网友您好, 请在下方输入框内输入要搜索的题目:

题目内容 (请给出正确答案)
单选题
Which of the following attributes is set when a file is ready to be backed up?()
A

a

B

h

C

r

D

s


参考答案

参考解析
解析: 暂无解析
更多 “单选题Which of the following attributes is set when a file is ready to be backed up?()A aB hC rD s” 相关考题
考题 Which of the following attributes should be specified when creating a volume group?() A.stripe sizeB.allocation policyC.physical partition sizeD.number of logical partitions

考题 When line errors occur, which of the following commands should be sued to cause init to re-read the /etc/inittab file if init stops respawning the getty process on a TTY?() A.alogB.telinitC.sysinitD.cfgmgr

考题 Which of the following problems has occurred when a menu appears and prompts the user to "copy a dump to external media?()A、 The external dump device is full. B、 The dump device was set to /dev/hd7 before the dump happened. C、 The boot failed while copying the dump from paging space to a file. D、 The dump device was not set to a paging device before the dump happened.

考题 Which of the following statements are FALSE concerning the defragfs command?()A、 The defragfs command should not be run against file systems and logical volumes that contain mostly transitory information, such as /tmp.B、 The defragfs command should not be run on a large JFS2 file system when running on a 32-bit kernel.C、 The defragfs command can improve file system performance by increasing the file system’s contiguous free space.D、 The defragfs command can only be run against file systems that are mounted with read-write permissions.

考题 A user states that when the user copies files from ‘My Documents’ to a network share, the files are no longer available locally. Which of the following BEST describes the reason the files are no longer visible?()A、The user copied to a read-only folder share.B、The user changed the attributes of the files.C、The user copied the files from the local My Documents folder.D、The user moved instead of copied the files.

考题 A program configuration file on a shared computer changes each time the program is run, causing the program to fail. Which of the following steps could a technician take to help prevent this file from being changed?()A、Set the group’s folder permissions to deny.B、Use Event Viewer to monitor changes to the file.C、Store a backup copy of the file on a USB drive.D、Change the file attribute to read only.

考题 Consider the following command to create a tablespace in your production database (which is using an Automatic Storage Management [ASM] instance to manage the database files):  CREATE TABLESPACE user_tbsp  DATAFILE ’+dgroup3(user_temp)/user_files/user_tbsp’ SIZE 200M;  What would be the result of this command?()A、It would result in an error because the template cannot be used along with the disk group.B、It would result in an error because the path cannot be specified while creating a tablespace in a disk group.C、It would create a tablespace with a data file that has an alias, and its attributes are set by the user-defined template.D、It would create a tablespace with a data file that does not have an alias, and its attributes are set by the user-defined template.

考题 Which of the following describes how to set the Read-only attribute on a folder?()A、Right-click the folder  Properties  Security tab  select the username from the list  Permissions  clear the box labeled Read  OKB、Open the folder  Tool  Folder Options  General tab  Read-only  OKC、Open the Command Prompt  type attrib r [drive:][path]  EnterD、Open the Command Prompt  type attrib +r [drive:][path]  EnterE、Right-click the folder  Properties  General tab  Attributes  select Read-only  OK

考题 Which of the following is a differentiating feature of file permissions as compared to share permissions?()A、File permissions are less granular than share permissions.B、Full control can only be set using file permissions.C、File permissions are more granular than share permissions.D、Full control can only be set using share permissions.

考题 Which of the following attributes is set when a file is ready to be backed up?()A、aB、hC、rD、s

考题 When line errors occur, which of the following commands should be sued to cause init to re-read the /etc/inittab file if init stops respawning the getty process on a TTY?()A、alogB、telinitC、sysinitD、cfgmgr

考题 Which file contains the attributes used to setup a new user account when executing ‘mkuser’ without any flags?()A、/etc/security/userB、/etc/security/passwdC、/etc/security/mkuser.sysD、/etc/security/mkuser.default

考题 When configuring the messaging system, which of the following are valid parameters for the file transport? ()A、File NameB、Operating SystemC、LocationD、HostE、Mode

考题 Which of the following commands should be used to set network attributes on a currently running kernel?()A、 noB、 chdevC、 vmtuneD、 schedtune

考题 To change the read sizes on a V3 network file system server, which of the following options would need to be set?()A、rsizeB、nfs_max_read_sizeC、nfs_server_clreadD、nfs_rfc1323

考题 Which of the following attributes should be specified when creating a volume group?()A、stripe sizeB、allocation policyC、physical partition sizeD、number of logical partitions

考题 When creating a SQL tuning set,which of the following steps allows the DBA to reduce the size of the SQL set by selecting specific operators and values?()A、 Filter versionsB、 Filter loadsC、 Filter tasksD、 Filter options

考题 Which data dictionary views displays the error information related to a data file, when an internal read fails on that file?()A、V$DATAFILEB、V$DATAFILE_HEADERC、DBA_DATA_FILESD、V$DBFILEE、V$DATAFILE_ERRORS

考题 In which of the following scenarios is a tablespace recovery required?()A、 when recovering a lost read-only tablespace from a read-only tablespace backupB、 when recovering a lost read-only tablespace from a read-write tablespace backup when the database is running in  ARCHIVELOG modeC、 when recovering a lost read-only tablespace from a read-write tablespace backup when the database is running in  NOARCHIVELOG mode and the changes in the online redo log files have been overwrittenD、 when recovering a lost read-only tablespace from a read-only tablespace backup using the backup of the control file, the control file was created using the ALTER DATABASE BACKUP CONTROLFILE TO TRACE statement, and this statement was issued when the tablespace was read-only

考题 You are managing the Oracle database. Which of the following choices correctly identifies when Oracle reads the contents of the init.ora file?()A、When the instance is started B、When the database is mounted C、When the database is opened D、When the database is closed

考题 单选题To change the read sizes on a V3 network file system server, which of the following options would need to be set?()A rsizeB nfs_max_read_sizeC nfs_server_clreadD nfs_rfc1323

考题 多选题When configuring the messaging system, which of the following are valid parameters for the file transport? ()AFile NameBOperating SystemCLocationDHostEMode

考题 单选题You have a disk group, DGROUP1, with three disk and NORMAL redundancy. You execute the following command to create a template for the disk group: ALTER DISKGROUP dgroup1 ADD TEMPLATE my_temp ATTRIBUTES (MIRROR FINE);Which statement is true?()A  When a file is created in DGROUP1 with the template, it would have three-way mirroring.B  When a file is created in DGROUP1, the MY_TEMP template becomes the default template.C  When a file is created in DGROUP1 with the template, it would have two-way mirroring and file striping.D  When a file is created in DGROUP1 with the template, it would have three-way mirroring and file striping.E  When a file is created in DGROUP1 with the template, it would have two-way mirroring but no file striping.

考题 单选题Which of the following commands should be used to set network attributes on a currently running kernel?()A  noB  chdevC  vmtuneD  schedtune

考题 单选题Which of the following statements are FALSE concerning the defragfs command?()A  The defragfs command should not be run against file systems and logical volumes that contain mostly transitory information, such as /tmp.B  The defragfs command should not be run on a large JFS2 file system when running on a 32-bit kernel.C  The defragfs command can improve file system performance by increasing the file system’s contiguous free space.D  The defragfs command can only be run against file systems that are mounted with read-write permissions.

考题 单选题Which of the following is a differentiating feature of file permissions as compared to share permissions?()A  File permissions are less granular than share permissions.B  Full control can only be set using file permissions.C  File permissions are more granular than share permissions.D  Full control can only be set using share permissions.

考题 单选题You enable block change tracking. You issue the following command: BACKUP INCREMENTAL LEVEL 0 DATABASE; The next day, you issue the following command: BACKUP INCREMENTAL LEVEL 1 CUMULATIVE DATABASE; Which statement about the use of the change tracking file is true?()A RMAN reads the block change tracking file only when it performs the incremental level 0 backup.B RMAN reads the block change tracking file when it performs both incremental backups.C RMAN reads the block change tracking file only when it performs the incremental level 1 backup.D RMAN does not read the block change tracking file when it performs either incremental backup.

考题 单选题Which data dictionary views displays the error information related to a data file, when an internal read fails on that file?()A V$DATAFILEB V$DATAFILE_HEADERC DBA_DATA_FILESD V$DBFILEE V$DATAFILE_ERRORS