网友您好, 请在下方输入框内输入要搜索的题目:

题目内容 (请给出正确答案)

A user receives the following error while executing a query: ORA/x7f01555:snapshot too old Which two options can be the solutions to avoid such errors in future?()

  • A、increase the size of redo log files
  • B、increase the size of the undo tablespace
  • C、increase the size of the Database Buffer Cache
  • D、increase the size of the default temporary tablespace
  • E、enable the retention guarantee for the undo tablespace

参考答案

更多 “ A user receives the following error while executing a query: ORA/x7f01555:snapshot too old Which two options can be the solutions to avoid such errors in future?()A、increase the size of redo log filesB、increase the size of the undo tablespaceC、increase the size of the Database Buffer CacheD、increase the size of the default temporary tablespaceE、enable the retention guarantee for the undo tablespace” 相关考题
考题 You are the administrator of a Windows 2000 Professional computer that is shared by several users in the Sales department. User accounts have been created for current users. Current users can log on to the computers. To accommodate new users, you add two new user accounts named User7 and User8 to computer5. When User7 attempts to log on o the computer, she receives the following error message: "Windows cannot copy file C:\Documents and Settings\Default User\ to location C:\Documents and Settings\User7. Contact your network administrator. Detail - Access is denied." When User8 attempts to log on to the computer, he receives the same type of error message.You want to allow the two new users, as well as other users in the Sales department, to be able to log on to the computer.Which two methods can you use to accomplish your goal? (Choose two.)A.Add the User7 and User8 user accounts to the DACL for the Profiles shared folder on the network server.B.Add the User7 and User8 user accounts to the DACL for the C:\Documents and Settings\Default User folder.C.Add the Everyone group to the DACL for the C:\Documents and Settings\Default User folder.D.Add a Group Policy object (GPO) for the Sales OU that redirects user profiles to a shared folder.E.Log on by using the local Administrator account and create new folders for User7 and User8 in the C:\Documents and Settings folder.F.Select the allow inheritable permissions from parent to propagate to this object option on the C:\Documents and Settings\Default User folder, and reset the permissions on all child objects.G.Move and retain permissions and compressions.

考题 Click the Exhibit button.A network administrator receives complaints that the application voicecube is timing out after being idle for 30 minutes.Referring to the exhibit, what is a resolution?() A. [edit] user@host# set applications application voicecube inactivity-timeout neverB. [edit] user@host# set applications application voicecube inactivity-timeout 2C. [edit] user@host# set applications application voicecube destination-port 5060D. [edit] user@host# set security policies from-zone trust to-zone trust policy intrazone then timeout never

考题 A user receives an email slating that their account was compromised and there is a need to verifyaccount credentials by submitting the correct information on a website.Which of the following security threats is occurring?()A. PhishingB. Smurf attackC. Denial of serviceD. Man-in-the-middle

考题 You have a stand-alone server named Server1 that runs Windows Server 2003 Service Pack (SP2).A user attempts to connect to the server by using Remote Desktop Connection and receives the following error message.You need to ensure that the user can log on to the server by using Remote Desktop Connection.What should you do?()A. On Server1, modify the Remote Control settings for the user account.B. On Server1, modify the Remote Access Permission settings for the user account.C. Instruct the user to log on to Server1 locally and then to change her password.D. Instruct the user to log on to another computer and then connect to Server1 by using Remote Desktop Connection.

考题 A user receives an email slating that their account was compromised and there is a need to verify account credentials by submitting the correct information on a website. Which of the following security threats is occurring?()A、PhishingB、Smurf attackC、Denial of serviceD、Man-in-the-middle

考题 An administrator receives a call from a user who is unable to receive email. After troubleshooting the administrator is able to resolve the issue and verify that user is able to access email again.  Which of the following is the NEXT step that the administrator should take?()A、 Implement preventative measures.B、 Close the issue.C、 Document the outcome.D、 Question other users to make sure they are not having the same issue.

考题 An administrator receives a call from a user who is unable to receive email. After troubleshooting the administrator is able to resolve the issue and verify that user is able to access email again. Which of the following is the NEXT step that the administrator should take?()A、Implement preventative measures.B、Close the issue.C、Document the outcome.D、Question other users to make sure they are not having the same issue

考题 An administrator receives a call from a user who is unable to receive email. After checking the workstation and email settings the administrator is still not able to determine the problem.  Which of thefollowing is the NEXT step that the administrator should take? ()A、 Create an action plan.B、 Escalate the issue.C、 Reboot the mail server.D、 Document the solution.

考题 A technician needs to ensure that a specific application on a single home user's computer receives Internet traffic reliably. The home network provides access to three other users and the application relies on a specific protocol. Which of the following should the technician use?()A、DHCPB、PATC、ProxyD、IPX

考题 An administrator receives a call from an end user reporting that the application they are using keeps giving them an error on port 23. Which of the following is being used?()A、SSHB、Remote Desktop ConnectionC、TelnetD、VPN

考题 User "twsuser" is logged on to the IBM Tivoli Workload Scheduler  Master Domain Manager server using Job Scheduling Console to update  calendar. The user receives a message: MODIFY on   CALENDAR access not granted.  What is the cause of this error?()A、 Batchman process is down.B、 User password has expired.C、 WebSphere security is damaged.D、 There are insufficient permissions in Security file.

考题 While connected to the database,a user on a PC receives a fatal error and the machine reboots. Which background process cleans up the failed connection?()A、ARCnB、CKPTC、DBWnD、LGWRE、PMONF、SMON

考题 A user has a computer that runs Windows XP Professional. The user attempts to connect to the computer by using a Remote Desktop Connection and receives the following error message: “The local policy of the system does not permit you to log on interactively.” You need to ensure that the user can log on to the computer by using a Remote Desktop Connection. What should you do?() A、From the System settings, disable Remote Assistance.B、Add the user's account to the Remote Desktop Users group. C、From Windows Firewall, modify the scope of the Remote Desktop exception. D、Set the Remote Desktop Help Session Manager service Startup type to Automatic, and then start the service.

考题 Your company has an Active Directory domain. A user attempts to log on to the domain from a client computer and receives the following message: "This user account has expired Ask your administrator to reactivate the account." You need to ensure that the user is able to log on to the domain. What should you do()A、Modify the properties of the user account to set the account to never expire.B、Modify the properties of the user account to extend the Logon Hours setting.C、Modify the properties of the user account to set the password to never expire.D、Modify the default domain policy to decrease the account lockout duration.

考题 You are a network administrator for your company. The network consists of a single Active Directory domain. The domain contains three Windows Server 2003 domain controllers, 20 Windows Server 2003 member servers, and 750 Windows XP Professional computers. The domain is configured to use only Kerberos authentication for all server connections.A user reports that she receives an "Access denied" error message when she attempts to connect to one of the member servers. You want to test the functionality of Kerberos authentication on the user’s client computer.  Which command should you run from the command prompt on the user’s computer?()A、netshB、netdiagC、ktpassD、ksetup

考题 You are the desktop administrator for your company. All employees have Windows XP Professional computers. All employees are members of the local Users group on their own computers. A user in the graphics department has a removable disk cartridge drive on his computer. The disk cartridge contains an unsupported, third-party file system. When he tries to save data to the disk cartridge, the user is prompted to reformat the disk cartridge. However, he receives an “access denied” error message when attempting to reformat. You need to enable the user to save data to the disk cartridge. What should you do?()A、Instruct the user to format the cartridge as FAT32.B、Remove the Read-only attribute from the disk cartridge.C、Add the user to the Power Users local group on the computer.D、Grant the user Allow - Full Control permission on the disk cartridge. E、Configure the local security settings to allow the user to format and eject removable media.

考题 You have an Active Directory domain named contoso.com. You have an Exchange Server 2010 organization. You have a server named Server1 that runs Windows Server 2008 R2 and has the Exchange 2010 management tools and Microsoft Office Outlook 2010 installed. A support technician named User1 performs management tasks on Server1. From the Exchange Management Shell on Server1, User1 runs Export-Mailbox Identity User2@contoso.com PSTFolderPath E: /PSTFiles/User2.pst and receives the following error message: The term ®Expor-Mailboxˉ is not recognized as the name of a cmdlet, function, script, or operableprogram. Check the spelling of the name, or if a path was included, verify that the path is correct and try again. You need to ensure that User1 can successfully run the command.  What should you do()?  A、Assign User1 the Mailbox Import Export role.B、Assign User1 the Full Access permissions for the mailbox of User2.C、Add User1 to the Recipient Management security group.D、Add User1 to the View-Only Organization Management security group.

考题 单选题User "twsuser" is logged on to the IBM Tivoli Workload Scheduler  Master Domain Manager server using Job Scheduling Console to update  calendar. The user receives a message: MODIFY on   CALENDAR access not granted.  What is the cause of this error?()A  Batchman process is down.B  User password has expired.C  WebSphere security is damaged.D  There are insufficient permissions in Security file.

考题 单选题A user receives a call from someone reporting to be from the help desk who asks for their password. The user discovers later that the caller did not work for the help desk. Which of the following describes this type of exploit?()A Phishing scamB Social engineeringC Man-in-the-MiddleD Shoulder surfing

考题 单选题While connected to the database,a user on a PC receives a fatal error and the machine reboots. Which background process cleans up the failed connection?()A ARCnB CKPTC DBWnD LGWRE PMONF SMON

考题 单选题An administrator receives a call from a user who is unable to receive email. After troubleshooting the administrator is able to resolve the issue and verify that user is able to access email again.  Which of the following is the NEXT step that the administrator should take?()A  Implement preventative measures.B  Close the issue.C  Document the outcome.D  Question other users to make sure they are not having the same issue.

考题 单选题A user signs into the Junos Pulse Access Control Service on a wired network. The user then migrates to a wireless network, receives a new IP address, and notices that the session is disconnected.In the admin GUI, what must be configured for the user to stay connected when migrating from a wired to a wireless network?()A Persistent sessionB Dynamic evaluationC Roaming sessionD Browser request follow-through

考题 单选题Your network consists of a single Active Directory domain.You have a DHCP server that runs Windows Server 2003 Service Pack 2 (SP2). All client computers run Windows XP Service Pack 3 (SP3).A user named User1 reports that when she starts her computer, she receives a duplicate address error message.You confirm that her computer is configured as a DHCP client.You need to ensure that User1 receives a unique IP address from the DHCP server.  What should you do on the DHCP server?()A Reconcile the scope.B Create a superscope.C Enable conflict resolution.D Increase the number of IP addresses available in the scope.

考题 单选题You configure Outlook Web App (OWA) to require SSL.A user named User1 reports that when she connects to OWA, she receives a Web site security certificate warning message.You need to prevent User1 from receiving the warning message when she connects to OWA. What should you do?()A On User1’s computer, install the erver’s root certificate into the Trusted Root CertificatioAuthorities store.B On the Client Access server, install the server’s root certificate into the Trusted RooCertification Authorities store.C From the Exchange Management Console (EMC), assign an Outlook Web App mailbox policy to User1.D From the Exchange Management Console (EMC), open owa (Default Web Site) Properties. Configure the logon format to use the user principal name (UPN).

考题 单选题You have a computer that runs Windows 7 and Windows Internet Explorer 8. A user named User1 attemptsto access a Web page. User1 fails to access the Web page and receives an error message stating that thepage does not have a rating. You need to configure Internet Explorer to allow User1 to access Web pagesthat do not have a rating.  Which settings should you modify?()A Content AdvisorB InPrivate FilteringC Parental ControlsD Restricted sites

考题 单选题A user receives an email slating that their account was compromised and there is a need to verify account credentials by submitting the correct information on a website. Which of the following security threats is occurring?()A PhishingB Smurf attackC Denial of serviceD Man-in-the-middle