Oracle认证考试

You are using RMAN to backup your ARCHIVELOG mode database. You have enabled control-file autobackups. Which files are not backed up during the RMAN backup?()A、Database Datafiles B、Database Control Files C、Online redo logsD、Archived redo logs E、The databa

题目

You are using RMAN to backup your ARCHIVELOG mode database. You have enabled control-file autobackups. Which files are not backed up during the RMAN backup?()

  • A、Database Datafiles 
  • B、Database Control Files 
  • C、Online redo logs
  • D、Archived redo logs 
  • E、The database SPFILE 
  • F、None of the above, all these files are backed up. 
如果没有搜索结果,请直接 联系老师 获取答案。
如果没有搜索结果,请直接 联系老师 获取答案。
相似问题和答案

第1题:

When you are designing a Web application, which options define how rich text displays in a browser?()

  • A、"Using HTML"
  • B、"Using Java Applet"
  • C、"Using AJAX Control"
  • D、"Using Best Fit for OS"

正确答案:C

第2题:

You suspect unauthorized data manipulation language (DML) operations on a particular table. You want to track users who are performing the transactions and the values used in the transactions. Also, you plan to transfer these values to another table for analysis.  How would you achieve this?()

  • A、by using triggers
  • B、by using external tables
  • C、by using anonymous PL/SQL blocks
  • D、by auditing all DML operations on the table

正确答案:A

第3题:

An administrator account is granted the CREATE SESSION and SET CONTAINER system privileges.A multitenant container database (CDB) instant has the following parameter set:THREADED_EXECUTION = FALSEWhich four statements are true about this administrator establishing connections to root in a CDB that has been opened in read only mode?()

A. You can conned as a common user by using the connect statement.

B. You can connect as a local user by using the connect statement.

C. You can connect by using easy connect.

D. You can connect by using OS authentication.

E. You can connect by using a Net Service name.

F. You can connect as a local user by using the SET CONTAINER statement.


参考答案:C, D, E, F

第4题:

You need to recommend a solution for managing administrative rights for the branch office client computers. The solution must meet the companys technical requirements.What should you recommend configuring?()

  • A、Account Policies by using GPOs
  • B、Local Users and Groups by using Group Policy preferences
  • C、Restricted Groups by using GPOs
  • D、Security Options by using Group Policy preferences

正确答案:B

第5题:

You are maintaining your database in Oracle10g. You find that the INDEXES index tablespace should be recovered. How will you recover the index tablespace?()

  • A、 by using the Flashback Database feature
  • B、 by using RMAN incomplete recovery
  • C、 by performing a user-managed incomplete recovery
  • D、 by dropping and re-creating the index tablespace

正确答案:D

第6题:

You want to check the EMP table in the user, Scott’s schema for block corruption. You also want to fix the corrupted blocks, if any. How will you accomplish the required task?()

  • A、by using the ANALYZE utility
  • B、by using the DBVERIFY utility
  • C、by using the DB_BLOCK_CHECKING parameter
  • D、by using the DBMS_REPAIR package

正确答案:D

第7题:

You issued the following command to analyze the SCOTT.EMP table for block corruption:   ANALYZE TABLE SCOTT.EMP VALIDATE STRUCTURE;  You received the following error:   ORA-01578: ORACLE data block corrupted  (file # %s, block # %s)   How will you resolve the block corruption problem?()

  • A、 by using the DBMS_REPAIR package
  • B、 by using the DB_BLOCK_CHECKING parameter
  • C、 by using the DBVERIFY utility
  • D、 will not be completely resolved until the hardware fault is corrected

正确答案:D

第8题:

You would be using mainly English in this job. Can you manage English conversation?


正确答案:
         

第9题:

You work as a Web Developer at Certkiller.com. You are in the process of creating a Webapplication using Microsoft ASP.NET 3.5.  An exception management framework is not used in the Web application. You need to ensure thatthe application log the unhandled exceptions automatically to the event log. You need to configurethe Web.config file to accomplish this. Identify the configuration that will assist you in thisscenario?()

  • A、You should consider using the <healthMonitoring enabled="true"/> configuration.
  • B、You should consider using the <deployment retail="true"/> configuration.
  • C、You should consider using the <customErrors mode="On"/> configuration.
  • D、You should consider using the <trace enabled="true"/> configuration.

正确答案:A

第10题:

You have a server that runs Windows Server 2003 Service Pack 2 (SP2). You create an Automated System Recovery (ASR) backup of the server. You restart the server and receive a critical error. You need to restore the server by using ASR. What should you do first? ()

  • A、Start the computer by using Safe mode.
  • B、Start the server by using the ASR floppy disk.
  • C、Start the computer by using the Last Known Good Configuration option.
  • D、Start the server by using the Windows Server 2003 SP2 installation media.

正确答案:D

更多相关问题