网友您好, 请在下方输入框内输入要搜索的题目:

题目内容 (请给出正确答案)
多选题
Which two are the uses of the ASM metadata backup and restore (AMBR) feature?()
A

It can be used to back up all data on ASM disks.

B

It can be used to recover the damaged ASM disk group along with the data.

C

It can be used to gather information about a preexisting ASM disk group with disk paths,disk name,failure groups,attributes templates,and alias directory structure.

D

It can be used to re-create the ASM disk group with its attributes.


参考答案

参考解析
解析: 暂无解析
更多 “多选题Which two are the uses of the ASM metadata backup and restore (AMBR) feature?()AIt can be used to back up all data on ASM disks.BIt can be used to recover the damaged ASM disk group along with the data.CIt can be used to gather information about a preexisting ASM disk group with disk paths,disk name,failure groups,attributes templates,and alias directory structure.DIt can be used to re-create the ASM disk group with its attributes.” 相关考题
考题 Which two statements are true regarding an Automatic Storage Management (ASM) instance?() (Choosetwo.) A. As ASM instance mounts an ASM control fileB. An ASM instance uses the ASMB process for rebalancing of disks within a disk groupC. Automatic Memory Management is enabled in an ASM instance even when the MEMORY_TARGET parameter is not set explicitlyD. An RDBMS instance gets connected to an ASM instance using ASMB as a foreground process when the database instance is started

考题 Which two statements are true about variable extent size support for large ASM files?() A. The metadata used to track extents in SGA is reduced.B. Rebalance operations are completed faster than with a fixed extent sizeC. An ASM Instance automatically allocates an appropriate extent size.D. Resync operations are completed faster when a disk comes online after being taken offline.E. Performance improves in a stretch cluster configuration by reading from a local copy of an extent.

考题 Which two statements are correct regarding MPLS LSP establishment methods?() (Choose two.) A. LDP uses Down Stream On Demand.B. RSVP uses Down Stream On Demand.C. LDP uses Down Stream Unsolicited.D. RSVP uses Down Stream Unsolicited.

考题 Which two are the uses of the ASM metadata backup and restore (AMBR) feature?()A、 It can be used to back up all data on ASM disks.B、 It can be used to recover the damaged ASM disk group along with the data.C、 It can be used to gather information about a preexisting ASM disk group with disk paths,disk name,failure groups,attributes templates,and alias directory structure.D、 It can be used to re-create the ASM disk group with its attributes.

考题 Which two statements are true regarding an Automatic Storage Management (ASM) instance? ()A、As ASM instance mounts an ASM control fileB、An ASM instance uses the ASMB process for rebalancing of disks within a disk groupC、Automatic Memory Management is enabled in an ASM instance even when the MEMORY_TARGET parameter is not set explicitlyD、An RDBMS instance gets connected to an ASM instance using ASMB as a foreground process when the database instance is started

考题 You want to take the backup of the USERS tablespace. It has a single data file of 900 MB. You have tape drives of 300 MB each. The SBT channel is configured for Recovery Manager (RMAN). To accomplish the backup, you issued the following RMAN command: RMAN BACKUP SECTION SIZE 300M TABLESPACE users; Which two statements are true about the execution of the above command? ()(Choose two.)A、The backup piece size will be limited to 300 MBB、The RMAN uses multiplexing to perform backupC、The operation is accomplished using the default channel availableD、The RMAN parallelizes the backup although the parallelism is not set for a channel

考题 The ORACLE_SID environment variable is set to +ASM. ASMLIB is not used in the configuration. You executed the following command to startup the Automatic Storage Management (ASM) instance. SQL STARTUP; Which two activities are performed during a successful start up operation? ()(Choose two.)A、The databases configured to use the ASM instance are mountedB、The disk groups are mounted as per the ASM_DISKGROUPS initialization parameterC、ASM starts the Oracle Cluster Synchronization Services (CSS) daemon if it is not startedD、ASM discovers and examines the contents of all files that are in the paths specified in the ASM_DISKGROUPS initialization parameters

考题 Which two statements are true about encrypting RMAN backup?()A、 The transparent encryption of backups uses the encryption walletB、 The database uses the same encryption key for every encrypted backupC、 The password encryption of backups only uses the password while creating and restoring backupD、 If transparent encryption is configured, you cannot use the SET ENCRYPTION BY PASSWORD command to make password-protected backups

考题 You want to perform an RMAN backup of database as a copy. Which two factors will you consider whileperforming the backup operation?() (Choose two).A、The backup as copy can only be taken to diskB、The backup as copy can only be taken to tapeC、Backup can be performed only when the instance is shutdownD、Backup will constitute all used and unused blocks in the database

考题 You want to perform the following operations for the DATA ASM disk group: -Verify the consistency of the disk.  -Cross-check all the file extent maps and allocation tables for consistency. check whether the alias metadata directory and file directory are linked correctly.  -Check that ASM metadata directories do not have unreachable allocated blocks.   Which command accomplishes these tasks()?A、 ALTER DISKGROUP data CHECKB、 ALTER DISKGROUP data CHECK DISKC、 ALTER DISKGROUP data CHECK FILED、 ALTER DISKGROUP data CHECK DISK IN FAILURE GROUP 1

考题 You want to migrate your existing non-ASM files to ASM files for the database PROD. Which method  or command would you use to accomplish this task?()A、the CONVERT command of RMANB、Data Pump Export and Import into the same databaseC、conventional export and import into the same databaseD、the BACKUP DATABASE and RESTORE DATABASE commands of RMANE、the BACKUP AS COPY DATABASE and SWITCH DATABASE TO COPY command of RMAN

考题 You are migrating your production database from non-ASM to ASM storage. You used the RMAN utility to migrate the database from non-ASM to ASM storage. Which type of backup command script will you use for migrating the database from non-ASM to ASM storage?()A、 BACKUP AS BACKUPSETB、 BACKUP AS COPYC、 BACKUP AS COMPRESSED BACKUPSETD、 BACKUP INCREMENTAL LEVEL n CUMULATIVE

考题 Which two statements are true about encrypting RMAN backup?() (Choose two.)A、The transparent encryption of backups uses the encryption walletB、The database uses the same encryption key for every encrypted backupC、The password encryption of backups only uses the password while creating and restoring backupD、If transparent encryption is configured, you cannot use the SET ENCRYPTION BY PASSWORD command to make password-protected backups.

考题 单选题You observe that the senior database administrator always uses the following command when connecting to Recovery Manager (RMAN), and then starts executing commands to backup the database files:  $ rman target /  What would be the effect of this command?()A RMAN would use the current operating system location to place the backup.B RMAN would use the control file of the target database to maintain the backup.C RMAN would use the recovery catalog of the target database to maintain the backup.D RMAN would use the control file of the target database to maintain the backup metadata. E RMAN would use the recovery catalog of the target database to maintain the backup metadata.

考题 单选题You are migrating your production database from non-ASM to ASM storage. You used the RMAN utility to migrate the database from non-ASM to ASM storage. Which type of backup command script will you use for migrating the database from non-ASM to ASM storage?()A  BACKUP AS BACKUPSETB  BACKUP AS COPYC  BACKUP AS COMPRESSED BACKUPSETD  BACKUP INCREMENTAL LEVEL n CUMULATIVE

考题 多选题Which two statements are true about encrypting RMAN backup?()AThe transparent encryption of backups uses the encryption walletBThe database uses the same encryption key for every encrypted backupCThe password encryption of backups only uses the password while creating and restoring backupDIf transparent encryption is configured, you cannot use the SET ENCRYPTION BY PASSWORD command to make password-protected backups.

考题 多选题You want to take the backup of the USERS tablespace. It has a single data file of 900 MB. You have tape drives of 300 MB each. The SBT channel is configured for Recovery Manager (RMAN). To accomplish the backup, you issued the following RMAN command: RMAN BACKUP SECTION SIZE 300M TABLESPACE users; Which two statements are true about the execution of the above command? ()(Choose two.)AThe backup piece size will be limited to 300 MBBThe RMAN uses multiplexing to perform backupCThe operation is accomplished using the default channel availableDThe RMAN parallelizes the backup although the parallelism is not set for a channel

考题 多选题Which two statements are true about encrypting RMAN backup?()AThe transparent encryption of backups uses the encryption walletBThe database uses the same encryption key for every encrypted backupCThe password encryption of backups only uses the password while creating and restoring backupDIf transparent encryption is configured, you cannot use the SET ENCRYPTION BY PASSWORD command to make password-protected backups

考题 多选题Which two statements are correct regarding MPLS LSP establishment methods?() (Choose two.)ALDP uses Down Stream On Demand.BRSVP uses Down Stream On Demand.CLDP uses Down Stream Unsolicited.DRSVP uses Down Stream Unsolicited.

考题 多选题ASM supports all but which of the following file types?()ADatabase filesBSpfilesCRedo-log filesDArchived log filesERMAN backup setsFPassword filesGinit.ora files

考题 单选题You observe that the senior database administrator always uses the following command when connecting to Recovery Manager (RMAN), and then starts executing commands to backup the database files: % rman target / What would be the effect of this command?()A  RMAN would use the current operating system location to place the backup.B  RMAN would use the control file of the target database to maintain the backup.C  RMAN would use the recovery catalog of the target database to maintain the backup.D  RMAN would use the control file of the target database to maintain the backup metadata.E  RMAN would use the recovery catalog of the target database to maintain the backup metadata.

考题 多选题In which situations will the ASM metadata backup help you recover the ASM disk in a disk group?()Awhen one or more file directory paths are accidentally deleted from an ASM disk groupBwhen one of the disks in a disk group is accidentaly unpluggedCwhen the data file on an ASM disk group gets corruptedDwhen one or more disks in an ASM disk group are lost

考题 多选题Which two statements are true regarding an Automatic Storage Management (ASM) instance?()AAs ASM instance mounts an ASM control fileBAn ASM instance uses the ASMB process for rebalancing of disks within a disk groupCAutomatic Memory Management is enabled in an ASM instance even when the MEMORY_TARGET parameter is not set explicitlyDAn RDBMS instance gets connected to an ASM instance using ASMB as a foreground process when the database instance is started

考题 多选题Which two statements are true about variable extent size support for large ASM files?()AThe metadata used to track extents in SGA is reduced.BRebalance operations are completed faster than with a fixed extent sizeCAn ASM Instance automatically allocates an appropriate extent size.DResync operations are completed faster when a disk comes online after being taken offline.EPerformance improves in a stretch cluster configuration by reading from a local copy of an extent.

考题 多选题Which two statements are true about encrypting RMAN backup?() (Choose two.)AThe transparent encryption of backups uses the encryption walletBThe database uses the same encryption key for every encrypted backupCThe password encryption of backups only uses the password while creating and restoring backupDIf transparent encryption is configured, you cannot use the SET ENCRYPTION BY PASSWORD command to make password-protected backups.

考题 单选题You have issued the following command:    RMANCONFIGURE RETENTION POLICY TO RECOVERY WINDOW OF 100 DAYS;   What will be the result of using the above command?()A  The backup metadata will be maintained in the control file for 100 days.B  The backup metadata will be maintained in the recovery catalog for 100 days.C  The backup metadata will be maintained in the flash recovery area for 100 days.D  After 100 days, the backup sets and image copies will be deleted from the media.

考题 多选题You are managing an Oracle Database 11g instance and an Oracle Database 10g instance on the same machine. Both instances use the ASM instance as storage. Which statement regarding the ASM disk group compatibility attributes are true in this scenario?()AThe database-compatibility version settings for each instance must be greater than or equal to the RDBMS compatibility of all ASM disk groups used by that database instances.BRDBMS compatibility and the database version determines whether a database instance can mount the ASM disk group.CThe RDBMS compatibility settings for a disk group control the format of data structures for ASM metadata on the disk.DASM compatibility controls which features for the ASM will be enabled.