网友您好, 请在下方输入框内输入要搜索的题目:
题目内容
(请给出正确答案)
单选题
Which of the following attributes is set when a file is ready to be backed up?()
A
a
B
h
C
r
D
s
参考答案
参考解析
解析:
暂无解析
更多 “单选题Which of the following attributes is set when a file is ready to be backed up?()A aB hC rD s” 相关考题
考题
Which of the following attributes should be specified when creating a volume group?()
A.stripe sizeB.allocation policyC.physical partition sizeD.number of logical partitions
考题
When line errors occur, which of the following commands should be sued to cause init to re-read the /etc/inittab file if init stops respawning the getty process on a TTY?()
A.alogB.telinitC.sysinitD.cfgmgr
考题
Which of the following problems has occurred when a menu appears and prompts the user to "copy a dump to external media?()A、 The external dump device is full. B、 The dump device was set to /dev/hd7 before the dump happened. C、 The boot failed while copying the dump from paging space to a file. D、 The dump device was not set to a paging device before the dump happened.
考题
Which of the following statements are FALSE concerning the defragfs command?()A、 The defragfs command should not be run against file systems and logical volumes that contain mostly transitory information, such as /tmp.B、 The defragfs command should not be run on a large JFS2 file system when running on a 32-bit kernel.C、 The defragfs command can improve file system performance by increasing the file system’s contiguous free space.D、 The defragfs command can only be run against file systems that are mounted with read-write permissions.
考题
A user states that when the user copies files from ‘My Documents’ to a network share, the files are no longer available locally. Which of the following BEST describes the reason the files are no longer visible?()A、The user copied to a read-only folder share.B、The user changed the attributes of the files.C、The user copied the files from the local My Documents folder.D、The user moved instead of copied the files.
考题
A program configuration file on a shared computer changes each time the program is run, causing the program to fail. Which of the following steps could a technician take to help prevent this file from being changed?()A、Set the group’s folder permissions to deny.B、Use Event Viewer to monitor changes to the file.C、Store a backup copy of the file on a USB drive.D、Change the file attribute to read only.
考题
Consider the following command to create a tablespace in your production database (which is using an Automatic Storage Management [ASM] instance to manage the database files): CREATE TABLESPACE user_tbsp DATAFILE ’+dgroup3(user_temp)/user_files/user_tbsp’ SIZE 200M; What would be the result of this command?()A、It would result in an error because the template cannot be used along with the disk group.B、It would result in an error because the path cannot be specified while creating a tablespace in a disk group.C、It would create a tablespace with a data file that has an alias, and its attributes are set by the user-defined template.D、It would create a tablespace with a data file that does not have an alias, and its attributes are set by the user-defined template.
考题
Which of the following describes how to set the Read-only attribute on a folder?()A、Right-click the folder Properties Security tab select the username from the list Permissions clear the box labeled Read OKB、Open the folder Tool Folder Options General tab Read-only OKC、Open the Command Prompt type attrib r [drive:][path] EnterD、Open the Command Prompt type attrib +r [drive:][path] EnterE、Right-click the folder Properties General tab Attributes select Read-only OK
考题
Which of the following is a differentiating feature of file permissions as compared to share permissions?()A、File permissions are less granular than share permissions.B、Full control can only be set using file permissions.C、File permissions are more granular than share permissions.D、Full control can only be set using share permissions.
考题
Which of the following attributes is set when a file is ready to be backed up?()A、aB、hC、rD、s
考题
When line errors occur, which of the following commands should be sued to cause init to re-read the /etc/inittab file if init stops respawning the getty process on a TTY?()A、alogB、telinitC、sysinitD、cfgmgr
考题
Which file contains the attributes used to setup a new user account when executing ‘mkuser’ without any flags?()A、/etc/security/userB、/etc/security/passwdC、/etc/security/mkuser.sysD、/etc/security/mkuser.default
考题
When configuring the messaging system, which of the following are valid parameters for the file transport? ()A、File NameB、Operating SystemC、LocationD、HostE、Mode
考题
Which of the following commands should be used to set network attributes on a currently running kernel?()A、 noB、 chdevC、 vmtuneD、 schedtune
考题
To change the read sizes on a V3 network file system server, which of the following options would need to be set?()A、rsizeB、nfs_max_read_sizeC、nfs_server_clreadD、nfs_rfc1323
考题
Which of the following attributes should be specified when creating a volume group?()A、stripe sizeB、allocation policyC、physical partition sizeD、number of logical partitions
考题
When creating a SQL tuning set,which of the following steps allows the DBA to reduce the size of the SQL set by selecting specific operators and values?()A、 Filter versionsB、 Filter loadsC、 Filter tasksD、 Filter options
考题
Which data dictionary views displays the error information related to a data file, when an internal read fails on that file?()A、V$DATAFILEB、V$DATAFILE_HEADERC、DBA_DATA_FILESD、V$DBFILEE、V$DATAFILE_ERRORS
考题
In which of the following scenarios is a tablespace recovery required?()A、 when recovering a lost read-only tablespace from a read-only tablespace backupB、 when recovering a lost read-only tablespace from a read-write tablespace backup when the database is running in ARCHIVELOG modeC、 when recovering a lost read-only tablespace from a read-write tablespace backup when the database is running in NOARCHIVELOG mode and the changes in the online redo log files have been overwrittenD、 when recovering a lost read-only tablespace from a read-only tablespace backup using the backup of the control file, the control file was created using the ALTER DATABASE BACKUP CONTROLFILE TO TRACE statement, and this statement was issued when the tablespace was read-only
考题
You are managing the Oracle database. Which of the following choices correctly identifies when Oracle reads the contents of the init.ora file?()A、When the instance is started B、When the database is mounted C、When the database is opened D、When the database is closed
考题
单选题To change the read sizes on a V3 network file system server, which of the following options would need to be set?()A
rsizeB
nfs_max_read_sizeC
nfs_server_clreadD
nfs_rfc1323
考题
多选题When configuring the messaging system, which of the following are valid parameters for the file transport? ()AFile NameBOperating SystemCLocationDHostEMode
考题
单选题You have a disk group, DGROUP1, with three disk and NORMAL redundancy. You execute the following command to create a template for the disk group: ALTER DISKGROUP dgroup1 ADD TEMPLATE my_temp ATTRIBUTES (MIRROR FINE);Which statement is true?()A
When a file is created in DGROUP1 with the template, it would have three-way mirroring.B
When a file is created in DGROUP1, the MY_TEMP template becomes the default template.C
When a file is created in DGROUP1 with the template, it would have two-way mirroring and file striping.D
When a file is created in DGROUP1 with the template, it would have three-way mirroring and file striping.E
When a file is created in DGROUP1 with the template, it would have two-way mirroring but no file striping.
考题
单选题Which of the following commands should be used to set network attributes on a currently running kernel?()A
noB
chdevC
vmtuneD
schedtune
考题
单选题Which of the following statements are FALSE concerning the defragfs command?()A
The defragfs command should not be run against file systems and logical volumes that contain mostly transitory information, such as /tmp.B
The defragfs command should not be run on a large JFS2 file system when running on a 32-bit kernel.C
The defragfs command can improve file system performance by increasing the file system’s contiguous free space.D
The defragfs command can only be run against file systems that are mounted with read-write permissions.
考题
单选题Which of the following is a differentiating feature of file permissions as compared to share permissions?()A
File permissions are less granular than share permissions.B
Full control can only be set using file permissions.C
File permissions are more granular than share permissions.D
Full control can only be set using share permissions.
考题
单选题You enable block change tracking. You issue the following command: BACKUP INCREMENTAL LEVEL 0 DATABASE; The next day, you issue the following command: BACKUP INCREMENTAL LEVEL 1 CUMULATIVE DATABASE; Which statement about the use of the change tracking file is true?()A
RMAN reads the block change tracking file only when it performs the incremental level 0 backup.B
RMAN reads the block change tracking file when it performs both incremental backups.C
RMAN reads the block change tracking file only when it performs the incremental level 1 backup.D
RMAN does not read the block change tracking file when it performs either incremental backup.
考题
单选题Which data dictionary views displays the error information related to a data file, when an internal read fails on that file?()A
V$DATAFILEB
V$DATAFILE_HEADERC
DBA_DATA_FILESD
V$DBFILEE
V$DATAFILE_ERRORS
热门标签
最新试卷