网友您好, 请在下方输入框内输入要搜索的题目:

题目内容 (请给出正确答案)
单选题
The staff is not able to access a database server.  The server has an ’Operating System not found’error and is set to boot from a fiber channel SAN. All other database servers are set to boot from the SAN and access the same switch and data as this database server. Which of the following is the MOST likely cause of the problem?()
A

The SAN is offline

B

Fiber channel switch

C

Multiple failed drives in the SAN

D

HBA


参考答案

参考解析
解析: 暂无解析
更多 “单选题The staff is not able to access a database server.  The server has an ’Operating System not found’error and is set to boot from a fiber channel SAN. All other database servers are set to boot from the SAN and access the same switch and data as this database server. Which of the following is the MOST likely cause of the problem?()A The SAN is offlineB Fiber channel switchC Multiple failed drives in the SAND HBA” 相关考题
考题 Your database instance is running.You are not able to access Oracle Enterprise Manager Database Control because the listener is not started.Which tool or utility would you use to start the listener?() A. Oracle Net ManagerB. Listener Control utilityC. Database Configuration AssistantD. Oracle Net Configuration Assistant

考题 You are the administrator of two SQL Server 2000 computers. One of these servers contains a 4-GB database named marketing. You want to remove the marketing database from one server and add it to the other as quickly as possible.What should you do?A.Detach the database from the original server by using the sp_detach_db stored procedure. Copy the database and the transaction log files to the new server, and attach them by using the sp_attach_db stored procedure.B.Use the DTS export wizard to transfer all database objects from the original server to the new server. Drop the database from the original server.C.Run a full backup of the database on the original server. Create a new database named marketing on the new server. Restore the backup in the new marketing database. Drop the database from the original server.D.Shut down the original server. Copy the database and the transaction log files to the new server. Use the DISK INIT and DISK REFIT statements to attach the data file to the new server. Drop the database from the original server.

考题 Which of the following is the MOST effective method to restrict staff members from accessing a service on a company server?() A. Implement ACLs.B. Disable accounts for staff members who do not require server access.C. Implement anti-spam software on the server.D. Implement anti-virus software on the server.

考题 Which of the following statements allows BOB to revoke access to the SAMPLE database from user TOM?() A.REVOKE ACCESS ON DATABASE FROM USER bobB.REVOKE CONNECT ON DATABASE FROM USER tomC.REVOKE tom FROM ACCESS ON DATABASE BY USER bobD.REVOKE tom FROM CONNECT ON DATABASE BY USER bob

考题 The company requires that every staff member ___________ able to use a computer.A.is B.will be C.would be D.be

考题 The database instance has the following parameter setting: OS_AUTHENT_PREFIX = OPS$ OS_ROLES = FALSE  REMOTE_OS_AUTHENT = FALSE REMOTE_OS_ROLES = FALSE TIMED_OS_STATISTICS = 0  You have a local operating system user SKD. You create a database user OPS$SKD, and then  assignexternal authentication. The user OPS$SKD has the CREATE SESSION privilege.  What would youachieve by the above process()A、The database user OPS$SKD will be able to administer the database.B、The authentication detail for the database user OPS$SKD is recorded in the password file.C、The local operating system user SKD will be able to access the database instance without specifying the username and password.D、The database user OPS$SKD has to login with the password of the local operating system user SKD to access the database instance.

考题 The staff is not able to access a database server.  The server has an ’Operating System not found’error and is set to boot from a fiber channel SAN. All other database servers are set to boot from the SAN and access the same switch and data as this database server. Which of the following is the MOST likely cause of the problem?()A、The SAN is offlineB、Fiber channel switchC、Multiple failed drives in the SAND、HBA

考题 Which of the following is the MOST effective method to restrict staff members from accessing a service on a company server?()A、 Implement ACLs.B、 Disable accounts for staff members who do not require server access.C、 Implement anti-spam software on the server.D、 Implement anti-virus software on the server.

考题 A staff member reports that they cannot access the shared folder on the network; however, other staff members are reporting that they can access the shared folder. Which of the following is the BEST way to identify the problem?()A、The administrator should monitor all traffic between the staff member and the server.B、The administrator should reconfigure the RAID configuration to allow more space.C、The administrator should map a drive using the net use command.D、The administrator should allow the staff member to use a USB drive.

考题 Which of the following statements allows BOB to revoke access to the SAMPLE database from user TOM?()A、REVOKE ACCESS ON DATABASE FROM USER bobB、REVOKE CONNECT ON DATABASE FROM USER tomC、REVOKE tom FROM ACCESS ON DATABASE BY USER bobD、REVOKE tom FROM CONNECT ON DATABASE BY USER bob

考题 Your database instance is running. You are not able to access Oracle Enterprise Manager Database Control because the listener is not started.  Which tool or utility would you use to start the listener?()A、 Oracle Net ManagerB、 Listener Control utilityC、 Database Configuration AssistantD、 Oracle Net Configuration Assistant

考题 You are designing a strategy to ensure that VPN users are able to access all internal resources.  What should you do?()A、 Specify a static routing table entry on VPN1 for the Dallas network.B、 Specify a static routing table entry on VPN1 for the Seattle network.C、 Implement Internet Authentication Service (IAS) on VPN1.D、 Define a User Class option for Routing  Remote Access Clients on the DHCP Server.

考题 You are configuring a failover cluster for a database server. You are assigning four nodes to the cluster. Allnodes have access to a SAN,and adequate storage is available. Which of the following options should youchoose for your quorum configuration?()A、Node MajorityB、Node And Disk MajorityC、Node And File Share MajorityD、No Majority: Disk Only

考题 You need to design the database permissions for access from the terminals to the database server. Which action or actions should you perform?()A、Create a database role named BankTerminals.B、Grant the BankTerminals role the Execute permission for the WoodgroveBanking database.C、Grant database access to the Windows Bank Terminals group, and add the group to the BankTerminals role.D、Grant the BankTerminals role the Execute permission for the Bank schema.E、Grant the Windows Bank Terminals group the Execute permission for the Bank schema.F、Grant the BankTerminals role the Execute permission for all stored procedures and user-defined functions in the Bank schema.

考题 多选题A Mysql instance is running on a dedicated server. Developers access the server from the same network subnet. Users access the database through an application that is running on a separate server in a DMZ. Which two will optimize the security of this setup?()ADisabling connections from named pipes or socket files (depending on the operating system of the server)BEnabling and using SSL for connections to the Mysql databaseCInstalling Mysql on the application server, and running the database and application on the same serverDStarting the server with – bind- address=0.0.0.0 specifiedERunning the server with – skip-networking specifiedFLimiting logins to originate from the application server or the server's subnet'

考题 单选题You install Windows 2000 Professional on your portable computer. You create a new dial up connection to connect to your company’s remote access server. You connect to the remote access server by using the dial up connection. You can connect to the servers on the same segment as the remote access server. You cannot access the shared resources that are on the remote segments from the remote access server. What should you do? ()A Configure the company remote access server to accept multilink connections.B Configure the TCP/IP program for the dial up connection to disable IP header compression.C Configure the TCP/IP properties for the dial up connection to use the default gateway on theremote network.D Grant your user account dial in permission on the company remote access server.

考题 单选题The database instance has the following parameter setting: OS_AUTHENT_PREFIX = OPS$ OS_ROLES = FALSE REMOTE_OS_AUTHENT = FALSE REMOTE_OS_ROLES = FALSE TIMED_OS_STATISTICS = 0 You have a local operating system user SKD.You create a database user OPS$SKD, and then assign external authentication. The user OPS$SKD has theCREATE SESSION privilege.  What would you achieve by the above process()A The database user OPS$SKD will be able to administer the database.B The authentication detail for the database user OPS$SKD is recorded in the password file.C The local operating system user SKD will be able to access the database instance without specifying theusername and password.D The database user OPS$SKD has to login with the password of the local operating system user SKD toaccess the database instance.

考题 单选题Your database instance is running. You are not able to access Oracle Enterprise Manager Database Control because the listener is not started.  Which tool or utility would you use to start the listener?()A  Oracle Net ManagerB  Listener Control utilityC  Database Configuration AssistantD  Oracle Net Configuration Assistant

考题 多选题You need to design the database permissions for access from the terminals to the database server. Which action or actions should you perform?()ACreate a database role named BankTerminals.BGrant the BankTerminals role the Execute permission for the WoodgroveBanking database.CGrant database access to the Windows Bank Terminals group, and add the group to the BankTerminals role.DGrant the BankTerminals role the Execute permission for the Bank schema.EGrant the Windows Bank Terminals group the Execute permission for the Bank schema.FGrant the BankTerminals role the Execute permission for all stored procedures and user-defined functions in the Bank schema.

考题 单选题Your database instance is running.You are not able to access Oracle Enterprise Manager Database Control because the listener is not started.Which tool or utility would you use to start the listener?()A Oracle Net ManagerB Listener Control utilityC Database Configuration AssistantD Oracle Net Configuration Assistant

考题 单选题You work as a database administrator for Certkiller .com. While loading data into the Certkiller STAFF table using Oracle Enterprise Manager 10g Database Control, you find the status of the job as failed. On further investigation, you find the following error message in the output log: ORA-01653 unable to extend table HR. Certkiller STAFF by 8 intablespaceUSERS Which task would you perform to load the data successfully without affecting the users who are accessing the table?()A Restart the database instance and run the jobB Truncate the Certkiller STAFF table and run the jobC Delete all rows from the Certkiller STAFF table and run the jobD Increase the size of the USERStablespacethe and run the jobE Increase the size of the database default permanenttablespaceand run the job

考题 单选题You are configuring a failover cluster for a database server. You are assigning four nodes to the cluster. Allnodes have access to a SAN,and adequate storage is available. Which of the following options should youchoose for your quorum configuration?()A Node MajorityB Node And Disk MajorityC Node And File Share MajorityD No Majority: Disk Only

考题 单选题Which of the following is the MOST effective method to restrict staff members from accessing a service on a company server?()A  Implement ACLs.B  Disable accounts for staff members who do not require server access.C  Implement anti-spam software on the server.D  Implement anti-virus software on the server.

考题 单选题In your Certkiller .com production database, you find that the database users are able to create and read files with unstructured data, available in any location on the host machine from an application.  You want to restrict the database users to access files in a specific location on the host machine.  What could do to achieve this?()A Modify the value for the UTL_FILE_DIR parameter in the parameter fileB Grant read and write privilege on the operating system path to the database usersC Modify the value for the LDAP_DIRECTORY_ACCESS parameter in the parameter fileD Modify the value for the PLSQL_NATIVE_LIBRARY_DIR parameter in the parameter fileE Create a directory object referring to the operating system path, and grant read and write privilege on the directory object to the database users

考题 单选题You use a Windows 2000 Professional desktop computer. The corporate product information is stored on this computer. You want other users on the network to be able to read the product information on your computer. You use Windows Explorer to share the product information folder on the network. You want Sales staff to be able to keep a copy of the product information on their portable computers when they travel. Other users should not be able to synchronize the product information.  What should you do?()A Use Synchronization manager to configure synchronization to occur when users are connected to the LAN connection.B Use Windows Explorer to grant Sales Staff Special access for the reports on the network share.C Use Windows Explorer to enable automatic caching for documents on the network share.D Create a new share for the Sales users only and enable caching on that share only.

考题 单选题you configure a new file server that runs windows server 2008. Users access shared files on the file server. Users report that they are unable to access the shared files.The TCP/IP properties for the file server are configured as shown in the following exhibit.You need to ensure that users are able to access the shared files. What should you do?()A Configure a static IP address.B Configure the default gateway.C Configure the DNS server address.D Add the domain to the DNS suffix on the network interface.

考题 单选题The database instance has the following parameter setting: OS_AUTHENT_PREFIX = OPS$ OS_ROLES = FALSE  REMOTE_OS_AUTHENT = FALSE REMOTE_OS_ROLES = FALSE TIMED_OS_STATISTICS = 0  You have a local operating system user SKD. You create a database user OPS$SKD, and then  assignexternal authentication. The user OPS$SKD has the CREATE SESSION privilege.  What would youachieve by the above process()A The database user OPS$SKD will be able to administer the database.B The authentication detail for the database user OPS$SKD is recorded in the password file.C The local operating system user SKD will be able to access the database instance without specifying the username and password.D The database user OPS$SKD has to login with the password of the local operating system user SKD to access the database instance.

考题 单选题A staff member reports that they cannot access the shared folder on the network; however, other staff members are reporting that they can access the shared folder. Which of the following is the BEST way to identify the problem?()A The administrator should monitor all traffic between the staff member and the server.B The administrator should reconfigure the RAID configuration to allow more space.C The administrator should map a drive using the net use command.D The administrator should allow the staff member to use a USB drive.