网友您好, 请在下方输入框内输入要搜索的题目:

题目内容 (请给出正确答案)
单选题
In your Certkiller .com production database, you find that the database users are able to create and read files with unstructured data, available in any location on the host machine from an application.  You want to restrict the database users to access files in a specific location on the host machine.  What could do to achieve this?()
A

Modify the value for the UTL_FILE_DIR parameter in the parameter file

B

Grant read and write privilege on the operating system path to the database users

C

Modify the value for the LDAP_DIRECTORY_ACCESS parameter in the parameter file

D

Modify the value for the PLSQL_NATIVE_LIBRARY_DIR parameter in the parameter file

E

Create a directory object referring to the operating system path, and grant read and write privilege on the directory object to the database users


参考答案

参考解析
解析: 暂无解析
更多 “单选题In your Certkiller .com production database, you find that the database users are able to create and read files with unstructured data, available in any location on the host machine from an application.  You want to restrict the database users to access files in a specific location on the host machine.  What could do to achieve this?()A Modify the value for the UTL_FILE_DIR parameter in the parameter fileB Grant read and write privilege on the operating system path to the database usersC Modify the value for the LDAP_DIRECTORY_ACCESS parameter in the parameter fileD Modify the value for the PLSQL_NATIVE_LIBRARY_DIR parameter in the parameter fileE Create a directory object referring to the operating system path, and grant read and write privilege on the directory object to the database users” 相关考题
考题 You are the administrator of a database that contains 64 lookup tables. These tables store static data that should not change. However, users report that some of this data is being changed. You need to prevent users from modifying the data.You want to minimize changes to your security model and to your database applications. How should you modify the database?A.Create a filegroup named LOOKUP. Move the lookup tables to this filegroup. Select the read only check box for the filegroup.B.Create a database role named datamodifier. Grant SELECT permissions to the datamodifier role. Add all users to the role.C.Deny INSERT, UPDATE, and DELETE permissions for all users. Create stored procedures that modify data in all tables except lookup tables. Require users to modify data through these stored procedures.D.Create a view of the lookup tables. Use the view to allow users access to the lookup tables.

考题 You work as a database administrator at Certkiller .com. Your production database uses an Automatic Storage Management (ASM) instance to manage its files. You want to add a new disk group to the ASM instance to manage the increased data load. What action would you perform to include the new disk group in the ASM instance without causing any impact on the currently connected users?()A、 mount the new disk group in the ASM instanceB、 restart the ASM instance and the production database instanceC、 register the new disk groups in the production database instanceD、 restart the ASM instance without restarting the production database instanceE、 include the new disk group in the ASM_DISKSTRING parameter in the parameter file and restart the ASM instance

考题 You work as a database administrator for Certkiller .com. You want to administer your database servers,which are running on different host machines,using the Web-enabled grid control interface. You have configured the agent on the host machines. You have started the Oracle Database 10g Grid Control utility on your machine. Which two additional components would you configure to achieve this objective?()A、Application Server ControlB、Oracle Management ServiceC、Oracle Enterprise Manager RepositoryD、Oracle Enterprise Manager Database Control

考题 You work as a database administrator for Certkiller .com. You are using Recovery Manager (RMAN) to perform backups in your databases.  Which four backup operations can be performed using RMAN?()A、A backup of the target database when it is mountedB、A backup of online redo log files when the database is openC、A backup of only used data blocks in the file beingbeingbackup upD、A backup of online, read/write data files when the database is openE、A backup of only those data blocks that have changed since a previous backupF、A backup of online, read/write data files when the database is in the NOMOUNT state.

考题 In Recovery Manager (RMAN), you are taking image copies of the data files of your production database and rolling them forward at regular intervals. You attempt to restart your database. After a regular maintenance task, you realize that one of the data files that belongs to the USERS tablespace is damaged and you need to recover the data file by using the image copy. Because a media failure caused the data file to be damaged, you want to place the d ata file in a different location while restoring the file. Which option must you consider for this task?()A、using only the RMAN SWITCH command to set the new location for the data fileB、placing the database in the MOUNT state for the restore and recovery operations.C、using an RMAN RUN block with the SET NEWNAME and then the SWITCH command.D、configuring two channels: one for the restore operation and the other for the recovery operation

考题 In your Certkiller .com production database, you find that the database users are able to create and read files with unstructured data, available in any location on the host machine from an application.  You want to restrict the database users to access files in a specific location on the host machine.  What could do to achieve this?()A、Modify the value for the UTL_FILE_DIR parameter in the parameter fileB、Grant read and write privilege on the operating system path to the database usersC、Modify the value for the LDAP_DIRECTORY_ACCESS parameter in the parameter fileD、Modify the value for the PLSQL_NATIVE_LIBRARY_DIR parameter in the parameter fileE、Create a directory object referring to the operating system path, and grant read and write privilege on the directory object to the database users

考题 You want to create a new optimized database for your transactional production environment to be used by a financial application. While creating the database, you want the Oracle software to take care of all basic settings to optimize the database performance. Which method would you use to achieve this objective?()A、Use the CREATE DATABASE .. command to create the database with Oracle-managed files. B、Use the Database Configuration Assistant (DBCA) to create the database with Oracle-managed files. C、Use Enterprise Manager to create a new database with the Online Transaction Processing (OLTP) option. D、Use Database Configuration Assistant (DBCA) to create the database with Transaction Processing template. E、Use the CREATE DATABASE .. command to create the database with Automatic Storage Management (ASM) file system.

考题 You work as a database administrator for Certkiller .com. In the Certkiller PRODUCTION database you have granted RESUMABLE system privilege to the CONNECT role.Resumablespace operation has been enabled for all user session. You want users NOT to be aware of any kind of space-related problems while performing transactions. Instead, you want the problem to be resolved by a database trigger automatically. Which combination of triggering time and event would you use to achieve this objective?()A、AFTER CREATEB、AFTER SUSPENDC、BEFORE CREATED、AFTER TRUNCATEE、BEFORE SUSPENDF、AFTER INSERT OR DELETE OR DELETEG、BEFORE INSERT OR DELETE OR DELETE

考题 Due to media failure you lost one of the data files belonging to the USERS tablespace, and the tablespace is not available to use. Which statement regarding the status of the database is true?()A、The database remains open.B、The database gets dismounted.C、The database becomes read only.D、The database instance gets aborted.E、The database gets shut down automatically.F、The status of the database depends on the status of the USERS tablespace.

考题 You work as a database administrator for Certkiller .com. Your database is in NOARCHIVELOG mode. The database has been configured with three redo logs groups, and there have been five log switches. You lost one non-system-critical data file from your database.  Which method would you use to recover the data file?()A、Restore all the data files and open the databaseB、Create the data file and performtablespacerecoveryC、No need to restore any file, just recover the databaseD、Restore only the system data file and recover the databaseE、Restore only lost date file and performtablespacerecovery

考题 You work as a database administrator for Certkiller .com. While loading data into the Certkiller STAFF table using Oracle Enterprise Manager 10g Database Control, you find the status of the job as failed. On further investigation, you find the following error message in the output log: ORA-01653 unable to extend table HR. Certkiller STAFF by 8 intablespaceUSERS Which task would you perform to load the data successfully without affecting the users who are accessing the table?()A、Restart the database instance and run the jobB、Truncate the Certkiller STAFF table and run the jobC、Delete all rows from the Certkiller STAFF table and run the jobD、Increase the size of the USERStablespacethe and run the jobE、Increase the size of the database default permanenttablespaceand run the job

考题 You work as a database administrator for Certkiller .com. Users in the Certkiller .com PROD database complain about the slow response of transactions. While investigating the reason you find that the transactions are waiting for the undo segments to be available, and undo retention has been set to zero. What would you do to overcome this problem?()A、Increase the undo returnB、Create more undo segmentsC、Create another undotablespaceD、Increase the size of the undotablespace

考题 In your Supportcenter.cn production database,you find that the database users are able to create and read files with unstructured data,available in any location on the host machine from an application. You want to restrict the database users to access files in a specific location on the host machine. What could do to achieve this?()A、Modify the value for the UTL_FILE_DIR parameter in the parameter fileB、Grant read and write privilege on the operating system path to the database usersC、Modify the value for the LDAP_DIRECTORY_ACCESS parameter in the parameter fileD、Modify the value for the PLSQL_NATIVE_LIBRARY_DIR parameter in the parameter fileE、Create a directory object referring to the operating system path, and grant read and write privilege on the directory object to the database users

考题 In Recovery Manager (RMAN), you are taking image copies of the data files of your production database and rolling them forward at regular intervals. You attempt to restart your database. After a regular maintenance task, you realize that one of the data files that belongs to the USERS tablespace is damaged and you need to recover the data file by using the image copy. Because a media failure caused the data file to be damaged, you want to place the data file in a different location while restoring the file. Which option must you consider for this task?()A、using only the RMAN SWITCH command to set the new location for the data fileB、placing the database in the MOUNT state for the restore and recovery operations.C、using an RMAN RUN block with the SET NEWNAME and then the SWITCH command.D、configuring two channels: one for the restore operation and the other for the recovery operation

考题 You are the administrator of a Windows 2000 network.  You upgrade five computers in the sales department to Windows 2000 Professional. You then apply the Basicwk.inf security template to the upgraded computers. The remaining computers in the sales department are using Windows NT Workstation 4.0. When users log on to the Windows 2000 Professional computers they report that they are unable to run the company’s database application.  When the users log on to Windows NT Workstation 4.0 computers they are able to run the database application.  You want the users of Windows 2000 Professional computers to be able to run the database application.  What should you do? ()A、Apply the Securews.inf security template to the computers.B、Apply the Compatsws.inf security template to the computers.C、Delete the Basicwk.inf security template file from the computers.D、For each user account, grant Read permission to the database application and its associated files.E、Use the System Policy Editor to configure a new security policy for the database application.

考题 单选题You are the administrator of a Windows 2000 network.  You upgrade five computers in the sales department to Windows 2000 Professional. You then apply the Basicwk.inf security template to the upgraded computers. The remaining computers in the sales department are using Windows NT Workstation 4.0. When users log on to the Windows 2000 Professional computers they report that they are unable to run the company’s database application.  When the users log on to Windows NT Workstation 4.0 computers they are able to run the database application.  You want the users of Windows 2000 Professional computers to be able to run the database application.  What should you do? ()A Apply the Securews.inf security template to the computers.B Apply the Compatsws.inf security template to the computers.C Delete the Basicwk.inf security template file from the computers.D For each user account, grant Read permission to the database application and its associated files.E Use the System Policy Editor to configure a new security policy for the database application.

考题 单选题You work as a database administrator at Certkiller .com. Your production database uses an Automatic Storage Management (ASM) instance to manage its files. You want to add a new disk group to the ASM instance to manage the increased data load. What action would you perform to include the new disk group in the ASM instance without causing any impact on the currently connected users?()A  mount the new disk group in the ASM instanceB  restart the ASM instance and the production database instanceC  register the new disk groups in the production database instanceD  restart the ASM instance without restarting the production database instanceE  include the new disk group in the ASM_DISKSTRING parameter in the parameter file and restart the ASM instance

考题 单选题In Recovery Manager (RMAN), you are taking image copies of the data files of your production database and rolling them forward at regular intervals. You attempt to restart your database. After a regular maintenance task, you realize that one of the data files that belongs to the USERS tablespace is damaged and you need to recover the data file by using the image copy. Because a media failure caused the data file to be damaged, you want to place the d ata file in a different location while restoring the file. Which option must you consider for this task?()A using only the RMAN SWITCH command to set the new location for the data fileB placing the database in the MOUNT state for the restore and recovery operations.C using an RMAN RUN block with the SET NEWNAME and then the SWITCH command.D configuring two channels: one for the restore operation and the other for the recovery operation

考题 单选题You want to create a new optimized database for your transactional production environment to be used by a financial application. While creating the database, you want the Oracle software to take care of all basic settings to optimize the database performance. Which method would you use to achieve this objective?()A Use the CREATE DATABASE .. command to create the database with Oracle-managed files. B Use the Database Configuration Assistant (DBCA) to create the database with Oracle-managed files. C Use Enterprise Manager to create a new database with the Online Transaction Processing (OLTP) option. D Use Database Configuration Assistant (DBCA) to create the database with Transaction Processing template. E Use the CREATE DATABASE .. command to create the database with Automatic Storage Management (ASM) file system.

考题 单选题You need to configure fine-grained access control to external network resources from within your database. You create an access control list (ACL) using the DBMS_NETWORK_ACL_ADMIN package. Which statement is true regarding the ACL created?()A It is a list of remote database links stored in the XML file that are available to the users of the database.B It is a list of users and network privileges stored in the XML file according to which a group of users can connect to one or more hosts.C It is a list of users and network privileges stored in the data dictionary according to which a group of users can connect to one or more hosts.D It is the list of the host names or the IP addresses stored in the data dictionary that can connect to your database through PL/SQL network utility packages such as UTL_TCP.

考题 单选题You work as a database administrator for Certkiller .com. Your database is in NOARCHIVELOG mode. The database has been configured with three redo logs groups, and there have been five log switches. You lost one non-system-critical data file from your database.  Which method would you use to recover the data file?()A Restore all the data files and open the databaseB Create the data file and performtablespacerecoveryC No need to restore any file, just recover the databaseD Restore only the system data file and recover the databaseE Restore only lost date file and performtablespacerecovery

考题 单选题You work as a database administrator for Certkiller .com. While loading data into the Certkiller STAFF table using Oracle Enterprise Manager 10g Database Control, you find the status of the job as failed. On further investigation, you find the following error message in the output log: ORA-01653 unable to extend table HR. Certkiller STAFF by 8 intablespaceUSERS Which task would you perform to load the data successfully without affecting the users who are accessing the table?()A Restart the database instance and run the jobB Truncate the Certkiller STAFF table and run the jobC Delete all rows from the Certkiller STAFF table and run the jobD Increase the size of the USERStablespacethe and run the jobE Increase the size of the database default permanenttablespaceand run the job

考题 单选题Your production database uses an Automatic Storage Management (ASM) instance to manage its files. You want to add a new disk group to the ASM instance to manage the increased data load. What action would you perform to include the new disk group in the ASM instance without causing any impact on the currently connected users?()A mount the new disk group in the ASM instanceB restart the ASM instance and the production database instanceC register the new disk groups in the production database instanceD restart the ASM instance without restarting the production database instanceE include the new disk group in the ASM_DISKSTRING parameter in the parameter file and restart the ASM instance

考题 单选题In Recovery Manager (RMAN), you are taking image copies of the data files of your production database and rolling them forward at regular intervals. You attempt to restart your database. After a regular maintenance task, you realize that one of the data files that belongs to the USERS tablespace is damaged and you need to recover the data file by using the image copy. Because a media failure caused the data file to be damaged, you want to place the data file in a different location while restoring the file. Which option must you consider for this task?()A using only the RMAN SWITCH command to set the new location for the data fileB placing the database in the MOUNT state for the restore and recovery operations.C using an RMAN RUN block with the SET NEWNAME and then the SWITCH command.D configuring two channels: one for the restore operation and the other for the recovery operation

考题 单选题You work as a database administrator for Certkiller .com. In the Certkiller PRODUCTION database you have granted RESUMABLE system privilege to the CONNECT role.Resumablespace operation has been enabled for all user session. You want users NOT to be aware of any kind of space-related problems while performing transactions. Instead, you want the problem to be resolved by a database trigger automatically. Which combination of triggering time and event would you use to achieve this objective?()A AFTER CREATEB AFTER SUSPENDC BEFORE CREATED AFTER TRUNCATEE BEFORE SUSPENDF AFTER INSERT OR DELETE OR DELETEG BEFORE INSERT OR DELETE OR DELETE

考题 单选题There is a problem with one of the disks used for your database and your system administrator informs you that the disk needs to be replaced. The replacement disk will not be available until tomorrow.  There was only one data file on this disk; it belongs to the USERS tablespace in your PROD database. Your PROD database runs in ARCHIVELOG mode and nightly online backups are taken. The users need to be able to access the data in the USERS tablespace before the replacement disk arrives. You have already taken the USERS tablespace offline and have restored the data file from last night’s backup to a new disk. Which additional steps are required in order to make the USERS tablespace available?()A Only bring the tablespace back online.B Only recover the tablespace and then bring the tablespace back online.C Shut down the database, recover the data file and then start up the database.D Issue the ALTER DATABASE RENAME FILE command, recover the tablespace, and then bring the tablespace online.E Recover the tablespace, issue the ALTER DATABASE RENAME FILE command, and then bring the tablespace online.

考题 单选题In your Supportcenter.cn production database,you find that the database users are able to create and read files with unstructured data,available in any location on the host machine from an application. You want to restrict the database users to access files in a specific location on the host machine. What could do to achieve this?()A Modify the value for the UTL_FILE_DIR parameter in the parameter fileB Grant read and write privilege on the operating system path to the database usersC Modify the value for the LDAP_DIRECTORY_ACCESS parameter in the parameter fileD Modify the value for the PLSQL_NATIVE_LIBRARY_DIR parameter in the parameter fileE Create a directory object referring to the operating system path, and grant read and write privilege on the directory object to the database users