单选题You work with a newly created database. Presently, there is no application load on the database instance. You want to create a baseline for tuning the application, so you decide to collect recommendations that can be implemented to improve application performance. What action must you take to achieve this?()A Run Segment AdvisorB Run the SQL Tuning Advisor (STA)C Run the Automatic Workload Repository (AWR) reportD Run the SQL Access Advisor with a hypothetical workload
单选题
You work with a newly created database. Presently, there is no application load on the database instance. You want to create a baseline for tuning the application, so you decide to collect recommendations that can be implemented to improve application performance. What action must you take to achieve this?()
A
Run Segment Advisor
B
Run the SQL Tuning Advisor (STA)
C
Run the Automatic Workload Repository (AWR) report
D
Run the SQL Access Advisor with a hypothetical workload
参考解析
解析:
暂无解析
相关考题:
You are a Database Administrator with WonderWeb. You use a password file to establish connections to the Sales database located on the server. You created the password file using the following command: ORAPWD file=d:/oracle/ora9i/orapwU01 password=admin entries=4 You erroneously deleted the password file while the database was running. You re-create the password file using the following command: ORAPWD file=d:/oracle/ora9i/orapwU01 password=change_on_install entries=4 However, when you try to connect as the SYS user, you receive the following error: ORA-01031: insufficient privileges What should you do to resolve this error?()A、 Delete the newly created password file and re-create another password file with the password admin, without shutting down the database.B、 Enable the operating system authentication, shut down the database, disable the operating system authentication, and restart the database using the password file.C、 Enable the operating system authentication, shut down the database, re-create the password file using the same ORAPWD command, and restart the database using the password file.D、 Delete the newly created password file, enable operating system authentication and shut down the database. Then, re-create another password file using the same ORAPWD command and restart the database using this password file.
You work as a network Exchange administrator at Company.com.The Company.com network currently consists of a single Active Directory forest containing a single domain named Company.com.The Company.com organization makes use of Microsoft Exchange Server 2010 as their messaging solution.During the course of the business week you receive instruction from Company.com to ensure that a newly created room mailbox automatically accepts meeting requests.What should you do?()A、You should consider having a managed folder mailbox policy assigned.B、You should consider having the resource booking attendant enabled.C、You should consider having the mailbox permissions modified.D、You should consider having the moderation for the mailbox enabled.
You work as a network Exchange administrator at Company.com.The Company.com network currently consists of a single Active Directory forest containing a single domain named Company.com.The Company.com organization makes use of Microsoft Exchange Server 2010 as their messagingsolution.During the course of the business week you receive instruction from Company.com to have a set of cmdlets grouped for administrative delegation of duties.What should you do?()A、You should consider having a new management role created.B、You should consider having a new role assignment policy created.C、You should consider having a managed folder mailbox policy created.D、You should consider having a new distribution group created.
You work as a network Exchange administrator at Company.com.The Company.com network currently consists of a single Active Directory forest containing a single domain named Company.com.The Company.com organization makes use of Microsoft Exchange Server 2010 as their messaging solution.Company.com has recently acquired a new Internet domain name from the Service Provider (SP).During the course of the business week you receive instruction from Company.com to ensure that allthe network users are able to send and receive e-mail messages sent to the newly acquired domain name. What should you do?()A、You should consider having an accepted domain created.B、You should consider having an e-mail address policy created.C、You should consider having the properties of the default Receive connector modified.D、You should consider having a sharing policy created.E、You should consider having a remote domain created.
You work in a company which is named Wiikigo Corp. The company uses SQL Server 2008. You are the administrator of the company database. Now you are in charge of a SQL Server 2008 instance. There is a computer which hosts several applications in your company. The instance runs on the computer. A job named DiliveryList is created by you. This job requires a file to be written to a file server. But because the job cannot access the file server, it fails to run. You intend to configure the SQL Server Agent service so that only the SQL Server Agent service has read and write access to the file server. Which account type should you use? () A、You should use local Service accountB、You should use network Service accountC、You should use domain accountD、You should use local System account
You work as a network exchange administrator at company.com.the company.com network currently consists of a single active directory forest containing a single domain named company.com.the company.com organization makes use of microsoft exchange server 2010 as their messaging solution.company.com has recently acquired a new internet domain name from the internet service provider (isp).during the course of the business week you receive instruction from company.com to ensure that all the network users are able to send and receive e-mail messages sent to the newly acquired domain name. What should you do?()A、you should consider having an accepted domain and an e-mail address policy created.B、you should consider having the properties of the default receive connector modified.C、you should consider having an accepted domain and a sharing policy created.D、you should consider having a remote domain and an e-mail address policy created.
You work as a network Exchange administrator at Company.com.The Company.com network currently consists of a single Active Directory forest containing a single domain named Company.com.The Company.com organization makes use of Microsoft Exchange Server 2010 as their messaging solution.During the course of the business week you receive instruction from Company.com to ensure that the newly hired administrative user named Rory Allen is able to move mailboxes in the organization whilst ensuring that you assign the least amount permissions for Rory Allen.What should you do?()A、You should consider having Rory Allen added to the Organization Management role group.B、You should consider having Rory Allen added to the Recipient Management security group.C、You should consider having a local move request created.D、You should consider having a custom Management role created and assigned to Rory Allen.
You work in a company which uses SQL Server 2008. You are the administrator of the company database. Now you are in charge of a SQL Server 2008 instance. There is a stored procedure. The stored procedure implements a database maintenance process. A SQL Server Agent job should be created to that runs the stored procedure. Besides this, you must make sure that after it is completed successfully, the job is removed. What should you do? ()A、You should create a job which is assigned to the Database Maintenance categoryB、You should create an Alert which will run another to delete the maintenance job.C、You should create a job. You schedule the job to run only once.D、You should create a job. The job uses the Automatically delete job option
You have implemented folder compression on the Windows 2000 Server and Windows 2000 Professional computers on your network. A user named Julia copies a compressed folder from an NTFS partition on her Windows 2000 Workstation to a shared NTFS folder on a remote Windows 2000 Server. What effect will this have on the newly created folder?()A、The newly created folder will retain its original compression state.B、The newly created folder will inherit the compression state of the target folder.C、The newly created folder will be automatically uncompressed.D、Folder compression depends on the users access permissions.
You work as a system administrator at Certkiller.com. You are in the process of creating anASP.NET application using Microsoft .NET Framework v3.5. You receive an instruction from management to create a custom-templated server control. Toensure productivity you need to make sure that the child controls of the newly created servercontrol are identified within the hierarchy of the page. You thus need to identify the interface thatwill accomplish this. What should you do?()A、You should consider implementing the IRequiresSessionState interface.B、You should consider implementing the ITemplatable interface.C、You should consider implementing the IPostBackDataHandler interface.D、You should consider implementing the INamingContainer interface
You work in a company which is named Wiikigo Corp. The company uses SQL Server 2008. You are the administrator of the company database. Now you are in charge of a SQL Server 2008 instance. There is a database named Service in the instance. There is a database user who is named ServiceGreatUser. A SQL Server login named ServiceGreatLogin maps to ServiceGreatUser in the Service database. According to the requirement of the company CIO, the database user can only perform the two tasks below: the database user executes all stored procedures that currently exist in the Sales database and executes all stored procedures that will be created in the Sales database. So what should you do to ensure this? ()A、ServiceGreatUser should be added to the appropriate fixed database roles. B、You should assign the appropriate object-level permissions to ServiceGreatUser C、You should assign the appropriate server-level permissions to ServiceGreatLogin D、You should assign the appropriate database-level permissions to ServiceGreatUser
You work as an administrator at ABC.com. The ABC.com network consists of a single domain named ABC.com. All servers in the ABC.com domain, including domain controllers, have Windows Server 2012 R2 installed.When you recently added new workstations to the ABC.com manually,you found that that the computer accounts were created in the default container. You want to make sure that the default container for newly created computers is redirected to a specified,target organizational unit (OU).Which of the following actions should you take?()A、You should consider making use of the replace.exe command-line tool.B、You should consider making use of the redircmp.exe command-line tool.C、You should consider making use of the redirusr.exe command-line tool.D、You should consider making use of the rexec.exe command-line tool.
You work in a company which is named Wiikigo Corp. The company uses SQL Server 2008. You are the administrator of the company database. Now you are in charge of a SQL Server 2008 instance. There is a database named DB1 in the instance. On DB1, quite few logged operations are performed. Now according to the requirement of the company CIO, you must validate that the database can be restored to a specific point in time. So what action should you perform to achieve this goal? () A、You should verify that the simple recovery model is used by the database.B、You should verify that the full recovery model is used by the database.C、You should verify that the checksum page verify option is used by the database. D、You should verify that the bulk-logged recovery model is used by the database.
单选题You work as a network exchange administrator at company.com.the company.com network currently consists of a single active directory forest containing a single domain named company.com.the company.com organization makes use of microsoft exchange server 2010 as their messaging solution.company.com has recently acquired a new internet domain name from the internet service provider (isp).during the course of the business week you receive instruction from company.com to ensure that all the network users are able to send and receive e-mail messages sent to the newly acquired domain name. What should you do?()Ayou should consider having an accepted domain and an e-mail address policy created.Byou should consider having the properties of the default receive connector modified.Cyou should consider having an accepted domain and a sharing policy created.Dyou should consider having a remote domain and an e-mail address policy created.
单选题You work as a system administrator at Certkiller.com. You are in the process of creating anASP.NET application using Microsoft .NET Framework v3.5. You receive an instruction from management to create a custom-templated server control. Toensure productivity you need to make sure that the child controls of the newly created servercontrol are identified within the hierarchy of the page. You thus need to identify the interface thatwill accomplish this. What should you do?()AYou should consider implementing the IRequiresSessionState interface.BYou should consider implementing the ITemplatable interface.CYou should consider implementing the IPostBackDataHandler interface.DYou should consider implementing the INamingContainer interface
单选题You work in a company which is named Wiikigo Corp. The company uses SQL Server 2008. You are the administrator of the company database. Now you are in charge of a SQL Server 2008 instance. There is a SQL Server 7.0 database. You upgrade the database to the SQL Server instance. According to the company requirement, you must make sure that suspect pages can be detected in the database. So what action should you perform to achieve this goal?()AFor the database, you should turn on the TRUSTWORTHY database optionBFor the database, the PAGE_VERIFY database option should be set to CHECKSUMCFor the database, the database compatibility level option should be set to 10DFor the model database, the PAGE_VERIFY database option should be set to TORN_PAGE_DETECTION.
多选题You work as a network Exchange administrator at Company.com.The Company.com network currently consists of a single Active Directory forest containing a single domain named Company.com.The Company.com organization makes use of Microsoft Exchange Server 2010 as their messaging solution.Company.com has recently acquired a new Internet domain name from the Service Provider (SP).During the course of the business week you receive instruction from Company.com to ensure that allthe network users are able to send and receive e-mail messages sent to the newly acquired domain name. What should you do?()AYou should consider having an accepted domain created.BYou should consider having an e-mail address policy created.CYou should consider having the properties of the default Receive connector modified.DYou should consider having a sharing policy created.EYou should consider having a remote domain created.
单选题You are managing an Oracle Database 10g database that uses Oracle Managed Files (OMF). You enabled the block change tracking feature for the database. Which statement regarding the change tracking file is true?()A One block change tracking file is created for each data file. By default, the file is created in DB_CREATE_FILE_DEST.B One block change tracking file is created for each data file. By default, the file is created in BACKGROUND_DUMP_DEST.C One block change tracking file is created for the database. By default, the file is created in DB_CREATE_FILE_DEST.D One block change tracking file is created for the database. By default, the file is created in BACKGROUND_DUMP_DEST.
单选题You work as an administrator at ABC.com. The ABC.com network consists of a single domain named ABC.com. All servers in the ABC.com domain, including domain controllers, have Windows Server 2012 R2 installed.When you recently added new workstations to the ABC.com manually,you found that that the computer accounts were created in the default container. You want to make sure that the default container for newly created computers is redirected to a specified,target organizational unit (OU).Which of the following actions should you take?()AYou should consider making use of the replace.exe command-line tool.BYou should consider making use of the redircmp.exe command-line tool.CYou should consider making use of the redirusr.exe command-line tool.DYou should consider making use of the rexec.exe command-line tool.
单选题You work in a company which is named Wiikigo Corp. The company uses SQL Server 2008. You are the administrator of the company database. Now you are in charge of a SQL Server 2008 instance. There is a database named Service in the instance. There is a database user who is named ServiceGreatUser. A SQL Server login named ServiceGreatLogin maps to ServiceGreatUser in the Service database. According to the requirement of the company CIO, the database user can only perform the two tasks below: the database user executes all stored procedures that currently exist in the Sales database and executes all stored procedures that will be created in the Sales database. So what should you do to ensure this? ()AServiceGreatUser should be added to the appropriate fixed database roles. BYou should assign the appropriate object-level permissions to ServiceGreatUser CYou should assign the appropriate server-level permissions to ServiceGreatLogin DYou should assign the appropriate database-level permissions to ServiceGreatUser
单选题You are a Database Administrator with TXGlobal. You use a password file to establish remote connections to the HR database on the server located at the home office. Currently, two active remote sessions exist to this database. These sessions were established using the SYSDBA privilege from the remote machines. You accidentally deleted the password file. What will be the consequence of this action?()A Both the sessions will be killed, and no new sessions will be created using the SYSDBA or SYSOPER privilege.B Both the sessions will remain active, but no new sessions will be created using the SYSDBA or SYSOPER privilege.CBoth the sessions will be killed, but new sessions will be created using the SYSDBA or SYSOPER privilege when the database restarts.D The database will crash, and no new sessions will be created using the SYSDBA or SYSOPER privilege when the database restarts.
单选题You work in a company which uses SQL Server 2008. You are the administrator of the company database. Now you are in charge of a SQL Server 2008 instance. Now you get an order from your company CIO, you have to identify whether a database integrity check (DBCC CHECKDB) was run for a particular database. Which log file should you examine?()Alog.trc Bdefault.trc CERRORLOG DSQLAGENT
单选题You work in a company which uses SQL Server 2008. You are the administrator of the company database. Now you are in charge of a SQL Server 2008 instance. There is a stored procedure. The stored procedure implements a database maintenance process. A SQL Server Agent job should be created to that runs the stored procedure. Besides this, you must make sure that after it is completed successfully, the job is removed. What should you do? ()AYou should create a job which is assigned to the Database Maintenance categoryBYou should create an Alert which will run another to delete the maintenance job.CYou should create a job. You schedule the job to run only once.DYou should create a job. The job uses the Automatically delete job option
单选题You are a professional level SQL Server 2005 database administrator in an international corporation named Wiikigo. You are experienced in implementing high-availability solutions, monitoring the database server, and design deployment. In the company, you major job is the deployment, maintenance and support of Microsoft SQL Server 2005.You work as a database administrator for your company. A SQL Server 2005 database is utilized in your company. And a table named Inventory is contained by the database. A column named Price is included by the table. According to the company policy, you cannot reduce more than 10 percent the value in the Price column in any single database operation. Through many kinds of method, the company makes updates to the Price column. For instance, the utilization of ad hoc queries is one of the methods. Since you are the database administrator, you should confirm that this company policy takes its effect. Which action should be performed?()AA stored procedure should be created, and changes are disallowed by the procedure to the Price column that violates company policy.BOn the Price column, a check constraint should be created, and a specified minimum value is required by the check constraint.CA trigger should be created, and changes are rolled back by the trigger to the Price column that violates company policy.DOn the Price column, a foreign key constraint is created to a table that valid prices are included.
单选题You work in a company which is named Wiikigo Corp. The company uses SQL Server 2008. You are the administrator of the company database. Now you are in charge of a SQL Server 2008 instance. According to the company requirement, the names of all user-defined stored procedures must contain the prefix usp_ on all instances. Besides this, you must make sure that stored procedures that do not contain this prefix cannot be created by you. What should you do?()AA policy should be created. The policy targets the name of the stored procedure that is evaluated on demand. BA policy should be created. The policy targets the name of the stored procedure that is evaluated on change. CA condition should be created. The condition targets the name of the stored procedure that is evaluated on change DA condition should be created. The condition targets the name of stored procedure that is evaluated on demand.
单选题You work as a network Exchange administrator at Company.com.The Company.com network currently consists of a single Active Directory forest containing a single domain named Company.com.The Company.com organization makes use of Microsoft Exchange Server 2010 as their messaging solution.During the course of the business week you receive instruction from Company.com to ensure that the newly hired administrative user named Rory Allen is able to move mailboxes in the organization whilst ensuring that you assign the least amount permissions for Rory Allen.What should you do?()AYou should consider having Rory Allen added to the Organization Management role group.BYou should consider having Rory Allen added to the Recipient Management security group.CYou should consider having a local move request created.DYou should consider having a custom Management role created and assigned to Rory Allen.