网友您好, 请在下方输入框内输入要搜索的题目:

题目内容 (请给出正确答案)
单选题
You are administering a database and you receive a requirement to apply the following restrictions: 1. A connection must be terminated after four unsuccessful login attempts by user. 2. A user should not be able to create more than four simultaneous sessions. 3. User session must be terminated after 15 minutes of inactivity. 4. Users must be prompted to change their passwords every 15 days. How would you accomplish these requirements?()
A

by granting a secure application role to the users

B

by creating and assigning a profile to the users and setting the REMOTE_OS_AUTHENT parameter to false

C

By creating and assigning a profile to the users and setting the SEC_MAX_FAILED_LOGIN_ATTEMPTS parameter to 4

D

By Implementing Fine-Grained Auditing (FGA) and setting the REMOTE_LOGIN_PASSWORD_FILE parameter to none.

E

By implementing the database resource Manager plan and setting the SEC_MAX_FAILED_LOGIN_ATTEMPTS parameters to 4.


参考答案

参考解析
解析: 暂无解析
更多 “单选题You are administering a database and you receive a requirement to apply the following restrictions: 1. A connection must be terminated after four unsuccessful login attempts by user. 2. A user should not be able to create more than four simultaneous sessions. 3. User session must be terminated after 15 minutes of inactivity. 4. Users must be prompted to change their passwords every 15 days. How would you accomplish these requirements?()A by granting a secure application role to the usersB by creating and assigning a profile to the users and setting the REMOTE_OS_AUTHENT parameter to falseC By creating and assigning a profile to the users and setting the SEC_MAX_FAILED_LOGIN_ATTEMPTS parameter to 4D By Implementing Fine-Grained Auditing (FGA) and setting the REMOTE_LOGIN_PASSWORD_FILE parameter to none.E By implementing the database resource Manager plan and setting the SEC_MAX_FAILED_LOGIN_ATTEMPTS parameters to 4.” 相关考题
考题 Your database is in ARCHIVELOG mode. You have two online redo log groups, each of which contains oneredo member. When you attempt to start the database, you receive the following errors:ORA-00313: open failed for members of log group 1 of thread 1ORA-00312: online log 1 thread 1: ‘D:\REDO01.LOG‘You discover that the online redo log file of the current redo group is corrupted.Which statement should you use to resolve this issue?()A. ALTER DATABASE DROP LOGFILE GROUP 1;B. ALTER DATABASE CLEAR LOGFILE GROUP 1;C. ALTER DATABASE CLEAR UNARCHIVED LOGFILE GROUP 1;D. ALTER DATABASE DROP LOGFILE MEMBER ‘D:\REDO01.LOG

考题 You work as a database administrator for Certkiller .com. You received the following error while working on your database: ORA-01555: snapshot too old  In which situation would you receive such an error?()A、You performed rollback after commit.B、If a log switch occurs in your database.C、Thearchiverfails to generate an archived log file.D、Instance recovery fails to find one of the redo log files.E、A long-running query is unable to get read-consistent image.F、If you perform manual undo management operations in auto mode.

考题 You are a Database Administrator with WonderWeb. You use a password file to establish connections to the Sales database located on the server. You created the password file using the following command:        ORAPWD file=d:/oracle/ora9i/orapwU01 password=admin entries=4   You erroneously deleted the password file while the database was running. You re-create the password file using the following command:   ORAPWD file=d:/oracle/ora9i/orapwU01 password=change_on_install entries=4   However, when you try to connect as the SYS user, you receive the following error:        ORA-01031: insufficient privileges   What should you do to resolve this error?()A、 Delete the newly created password file and re-create another password file with the password admin, without shutting down the database.B、 Enable the operating system authentication, shut down the database, disable the operating system authentication, and restart the database using the password file.C、 Enable the operating system authentication, shut down the database, re-create the password file using the same ORAPWD command, and restart the database using the password file.D、 Delete the newly created password file, enable operating system authentication and shut down the database. Then, re-create another password file using the same ORAPWD command and restart the database using this password file.

考题 You are managing an Oracle Database 11g database. You configured the database to run in ARCHIVELOGmode.  Which two statements are true in this scenario()A、You must shut down the database instance to perform the backups.B、You must configure the Flash Recovery Area (FRA) for the database.C、You can perform complete database backups without closing the database.D、All the previous closed database backups including control files become invalid after you configure thedatabase to ARCHIVELOG mode.

考题 In which two cases would you perform only consistent backup?()A、You are working on a database where downtime is not tolerated.B、You are working on a database where downtime can be tolerated.C、You are working on a database that operates in ARCHIVELOG mode.D、You are working on a database that operates in NOARCHIVELOG mode.E、You are working on a database where all the tablespaces are locally managed.F、You are working on a database where control files and redo log files are multiplexed.G、You are working on a database where control files and redo log files are not multiplexed.

考题 When you try to open your database, you receive the following error:  ORA-00205: error in identifying control file   Where would you find the details required to resolve this error?()A、audit trailB、alert log fileC、user trace fileD、online trace fileE、background trace fileF、operating system event viewer

考题 Your database is in ARCHIVELOG mode. You have two online redo log groups,each of which contains one redo member.  When you attempt to start the database, you receive the following errors:()A、 ALTER DATABASE DROP LOGFILE GROUP 1B、 ALTER DATABASE CLEAR LOGFILE GROUP 1C、 ALTER DATABASE CLEAR UNARCHIVED LOGFILE GROUP 1D、 ALTER DATABASE DROP LOGFILE MEMBER ’D:///REDO01.LOG’

考题 If you back up a database without connecting to the recovery catalog, which operations will cause the recovery catalog to be updated?()A、 The next time you back up the database when you are also connected to the recovery catalog and the target databaseB、 The next time you are connected to the target database and the recovery catalog database and issue the resync commandC、 The next time you connect RMAN to just the recovery catalogD、 The next time you connect to the recovery catalog and the target database with RMANE、 Connecting to the recovery catalog and issuing the resync all databases command

考题 You are administering a database and you receive a requirement to apply the following restrictions: 1. A connection must be terminated after four unsuccessful login attempts by user. 2. A user should not be able to create more than four simultaneous sessions. 3. User session must be terminated after 15 minutes of inactivity. 4. Users must be prompted to change their passwords every 15 days. How would you accomplish these requirements?()A、by granting a secure application role to the usersB、by creating and assigning a profile to the users and setting the REMOTE_OS_AUTHENT parameter to falseC、By creating and assigning a profile to the users and setting the SEC_MAX_FAILED_LOGIN_ATTEMPTS parameter to 4D、By Implementing Fine-Grained Auditing (FGA) and setting the REMOTE_LOGIN_PASSWORD_FILE parameter to none.E、By implementing the database resource Manager plan and setting the SEC_MAX_FAILED_LOGIN_ATTEMPTS parameters to 4.

考题 You are working on a database, where you have three redo log groups. When the database is down for a backup, an operating system (OS) user deletes all the redo log files in a group. What will happen when you open your database?()A、 The instance starts, the database is mounted, but efforts to open the database fail, and an error about the missing redo log group is displayed.B、 Before the instance starts, you receive an error about the missing redo log files of a group.C、 The instance starts and the database opens with an error message written to the alert log file.D、 The instance starts and the database opens because two redo log groups still exist.E、 The instance starts and the database opens, but every attempt to write to redo log files fails with an error.

考题 You have lost all your database control files. To recover them, you are going to use the results of the alter database backup controlfile to trace command. Your datafiles and your online redo logs are all intact.  Which of the following is true regarding your recovery?()  A、 You will need to open the database with the resetlogs command.B、 All you need to do is execute the trace file from SQL*Plus and it will perform the recovery for you.C、 You will use the resetlogs version of the create controlfile command.D、 You will use the noresetlogs version of the create controlfile command.E、 You will use the trace file to create a backup control file, and then you will recover the database with the recover database using backup controlfile command

考题 You work as a database administrator for Supportcenter.cn. In your production database, the size of Database Buffer Cache needs to be increased immediately for the current as well as future instances of the database. The Oracle instance has been configured to accommodate any changes in the size of the memory structures. At this is production database, you want to accomplish this task with no impact on the user’s connections. Which activity must you have completed before accomplishing this task?()A、You must have started the database instance in restricted mode.B、You must have started the database instance inNORMALmode.C、You must have started the database instance with server parameter file.D、You must have started the database instance but must not have mounted.E、You must have started the database instance but must not have opened.

考题 You work in a company which uses SQL Server 2008. You are the administrator of the company database. Now you are in charge of a SQL Server 2008 instance which is named Instance01. Instance01 contains a database which is named Dworks. The bulk-logged recovery mode is used by the Dworks database. You log ship the Dworks database through a WAN link. A scheduled job rebuilds the indexes of the Dworks database. You find that the size of the log backups for log shipping has been enlarged by the job. Now you have to reduce the size of the log backup.  So what action should you perform to achieve this goal?()  A、You should recreate the indexes. B、You should compress the log file backups C、You should make the Dworks database use the Full recovery mode D、You should make the Dworks database use the Simple recovery mode.

考题 You work as the Exchange administrator at Company.com.The Company.com network contains an Exchange Server 2010 Organization.The organization contains the subsequent servers: the Company.com organization contains one mailbox database as well as one public folder database.You receive an instruction from the cio to ensure that in the event of -ex03 failure the public folders will remain available.What should you do?()A、You should consider creating a database availability group (DAG). Thereafter -ex03 and mbx2 should be added to the dag.B、You should consider creating a public folder database on -ex04.Thereafter the replication settings should be changed on every public folder.C、You should consider creating a public folder database on -ex04.Thereafter the replication settings should be changed on the public folder database.D、You should consider creating a Failover Cluster.Thereafter -ex03 and -ex04 should be added to the failover cluster.

考题 You work as a network Exchange administrator at Company.com.The Company.com network currently consists of a single Active Directory forest containing a single domain named Company.com.The Company.com organization makes use of Microsoft Exchange Server 2010 as their messaging solution.During the course of the business week you receive instruction from Company.com to start planning the creation of ten mailbox databases on twenty Mailbox servers whilst ensuring that you create a naming convention for all Mailbox databases. What should you do?()A、You should consider having a file name that is unique within the organization provided for each mailbox database file.B、You should consider having a file name that is unique within the Mailbox server provided for each mailbox database file.C、You should consider having a database name that is unique within the organization provided for each mailbox database file.D、You should consider having a database name that is unique within the Mailbox server provided for each mailbox database file.

考题 You work in a company which is named Wiikigo Corp. The company uses SQL Server 2008. You are the administrator of the company database. Now you are in charge of a SQL Server 2008 instance. There is a database named DB1 in the instance. In the database, a small percentage of data is modified everyday. Ever day in the morning, you have to create a read-only copy of the database for reporting purposes and make sure that you use as little disk space as possible.  In the options below, which strategy should you use? () A、You should use database snapshots B、You should use database backup and restore C、You should use database backup and restore along with compression D、You should use schema-bound views in a read-only database. The database resides on the same instance.

考题 You work as the exchange administrator at TestKing.com. The TestKing.com network contains an Exchange Server 2010 Organization. TestKing.com has its headquarters in Stockholm where you are located.The TestKing.com network contains a database availability group (DAG). You receive an instruction fromthe management to devise a Mailbox database security solution for the organization. Management wantsthe read/write performance to be maximized as well as ensuring that any access to the database isprohibited in the event of theft. What should you do?()A、You should recommend that management make use of DAG network encryption.B、You should recommend that management make use of Encrypted File System (EFS)C、You should recommend that management make use of Windows BitLocker Drive Encryption.D、You should recommend that management make use of Rights Management Service RMS.

考题 You work in a company which is named Wiikigo Corp. The company uses SQL Server 2008. You are the administrator of the company database. Now you are in charge of a SQL Server 2008 instance. There is a report which is often executed during business time. There is a stored procedure that is used as the data source for the report. You get a report from users saying that they receive the data returned by the report but the data is inconsistent. As the technical support, you check and find that phantom reads cause this problem. You must make sure that consistent data is returned by the report while not affecting other users. So what action should you perform to achieve this goal?()  A、You should configure the database for Read Committed Snapshot isolation. B、You should modify the stored procedure to use the Snapshot isolation level C、You should configure the database for Auto Update Statistics asynchronously D、You should modify the stored procedure to use the Repeatable Read isolation level

考题 You work as the IT professional in an international company which is named Wiikigo. You are experiencedin implementing and administering a network operating system. You are specialized in deploying servers,configuring Windows Server 2008 Terminal services and network application services, and configuring aweb services infrastructure. You are in charge of a server that runs Windows Server 2008. The server hasthe Hyper-V server role installed. Now you receive an order from the company management. According tothe company requirement, you have to merge a differencing disk and a parent disk. What action should you perform?()A、The differencing disk should be inspected.B、The parent disk should be edited.C、The parent disk should be inspected.D、The differencing disk should be edited.

考题 You work in a company which is named Wiikigo Corp. The company uses SQL Server 2008. You are the administrator of the company database. Now you are in charge of a SQL Server 2008 instance. There is a database named DB1 in the instance. On DB1, quite few logged operations are performed. Now according to the requirement of the company CIO, you must validate that the database can be restored to a specific point in time. So what action should you perform to achieve this goal? () A、You should verify that the simple recovery model is used by the database.B、You should verify that the full recovery model is used by the database.C、You should verify that the checksum page verify option is used by the database. D、You should verify that the bulk-logged recovery model is used by the database. 

考题 单选题Your database is in ARCHIVELOG mode. You have two online redo log groups,each of which contains one redo member.  When you attempt to start the database, you receive the following errors:()A  ALTER DATABASE DROP LOGFILE GROUP 1B  ALTER DATABASE CLEAR LOGFILE GROUP 1C  ALTER DATABASE CLEAR UNARCHIVED LOGFILE GROUP 1D  ALTER DATABASE DROP LOGFILE MEMBER ’D:///REDO01.LOG’

考题 单选题You work in a company which is named Wiikigo Corp. The company uses SQL Server 2008. You are the administrator of the company database. Now you are in charge of a SQL Server 2008 instance. There is a SQL Server 7.0 database. You upgrade the database to the SQL Server instance. According to the company requirement, you must make sure that suspect pages can be detected in the database. So what action should you perform to achieve this goal?()A For the database, you should turn on the TRUSTWORTHY database optionB For the database, the PAGE_VERIFY database option should be set to CHECKSUMC For the database, the database compatibility level option should be set to 10D For the model database, the PAGE_VERIFY database option should be set to TORN_PAGE_DETECTION. 

考题 单选题You are working on a database, where you have three redo log groups. When the database is down for a backup, an operating system (OS) user deletes all the redo log files in a group. What will happen when you open your database?()A  The instance starts, the database is mounted, but efforts to open the database fail, and an error about the missing redo log group is displayed.B  Before the instance starts, you receive an error about the missing redo log files of a group.C  The instance starts and the database opens with an error message written to the alert log file.D  The instance starts and the database opens because two redo log groups still exist.E  The instance starts and the database opens, but every attempt to write to redo log files fails with an error.

考题 单选题Before you begin administering artificial respiration, you should be sure the victim()A is comfortableB is warmC is not bleedingD has a clear airway

考题 单选题Your database is in ARCHIVELOG mode. You have two online redo log groups, each of which contains one redo member. When you attempt to start the database, you receive the following errors: ORA-00313: open failed for members of log group 1 of thread 1 ORA-00312: online log 1 thread 1: 'D:/REDO01.LOG' You discover that the online redo log file of the current redo group is corrupted. Which statement should you use to resolve this issue?()A ALTER DATABASE DROP LOGFILE GROUP 1;B ALTER DATABASE CLEAR LOGFILE GROUP 1;C ALTER DATABASE CLEAR UNARCHIVED LOGFILE GROUP 1;D ALTER DATABASE DROP LOGFILE MEMBER 'D:/REDO01.LOG

考题 单选题You have configured the system to purge mailboxes after 8 days of being deleted. You need to receive a notification when the mailboxes are purged. What should you do?()A Start a data collectorB Start an event viewer subscriptionC Add a task to the application event logD Modify the properties of the mailbox database

考题 单选题You work as a database administrator for Supportcenter.cn. You received the following error while working on your database: ORA-01555: snapshot too old ,In which situation would you receive such an error?()A You performed rollback after commit.B If a log switch occurs in your database.C Thearchiverfails to generate an archived log file.D Instance recovery fails to find one of the redo log files.E A long-running query is unable to get read-consistent image.F If you perform manual undo management operations in auto mode.

考题 单选题You have an Exchange Server 2010 Mailbox server that contains multiple mailbox databases.You need to ensure that you receive an e-mail alert if the volume that contains the mailbox database files has less than 25 percent of free space. What should you do?()A Create a new Data Collector Set.B Create a new Event Viewer Subscription.C Attach a new task to the Application event log.D Modify the properties of the mailbox database objects.