nightly online backups are taken. The users need to be able to access the data in the USERS tablespace before the replacement disk arrives. You have already taken the USERS tablespace offline and have restored the data file from last night’s backup to a new disk. Which additional steps are required in order to make the USERS tablespace available?()AOnly bring the tablespace back online.BOnly recover the tablespace and then bring the tablespace back online.CShut down the database, recover the data file and then start up the database.DIssue the ALTER DATABASE RENAME FILE command, recover the tablespace, and then bring the tablespace online.ERecover the tablespace, issue the ALTER DATABASE RENAME FILE command, and then bring the tablespace online.

多选题You are using a recovery catalog to maintain Recovery Manager (RMAN) backup information for yourproduction database. You have registered your production database and are performing regular backups. Because of a new requirement you have added a few new tablespaces to your production database and youwant them to be included in backups.Identify two options for completing this task. ()(Choose two.)AReregistering the target database in recovery catalogBTransporting the new tablespaces to the recovery catalog databaseCSyncronizing the recovery catalog with the target database control fileDPerforming a fresh backup of the target database to include the new data files in the catalog database

单选题ou need to configure fine-grained access control to external network resources from within your database. You create an access control list (ACL) using the DBMS_NETWORK_ACL_ADMIN package.  Which statement is true regarding the ACL created?()A It is a list of remote database links stored in the XML file that are available to the users of the database.B It is a list of users and network privileges stored in the XML file according to which a group of users can connect to one or more hosts.C It is a list of users and network privileges stored in the data dictionary according to which a group of users can connect to one or more hosts.D It is the list of the host names or the IP addresses stored in the data dictionary that can connect to your database through PL/SQL network utility packages such as UTL_TCP.

单选题Which report will provide information on the most recently completed  plan?()A Report 08 - Job HistogramB Report 07 - Job History ListingC Report 10B - Actual Production DetailD Report 11 - Planned Production Schedule

单选题In your multitenant container database (CDB) containing pluggable databases (PDB), users complain about performance degradation. How does real-time Automatic database Diagnostic Monitor (ADDM) check performance degradation and provide solutions?()AIt collects data from SGA and compares it with a preserved snapshot.BIt collects data from SGA, analyzes it, and provides a report.CIt collects data from SGA and compares it with the latest snapshot.DIt collects data from both SGA and PGA, analyzes it, and provides a report

单选题You work as a database administrator at Certkiller .com. Your production database uses an Automatic Storage Management (ASM) instance to manage its files. You want to add a new disk group to the ASM instance to manage the increased data load. What action would you perform to include the new disk group in the ASM instance without causing any impact on the currently connected users?()A mount the new disk group in the ASM instanceB restart the ASM instance and the production database instanceC register the new disk groups in the production database instanceD restart the ASM instance without restarting the production database instanceE include the new disk group in the ASM_DISKSTRING parameter in the parameter file and restart the ASM instance

单选题Your production database uses an Automatic Storage Management (ASM) instance to manage its files. You want to add a new disk group to the ASM instance to manage the increased data load. What action would you perform to include the new disk group in the ASM instance without causing any impact on the currently connected users?()Amount the new disk group in the ASM instanceBrestart the ASM instance and the production database instanceCregister the new disk groups in the production database instanceDrestart the ASM instance without restarting the production database instanceEinclude the new disk group in the ASM_DISKSTRING parameter in the parameter file and restart the ASM instance

单选题You are using Windows 2000 Professional on your desktop computer. You are working on the company’s financial report and you want other users on the network to able to modify your documents for the report. You want users to share the financial report folder on the network. Because the network contains confidential information you want to prevent users from the enabling off line access for the network share that contains the financial report. What should you do?()AUse Windows Explorer to receive the offline filesBUsing the Windows Explorer, disable the cache for the reports on the network shareCUse the Windows NT explorer to grant the special access for the reports on the network  shareDUse the synchronization manager to configure synchronization not to occur when users are  connected to the LAN connection.

单选题You are using recovery Manager (RMAN) with a recovery catalog to backup up your production database. The backups and the archived redo log files are copied to a tape drive on a daily basis. The database was open and transactions were recorded in the redo logs. Because of fire in the building you lost your servers having the production database and the recovery catalog database. The archive log files generated after the last backup are intact on one of the remote locations. While performing a disaster recovery of the production database what is the next step that you must perform after restoring the data files and applying archived redo logs?()AOpen the database in NORMAL modeBOpen the database in read-only modeCOpen the database in RESTRICTED modeDOpen the database with the RESETLOGS option

单选题In your Certkiller .com production database, you find that the database users are able to create and read files with unstructured data, available in any location on the host machine from an application.  You want to restrict the database users to access files in a specific location on the host machine.  What could do to achieve this?()AModify the value for the UTL_FILE_DIR parameter in the parameter fileBGrant read and write privilege on the operating system path to the database usersCModify the value for the LDAP_DIRECTORY_ACCESS parameter in the parameter fileDModify the value for the PLSQL_NATIVE_LIBRARY_DIR parameter in the parameter fileECreate a directory object referring to the operating system path, and grant read and write privilege on the directory object to the database users

多选题In your production database, you observe that users’ transactions are consuming a lot of resources and you plan to impose resource restrictions by using Resource Manager. For which three resources can you enable usage restrictions by using Resource Manager? ()ACPU usageBdegree of parallelismCnumber of open cursorsDnumber of sorts performedEidle time for blocking sessionsFnumber of disk I/O operations performedGnumber of memory I/O operations performed

单选题In your production database, users report that they are unable to generate reports on an important table because it does not contain any data. While investigating the reason, you realize that another user executed the TRUNCATE TABLE command, which accidentally caused the data to be lost. Now you want to recover the lost data of the table without affecting objects in other schemas. Which method must you use to recover the lost data?()AComplete Recovery with online redo logBComplete Recovery with archived redo logCTablespace Point-in-Time Recovery (TSPITR)DIncomplete Recovery with system change number (SCN)

单选题You work in a company which is named Wiikigo Corp. The company uses SQL Server 2008. You are the administrator of the company database. Now you are in charge of a SQL Server 2008 instance. The server has a very large database named DB1. An application which is constantly available uses DB1. Now you get a report from users, in the report users complain that server has a poor performance. As the technical support, you have to improve the performance of the application by using the Database Engine Tuning Advisor. Besides this, you must make sure that the action of analyzing the workload will not affect the performance of the production server.So what should you do?()AOn the local server, enable the XP_MSVER stored procedure BOn the remote server, enable the XP_MSVER stored procedure. COn the production server, use the dta.exe utility along with an XML input file. DYou should configure a test server that has a similar hardware configuration. Use the dta.exe utility on the test server along with an XML input file

多选题You work as a database administrator at Certkiller .com. In your production database, you observe that users’ transactions are consuming a lot of resource and you plan to impose resource restrictions by using Resource Manager. For which three resources can you enable usage restrictions by using Resource Manager? ()ACPU usageBdegree of parallelismCnumber of open cursorsDnumber of sorts performedEidle time for blocking sessionsFnumber of disk I/O operations performedGnumber of memory I/O operations performed

多选题You are using a recovery catalog to maintain Recovery Manager (RMAN) backup information for your production database. You have registered your production database and are performing regular backups. Because of a new requirement you have added a few new tablespaces to your production database and you want them to be included in backups.  Identify two options for completing this task.()AReregistering the target database in recovery catalogBTransporting the new tablespaces to the recovery catalog databaseCSyncronizing the recovery catalog with the target database control fileDPerforming a fresh backup of the target database to include the new data files in the catalog database