网友您好, 请在下方输入框内输入要搜索的题目:

题目内容 (请给出正确答案)

Manually, you set the consumer group of all of the newly created users to MYDB_GRP. You want the users to be able to change their consumer groups as per the application requirement. What was the first step that was needed in the process to achieve this objective?()

  • A、 The user must have been granted the DBA role.
  • B、 The user must have been granted the switch privilege as a part of a role.
  • C、 The user must have been granted the Resource Manager administrator privilege.
  • D、 The user must have been granted the switch privilege by using the DBMS_RESOURCE_MANAGER_PRIVS package.

参考答案

更多 “Manually, you set the consumer group of all of the newly created users to MYDB_GRP. You want the users to be able to change their consumer groups as per the application requirement. What was the first step that was needed in the process to achieve this objective?()A、 The user must have been granted the DBA role.B、 The user must have been granted the switch privilege as a part of a role.C、 The user must have been granted the Resource Manager administrator privilege.D、 The user must have been granted the switch privilege by using the DBMS_RESOURCE_MANAGER_PRIVS package.” 相关考题
考题 you should () your reasons for canceling your purchase order.A、set forthB、set upC、set inD、set out

考题 VLAN 3 is not yet configured on your switch. What happens if you set the switchport access vlan3 commmand interface configuration mode?()A、The command is accepted and the respective VLAN is added to vlan dat.B、The command is rejected.C、The command is accepted and you must configure the VLAN manually.D、The port turns amber.

考题 You set up scheduled tasks to run and notify you of any failures. 3 days later you see that none of the tasks ran and you received no notifications. What should you do?()A、Set the schedule service to run under the administrator account.B、Set the scheduled tasks to run under the administrator account.C、Enable the messenger serviceD、Set the schedule service to run under the local system account and set it to start automatically.

考题 You are configuring an 802.1Q trunk between a Layer 2 switch and a firewall. You read in the documentation that the best way to set up a trunk is to set the port as dynamic desirable. The trunk is not coming up. Which one of these options would be a valid explanation? ()A、The firewall does not support Cisco Discovery Protocol. You should set the switchport trunk mode ONB、The firewall does not support Cisco Discovery Protocol. You should set the switchport trunk mode to OFFC、The firewall does not support Cisco Discovery Protocol. You should set the switchport trunk mode asauto.D、The firewall does not support DTP. You should set the switchport trunk mode to ON

考题 As a network engineer, you responsibility is to install, configure, operate, and troubleshoot networks. In your company’s network, EIGRP is the routing protocol. You have just discovered that two routers restarted the neighbor relationship.Why? ()A、An update packet with init flag set from a known, already established neighbor relationship was received by one of the routers.B、The counters were deleted.C、The ARP cache was removed.D、The IP EIGRP neighbor relationship was cleared manually.

考题 VLAN 3 is not yet configured on your switch.What happens if you set the switchport access vlan 3 commmand interface configuration mode?()A、The command is accepted and the respective VLAN is added to vlan dat.B、The command is rejected.C、The command is accepted and you must configure the VLAN manually.D、The port turns amber.

考题 In the access log,what does an ACL tag beginning with BLOCK_ADMIN indicate?() A、 the destination was manually added to the block listB、 the malware category is set to blocking modeC、 the transaction was blocked because of application or object propertiesD、 the transaction was manually blocked by the administrative user

考题 You want your listener to be password protected to prevent it from being shut down. You want to accomplish this task while the listener is functional. Which method could you use to achieve this objective?()A、 Use the CHANGE_PASSWORD command of the Listener control utility.B、 Use the SET PASSWORD and SAVE_CONFIG commands of the Listener control utility.C、 Use the CHANGE_PASSWORD and SAVE_CONFIG commands of the Listener control utility.D、 Manually modify the listener.ora file to include the password for the listener and restart the listener.

考题 To manually configure the SGA components using Oracle Enterprise Manager Memory Advisor, you can set values for which of the following initialization parameters?()A、 DB_CACHE_SIZEB、 SHARED_POOL_SIZEC、 LARGE_POOL_SIZED、 JAVA_POOL_SIZEE、 SGA_MAX_SIZEF、 SORT_AREA_SIZE

考题 Which of the following would you use to enable automatic media recovery for a database?()A、SET AUTORECOVERY ONB、SET RECOVERY ONC、SET AUTO OND、You cannot enable automatic media recovery.

考题 You need to change the hostname and IP address of a server. Without manually editing all of the required files, which command can be run to restore a system configuration to an unconfigured state, ready to be reconfigured again restore a system configuration to an unconfigured state, ready to be reconfigured again? ()A、 /usr/sbin/sys-unconfigB、 /usr/sbin/unconfigC、 /sbin/ipconfigD、 /usr/sbin/set_parms initial

考题 You work in a company which uses SQL Server 2008. You are the administrator of the company database. Now you are in charge of a SQL Server 2008 instance. There are queries that have an estimated execution cost less than 3. You intend to configure the instance, make it use a single thread for these queries. In the options below, which sp_configure configuration option should you set?()A、You should set query governor cost limitB、You should set cost threshold for parallelismC、You should set priority boost D、You should set precompute rank

考题 You are debugging a Windows Communication Foundation (WCF) service. The service uses signed and encrypted messages.You need to configure logging so that you can read the contents of the messages. What should you do?()A、Set maxSizeMessagesToLog to 10B、Set logMessageAtServiceLevel to true.C、Set maxMessagesToLog to 10.D、Set logMessageAtTransportLevel to true.

考题 You are the administrator of the Corp arborshoes.com domain. Users in the domain run Windows 2000 Professional on their desktop computers.   A user named Katrin in the Sales organizational unit (OU) reports that her mouse is not working correctly. You log on to the domain from Katrin’s computer by using the domain Administrator account. You use Device Manager to display the current information for the mouse driver.   You discover that Katrin’s computer is using an older version of the mouse driver. You have current drivers furnished by the manufacturer of the mouse. You install the current driver by using Device manager and restart the computer.   You test the mouse and it is still not functioning correctly. You view Device Manger and notice that the display of the current driver indicates that the previous driver is still uninstalled.   You want to be able to install the correct mouse driver. What should you do? ()A、Set the Sales OU policy for security to warn and allow the installation to override the local security defaults. B、Set the domain policy for security to block but allow the installation to override the local and Sales OU security defaults. C、Set the Local Computer Policy for security on Katrin’s computer to warn but allow the installation to override the domain and the Sales OU security defaults. D、Disable plug and play on Katrin’s computer. Restart the computer and manually set up the system resources for the mouse. 

考题 You install a new CD-ROM on your computer. After installing the appropriate drivers and restarting the computer you notice that it is not working correctly. You check resources and find out that it is not using “Automatic resource settings”. How do you get your CDROM to work? ()A、Check ‘Use Automatic Settings’B、Update the drivesC、Use the windows troubleshooterD、Manually set the interrupt,I/O port, and memory address to that of the hardware manufacturers specifications.

考题 单选题You want your listener to be password protected to prevent it from being shut down. You want to accomplish this task while the listener is functional. Which method could you use to achieve this objective?()A  Use the CHANGE_PASSWORD command of the Listener control utility.B  Use the SET PASSWORD and SAVE_CONFIG commands of the Listener control utility.C  Use the CHANGE_PASSWORD and SAVE_CONFIG commands of the Listener control utility.D  Manually modify the listener.ora file to include the password for the listener and restart the listener.

考题 单选题When an UNDO segment is created manually by you, its availability status is set to which of the following automatically by Oracle?()A Online B Pending online C Offline D Stale

考题 单选题You need to change the hostname and IP address of a server. Without manually editing all of the required files, which command can be run to restore a system configuration to an unconfigured state, ready to be reconfigured again restore a system configuration to an unconfigured state, ready to be reconfigured again? ()A  /usr/sbin/sys-unconfigB  /usr/sbin/unconfigC  /sbin/ipconfigD  /usr/sbin/set_parms initial

考题 单选题Following a server crash, the automatic recovery of InnoDB fails. How would you begin to manually repair the InnoDB tables?()A Start the server with the – innodb_recover_options option set to FORCEB Start the server with the – innodb_force_recovery option set to a non-zero valueC Start the server as usual, and then execute the REPAIR TABLE commandD Start the server as usual, and then execute the CHECK TABLE command

考题 单选题VLAN 3 is not yet configured on your switch.What happens if you set the switchport access vlan 3 commmand interface configuration mode?()A The command is accepted and the respective VLAN is added to vlan dat.B The command is rejected.C The command is accepted and you must configure the VLAN manually.D The port turns amber.

考题 单选题You want to drop the TBS1 tablespace from your database.  You also want to delete the corresponding data files automatically, and not have to do it manually.  What should you do?()A Use the DROP DATAFILE command.B Use the DROP TABLESPACE command.C Ensure that all database files are Oracle Managed Files before using the DROP TABLESPACE command.D Ensure that the DB_FILE_CREATE_DEST initialization parameter is set before using the DROP TABLESPACE command.

考题 多选题To manually configure the SGA components using Oracle Enterprise Manager Memory Advisor, you can set values for which of the following initialization parameters?()ADB_CACHE_SIZEBSHARED_POOL_SIZECLARGE_POOL_SIZEDJAVA_POOL_SIZEESGA_MAX_SIZEFSORT_AREA_SIZE

考题 多选题As a network engineer, you responsibility is to install, configure, operate, and troubleshoot networks. In your company’s network, EIGRP is the routing protocol. You have just discovered that two routers restarted the neighbor relationship.Why? ()AAn update packet with init flag set from a known, already established neighbor relationship was received by one of the routers.BThe counters were deleted.CThe ARP cache was removed.DThe IP EIGRP neighbor relationship was cleared manually.

考题 单选题You install a wireless router and disable the Service Set Identifier (SSID) broadcast feature. You need to configure your computer to connect to the wireless network.  What should you do? ()A Click the Connect to a network link, right-click the appropriate network, and then click the Connect option.B Click the View computers and devices link, right-click the wireless router, and then click the Enable option.C Click the Set up a connection or network link, and then click the Set up a wireless Ad hoc network option.D Click the Set up a connection or network link, and then click the Manually connect to a wireless network option.

考题 多选题You set the following parameters in the parameter file and restarted the database:MEMORY_MAX_TARGET=0MEMORY_TARGET=500M PGA_AGGREGATE_TARGET=90MSGA_TARGET=270M Which two statements are true about these parameters after the database instance is restarted()AThe MEMORY_MAX_TARGET parameter is automatically set to 500 mb.BThe pga_AGGREGATE_TARGET and sga_TARGET parameters are automatically set to zero.CThe value of the MEMORY_MAX_TARGET parameter remains zero until it is changed manually.DThe lower bounds of pga_AGGREGATE_TARGET and sga_TARGET parameters are set to 90 nb and270 mb, respectively

考题 单选题In the access log,what does an ACL tag beginning with BLOCK_ADMIN indicate?()A  the destination was manually added to the block listB  the malware category is set to blocking modeC  the transaction was blocked because of application or object propertiesD  the transaction was manually blocked by the administrative user

考题 单选题You run the following commands:   RMAN list expired backup; RMAN delete expired backup;   What will happen to the backup set pieces associated with the backups that appear in the list expired backup command?()A  They will be renamed.B  Nothing will happen to them. The backup set pieces do not exist.C  They will be deleted immediately since they are not in the flash recovery area.D  You will need to manually remove the physical files listed in the output of the commands.E  They will become hidden files and removed 10 days later.

考题 单选题VLAN 3 is not yet configured on your switch. What happens if you set the switchport access vlan3 commmand interface configuration mode?()A The command is accepted and the respective VLAN is added to vlan dat.B The command is rejected.C The command is accepted and you must configure the VLAN manually.D The port turns amber.