网友您好, 请在下方输入框内输入要搜索的题目:

题目内容 (请给出正确答案)
单选题
In your database, you want to ensure that idle sessions that are blocking active are automatically terminated after a specified period of time. How would you accomplish this?()
A

Setting a metric threshold

B

Implementing Database Resource Manager

C

Enabling resumable timeout for user sessions

D

Decreasing the value of the IDLE_TIME resource limit in the default profile


参考答案

参考解析
解析: 暂无解析
更多 “单选题In your database, you want to ensure that idle sessions that are blocking active are automatically terminated after a specified period of time. How would you accomplish this?()A Setting a metric thresholdB Implementing Database Resource ManagerC Enabling resumable timeout for user sessionsD Decreasing the value of the IDLE_TIME resource limit in the default profile” 相关考题
考题 You plan to control idle sessions that are blocking other sessions from performing transactions. Your requirement is to automatically terminate these blocking sessions when they remain idle for a specified amount of time.How would you accomplish this task?()A. Set metric thresholdB. Implement Database Resource ManagerC. Enable resumable timeout for user sessionsD. Add directives to Automatic Database Diagnostic Monitor (ADDM)

考题 In your database, you want to ensure that idle sessions that are blocking active are automatically terminated after a specified period of time.How would you accomplish this?() A. Setting a metric thresholdB. Implementing Database Resource ManagerC. Enabling resumable timeout for user sessionsD. Decreasing the value of the IDLE_TIME resource limit in the default profile

考题 You are administering a database and you receive a requirement to apply the following restrictions:1. A connection must be terminated after four unsuccessful login attempts by user.2. A user should not be able to create more than four simultaneous sessions.3. User session must be terminated after 15 minutes of inactivity.4. Users must be prompted to change their passwords every 15 days.How would you accomplish these requirements?()A. by granting a secure application role to the usersB. by creating and assigning a profile to the users and setting the REMOTE_OS_AUTHENT parameter to falseC. By creating and assigning a profile to the users and setting the SEC_MAX_FAILED_LOGIN_ATTEMPTS parameter to 4D. By Implementing Fine-Grained Auditing (FGA) and setting the REMOTE_LOGIN_PASSWORD_FILE parameter to none.E. By implementing the database resource Manager plan and setting the SEC_MAX_FAILED_LOGIN_ATTEMPTS parameters to 4.

考题 In your database instance, the user sessions are connected to the database server from the remote machines.You want to achieve the following for these users: 1. The user account must be locked after four unsuccessful login attempts. 2. The user must be prompted to change the password at regular intervals. 3. The user may not have more than three simultaneous sessions. 4. The user session must automatically be logged off if more than 10 minutes elapsed time used. How would you accomplish the above()A、By assigning profiles for the usersB、By implementing Fine-Grained Auditing (FGA)C、By granting a secure application role to the usersD、By implementing the Database Resource Manager plan

考题 You plan to control idle sessions that are blocking other sessions from performing transactions. Your requirement is to automatically terminate these blocking sessions when they remain idle for a specified amount of time. How would you accomplish this task?()A、Set metric thresholdB、Implement Database Resource ManagerC、Enable resumable timeout for user sessionsD、Add directives to Automatic Database Diagnostic Monitor (ADDM)

考题 You plan to control idle sessions that are blocking other sessions from performing transactions. Your requirement is to automatically terminate these blocking sessions when they remain idle for a specified amount of time.  How would you accomplish this task?()  A、 Set metric thresholdB、 Implement Database Resource ManagerC、 Enable resumable timeout for user sessionsD、 Add directives to Automatic Database Diagnostic Monitor (ADDM)

考题 Your database instance is currently configured to support 1,500 connections. The Web applicationthat uses the database allows a large number of users to work with the database simultaneously. Someusers of the Web application do not interact with the server all the time.  You want to increase the scalability by configuring the database instance to handle more connections. Asa DBA,  which configuration would you set to support more than 1,500 connections at a time()A、You would configure more listeners for the database.B、You would configure the database in shared server mode to use the connection pooling feature.C、You would increase the value of the PGA_AGGREGATE_TARGET initialization parameter that assigns more session memory to users.D、You would decrease the value of the PRIVATE_SGA resource limit in the profiles used by the users to accommodate more session information.

考题 You work as a database administrator for Certkiller .com. In the Certkiller PRODUCTION database you have granted RESUMABLE system privilege to the CONNECT role.Resumablespace operation has been enabled for all user session. You want users NOT to be aware of any kind of space-related problems while performing transactions. Instead, you want the problem to be resolved by a database trigger automatically. Which combination of triggering time and event would you use to achieve this objective?()A、AFTER CREATEB、AFTER SUSPENDC、BEFORE CREATED、AFTER TRUNCATEE、BEFORE SUSPENDF、AFTER INSERT OR DELETE OR DELETEG、BEFORE INSERT OR DELETE OR DELETE

考题 While setting up an Oracle database for one of your critical applications, you want to ensure that the database is backed up at regular intervals without your intervention.What should you do to achieve the objective?()A、configure the database to run in ARCHIVELOG modeB、configure the Flash Recovery Area to enable automatic database backupC、schedule the database backup using DBMS_JOB package after creating the databaseD、schedule the database backup using Recovery Manager (RMAN)commands after creating the databaseE、schedule the database backup using Database Configuration Assistant (DBCA)while creating the database

考题 You receive complaints from users regarding the high waiting time for their transactions. Oninvestigation, you find that some users are not committing their transactions though they are  notperforming any activity for a long time. As a result, SQL statements need to wait for row-level locks.  Which two actions could you take to prevent this locking problem in the future()A、Decrease the IDLE_TIME resource limit in the profile assigned to the blocking users.B、Use Database Resource Manager to automatically log out sessions that block others and are idle.C、Set the limit in the profile of blocking users to control the number of blocks to be accessed in a session.D、Decrease the maximum number of interested transaction list (ITL) slots for the segments on which the blocking user performs the transaction

考题 You are administering a database and you receive a requirement to apply the following restrictions: 1. A connection must be terminated after four unsuccessful login attempts by user. 2. A user should not be able to create more than four simultaneous sessions. 3. User session must be terminated after 15 minutes of inactivity. 4. Users must be prompted to change their passwords every 15 days. How would you accomplish these requirements?()A、by granting a secure application role to the usersB、by creating and assigning a profile to the users and setting the REMOTE_OS_AUTHENT parameter to falseC、By creating and assigning a profile to the users and setting the SEC_MAX_FAILED_LOGIN_ATTEMPTS parameter to 4D、By Implementing Fine-Grained Auditing (FGA) and setting the REMOTE_LOGIN_PASSWORD_FILE parameter to none.E、By implementing the database resource Manager plan and setting the SEC_MAX_FAILED_LOGIN_ATTEMPTS parameters to 4.

考题 You work as a database administrator at Certkiller .com. In your production database, you observe that users’ transactions are consuming a lot of resource and you plan to impose resource restrictions by using Resource Manager. For which three resources can you enable usage restrictions by using Resource Manager? ()A、 CPU usageB、 degree of parallelismC、 number of open cursorsD、 number of sorts performedE、 idle time for blocking sessionsF、 number of disk I/O operations performedG、 number of memory I/O operations performed

考题 In your database instance, the user sessions are connected to the database server from the remotemachines. You want to achieve the following for these users:  1:The user account must be locked after four unsuccessful login attempts.PASSWORD_LOCK_TIME  2:The user must be prompted to change the password at regular intervals.PASSWORD_LIFE_TIME  3:The user may not have more than three simultaneous sessions.SESSIONS_PER_USER  4:The user session must automatically be logged off if more than 10 minutes elapsed time used.CONNECT_TIME  How would you accomplish the above()A、by assigning profiles for the usersB、by implementing Fine-Grained Auditing (FGA)C、by granting a secure application role to the usersD、by implementing the Database Resource Manager plan

考题 You want to migrate your existing non-ASM files to ASM files for the database PROD. Which method  or command would you use to accomplish this task?()A、the CONVERT command of RMANB、Data Pump Export and Import into the same databaseC、conventional export and import into the same databaseD、the BACKUP DATABASE and RESTORE DATABASE commands of RMANE、the BACKUP AS COPY DATABASE and SWITCH DATABASE TO COPY command of RMAN

考题 You observe that in your PROD database, customer information is being modified by some unauthorized users. You want to keep track of all of the transactions happening on the table using PL/SQL. Which type of PL/SQL subprogram or construct would you use to accomplish this task?()A、functionsB、packagesC、proceduresD、database triggersE、anonymous PL/SQL block

考题 You want to migrate your existing non/x7fASM files to ASM files for the database PROD. Which method or command would you use to accomplish this task?()A、the CONVERT command of RMANB、Data Pump Export and Import into the same databaseC、conventional export and import into the same databaseD、the BACKUP DATABASE and RESTORE DATABASE commands of RMANE、the BACKUP AS COPY DATABASE and SWITCH DATABASE TO COPY command of RMAN

考题 You want to monitor and control the resource usage by sessions. You want to be warned automatically when more than 100 sessions are opened with your database. What action would you take to achieve this?()A、Use the Database Resource Manager.B、Set the limits in the profiles used by users.C、Modify the SESSIONS initialization parameter.D、Set the warning threshold for the Current Logons Count metric.

考题 单选题In your database instance, the user sessions are connected to the database server from the remote machines.You want to achieve the following for these users: 1. The user account must be locked after four unsuccessful login attempts. 2. The user must be prompted to change the password at regular intervals. 3. The user may not have more than three simultaneous sessions. 4. The user session must automatically be logged off if more than 10 minutes elapsed time used. How would you accomplish the above()A By assigning profiles for the usersB By implementing Fine-Grained Auditing (FGA)C By granting a secure application role to the usersD By implementing the Database Resource Manager plan

考题 单选题In your database instance, the user sessions are connected to the database server from the remotemachines. You want to achieve the following for these users:  1:The user account must be locked after four unsuccessful login attempts.PASSWORD_LOCK_TIME  2:The user must be prompted to change the password at regular intervals.PASSWORD_LIFE_TIME  3:The user may not have more than three simultaneous sessions.SESSIONS_PER_USER  4:The user session must automatically be logged off if more than 10 minutes elapsed time used.CONNECT_TIME  How would you accomplish the above()A by assigning profiles for the usersB by implementing Fine-Grained Auditing (FGA)C by granting a secure application role to the usersD by implementing the Database Resource Manager plan

考题 单选题You create two resource plans, one for data warehouse loading jobs at night and the other for application jobs at day time. You want the resource plans to activate automatically so that the resource allocation is optimum as desired by the activity.How would you achieve this?()A Implement job classesB Implement Scheduler windowsC Implement the mapping rule for the consumer groupsD Set the SWITCH_TIME resource plan directive for both the resource plans

考题 单选题In your database, you want to ensure that idle sessions that are blocking active are automatically terminated after a specified period of time. How would you accomplish this?()A Setting a metric thresholdB Implementing Database Resource ManagerC Enabling resumable timeout for user sessionsD Decreasing the value of the IDLE_TIME resource limit in the default profile

考题 单选题In your database, you want to ensure that idle sessions that are blocking active are automatically terminated after a specified period of time. How would you accomplish this?()A Setting a metric thresholdB Implementing Database Resource ManagerC Enabling resumable timeout for user sessionsD Decreasing the value of the IDLE_TIME resource limit in the default profile

考题 单选题You plan to control idle sessions that are blocking other sessions from performing transactions. Your requirement is to automatically terminate these blocking sessions when they remain idle for a specified amount of time.  How would you accomplish this task?()A  Set metric thresholdB  Implement Database Resource ManagerC  Enable resumable timeout for user sessionsD  Add directives to Automatic Database Diagnostic Monitor (ADDM)

考题 单选题You plan to control idle sessions that are blocking other sessions from performing transactions. Your requirement is to automatically terminate these blocking sessions when they remain idle for a specified amount of time. How would you accomplish this task?()A Set metric thresholdB Implement Database Resource ManagerC Enable resumable timeout for user sessionsD Add directives to Automatic Database Diagnostic Monitor (ADDM)

考题 单选题You want to monitor and control the resource usage by sessions. You want to be warned automatically when more than 100 sessions are opened with your database.  What action would you take to achieve this?()A Use the Database Resource Manager.B Set the limits in the profiles used by users.C Modify the SESSIONS initialization parameter.D Set the warning threshold for the Current Logons Count metric.

考题 单选题You have to shut down the database instance with the ABORT option because of a hardware failure. Which statement is true about the subsequent opening of the database?()A The database would open normally.B The database would not open, and it would stop at mount stage.C The database would open after automatically performing instance recovery.D The database would not open, and you have to perform database recovery to open it.

考题 单选题While setting up an Oracle database for one of your critical applications, you want to ensure that the database is backed up at regular intervals without your intervention.What should you do to achieve the objective?()A configure the database to run in ARCHIVELOG modeB configure the Flash Recovery Area to enable automatic database backupC schedule the database backup using DBMS_JOB package after creating the databaseD schedule the database backup using Recovery Manager (RMAN)commands after creating the databaseE schedule the database backup using Database Configuration Assistant (DBCA)while creating the database

考题 单选题You are administering a database and you receive a requirement to apply the following restrictions: 1. A connection must be terminated after four unsuccessful login attempts by user. 2. A user should not be able to create more than four simultaneous sessions. 3. User session must be terminated after 15 minutes of inactivity. 4. Users must be prompted to change their passwords every 15 days. How would you accomplish these requirements?()A by granting a secure application role to the usersB by creating and assigning a profile to the users and setting the REMOTE_OS_AUTHENT parameter to falseC By creating and assigning a profile to the users and setting the SEC_MAX_FAILED_LOGIN_ATTEMPTS parameter to 4D By Implementing Fine-Grained Auditing (FGA) and setting the REMOTE_LOGIN_PASSWORD_FILE parameter to none.E By implementing the database resource Manager plan and setting the SEC_MAX_FAILED_LOGIN_ATTEMPTS parameters to 4.