网友您好, 请在下方输入框内输入要搜索的题目:

题目内容 (请给出正确答案)

You require the Oracle server to manage the undo segments and space among various active sessions automatically. You created an undo tablespace, UNDO_TBS1, in your database. Which two additional steps would you perform to achieve this?()

  • A、Set the UNDO_RETENTION parameter to 900 or more.
  • B、Create an initial undo segment in the undo tablespace.
  • C、Enable the retention guarantee for the undo tablespace.
  • D、Set the UNDO_TABLESPACE parameter to UNDO_TBS1.
  • E、Set the UNDO_MANAGEMENT initialization parameter to AUTO.

参考答案

更多 “You require the Oracle server to manage the undo segments and space among various active sessions automatically. You created an undo tablespace, UNDO_TBS1, in your database. Which two additional steps would you perform to achieve this?()A、Set the UNDO_RETENTION parameter to 900 or more.B、Create an initial undo segment in the undo tablespace.C、Enable the retention guarantee for the undo tablespace.D、Set the UNDO_TABLESPACE parameter to UNDO_TBS1.E、Set the UNDO_MANAGEMENT initialization parameter to AUTO.” 相关考题
考题 We sell insurance cover your payment () will depend on the cover you require. A、feeB、fareC、charge

考题 You () necessary amendment to the L/C and advise us by telex before Friday.A、are requested to makeB、require to makeC、are requesting to makeD、are requested of making

考题 In which two situations should you run the command sync group?() (Choose two.) A. when you enable Unified FailoverB. when you create an ActiveN groupC. when you synchronize the sticky tableD. when you require synchronization of the 3G Cache objects

考题 You share your computer with other users. You install a new Microsoft add-on to view videos on the computer. You discover that this add-on conflicts with existing add-ons that other users frequently require.You need to ensure that you are able to view videos without affecting other users.What should you do?()A.AB.BC.CD.D

考题 Don’t worry if you don’t understand everything.The teacher will ______ the main points at the end.A. recover B. review C. require D. remember

考题 Letter “Q” means “()”.A、Man overboardB、You are running into dangerC、My vessel is healthy.D、I require a pilot.

考题 You are working as a DBA at NetFx Corporation. You discover that the SCOTT schema is deleted by mistake. You decide to flash the database back to the time when the schema existed. Which view will you query to determine the estimated size of the flashback data that you require for your current target retention?()A、 V$FLASHBACK_DATABASE_LOGB、 V$FLASHBACK_DATABASE_STATC、 V$DATABASED、 V$UNDOSTAT

考题 You have created an ASP.NET server control named Shopping Cart for use by other developers. Some developers report that the Shopping Cart control does not function properly with ViewState disabled. You want to ensure that all instances of the Shopping Cart control work even if View State is disabled. What should you do?()A、Require developers to set EnableViewStateMac to true.B、Store state in ControlState instead of ViewState.C、Serialize the state into an Application state entry called "MyControl".D、Require developers to change the session state mode to SQLServer.

考题 You need to design an access control strategy for the marketing application. You solution must minimize impact on server and network performance. What should you do?()A、Require client computers to connect to the marketing application by using a VPN connectionB、Use IPSec to encrypt communications between the servers in the New York and Atlanta officesC、Require the high security setting on Terminal Services connections to the marketing applicationD、Configure all marketing application Web pages to require SSL

考题 You need to design a method to allow the new-ideas-testking.com Web site to function in accordance with security and business requirements.  What should you do?()A、Require a PPTP VPN for all connections to the Web serverB、Require that traffic between Web browsers and the Web server uses an L2TP/IPSec tunnelC、Require that traffic between Web browsers and the Web server uses SSLD、Require certificate mappings between the Web server and Active Directory

考题 You need to design a security strategy for the Web folders and files created by the consultants and the internal Web developers. What are two possible ways to achieve this goal?()A、Require the internal Web developers to use Telnet with Kerberos authentication. Require the consultants to use L2TP with IPSecB、Require the internal Web developers to use Encrypting File System (EFS) over Web Distributed Authoring and Versioning (WebDAV). Require the consultants to use Microsoft.NET Passport authentication with Security Level 0C、Require the internal Web developers to use Web Distributed Authoring and Versioning (WebDAV) over SSL.Require the consultants to use WebDAV over SSLD、Require the internal Web developers to use L2TP with IPSec. Require the consultants to use Encrypting File System (EFS) over Web Distributed Authoring and Versioning (WebDAV)E、Require the internal Web developers to use Web Distributed Authoring and Versioning (WebDAV) over SSL.Require the consultants to use L2TP with IPSec

考题 Your portable computer is in sleep mode. When you resume work on the portable computer, you are not prompted for a password.  You need to ensure that you are prompted for a password each time the portable computer recovers from sleep mode.  What should you do?()A、Configure the computer to hibernate when not in use.B、In the current power plan settings, configure the computer to require a password when recovering from sleep mode.C、Configure the computer to use the High Performance power plan.D、Configure the screen saver settings to require a password on resumption of work.

考题 You have two stand-alone servers that run Windows Server 2003 Service Pack 2 (SP2). You assign the Secure Server (Require security) IPSec policy to both servers. From Server1, you notice that you cannot access resources on Server2. You need to ensure that you can access resources on Server2. All communications between Server1 and Server2 must be encrypted.  What should you do?()A、On Server1, assign the Client (Respond only) IPSec policy.B、On Server2, assign the Server (Request Security) IPSec Policy.C、On Server1 and Server2, modify the authentication settings in the Secure Server (Require security) IPSec Policy.D、On Server1 and Server2, enable Master Key perfect forward secrecy (PFS) in the Secure Server (Require security) IPSec Policy.

考题 You need to recommend a solution for managing App1. The solution must require the minimum  amount of administrative effort.What should you include in the recommendation?()A、Group Policy Administrative TemplatesB、Group Policy PreferencesC、Group Policy Software SettingsD、Windows Remote Management (WinRM)

考题 You need to design a security strategy for a remote e-mail access. What should you do?()A、Require remote users to access e-mails by using Outlook Mobile AccessB、Require Outlook Web Access users to install the secure MIME ActiveX-Control and to encrypt all messagesC、On Outlook Web Access servers that accept connections from the Internet configure IIS to require SSL for all connectionsD、On Outlook Web Access servers that accept connections from the Internet configure IIS to require Integrated Windows Authentication

考题 You need to design a method to encrypt confidential data. Your solution must address the concerns of the chief information officer. What should you do?()A、Encrypt customer information when it is stored and when it is being transmittedB、Require encrypted connections to the public Web site, which is hosted on the Web server on the perimeter networkC、Encrypt all marketing information on file servers and client computersD、Require encrypted connections to all file servers

考题 You are planning an upgrade strategy for a Windows Azure application.  You need to identify changes that will require application downtime.  Which change will always require downtime?()A、 Changing the virtual machine sizeB、 Adding an HTTPS endpoint to a web roleC、 Changing the value of a configuration settingD、 Upgrading the hosted service by deploying a new package

考题 You need to design access to e-mail by Internet users. What should you do?()A、Configure front-end servers to use HTTP to communicate with back-end serversB、Configure the internal firewall to allow IPSec traffic between front-end and back-end Exchange serversC、Require all users to encrypt all outbound e-mail messagesD、Issue digital certificates to all remote users. Require the certificates to be used when authenticating to Outlook Web Access

考题 单选题You are working as a DBA at NetFx Corporation. You discover that the SCOTT schema is deleted by mistake. You decide to flash the database back to the time when the schema existed. Which view will you query to determine the estimated size of the flashback data that you require for your current target retention?()A  V$FLASHBACK_DATABASE_LOGB  V$FLASHBACK_DATABASE_STATC  V$DATABASED  V$UNDOSTAT

考题 多选题You are designing a service that will use the Windows Azure AppFabric Service Bus.  You need to recommend an approach for controlling access to the service by using the Windows Azure AppFabric Access Control Service. Which two actions should you recommend?()AConfigure the service to not require authentication.BConfigure the service to require a relay access token.CSpecify message security for all communications between clients and the service.DSpecify transport security for allcommunications between clients and the service.

考题 单选题We will agree to do what you require_______him.A ofB fromC toD for

考题 多选题In which two situations should you run the command sync group?() (Choose two.)Awhen you enable Unified FailoverBwhen you create an ActiveN groupCwhen you synchronize the sticky tableDwhen you require synchronization of the 3G Cache objects

考题 单选题You have two stand-alone servers that run Windows Server 2003 Service Pack 2 (SP2). You assign the Secure Server (Require security) IPSec policy to both servers. From Server1, you notice that you cannot access resources on Server2.You need to ensure that you can access resources on Server2. All communications between Server1 and Server2 must be encrypted. What should you do?()A On Server1, assign the Client (Respond only) IPSec policy. B On Server2, assign the Server (Request Security) IPSec Policy. C On Server1 and Server2, modify the authentication settings in the Secure Server (Require security) IPSec Policy. D On Server1 and Server2, enable Master Key perfect forward secrecy (PFS) in the Secure Server (Require security) IPSec Policy. 

考题 多选题You are designing the Active Directory site topology to meet the business and technical requirements.  Which site or sites will require universal group membership caching?()ANew YorkBMontrealCQuebecDSan FranciscoESeattleFVancouver

考题 单选题You are planning an upgrade strategy for a Windows Azure application.  You need to identify changes that will require application downtime.  Which change will always require downtime?()A  Changing the virtual machine sizeB  Adding an HTTPS endpoint to a web roleC  Changing the value of a configuration settingD  Upgrading the hosted service by deploying a new package

考题 单选题Your portable computer is in sleep mode. When you resume work on the portable computer, you are not prompted for a password.  You need to ensure that you are prompted for a password each time the portable computer recovers from sleep mode.  What should you do?()A Configure the computer to hibernate when not in use.B In the current power plan settings, configure the computer to require a password when recovering from sleep mode.C Configure the computer to use the High Performance power plan.D Configure the screen saver settings to require a password on resumption of work.

考题 单选题You intend to discharge medical or hazardous wastes ashore MARPOL annex V requires you to notify a receiving port or terminal in advance.How much advance notice require?()A 12 hoursB 24 hoursC 48 hoursD Advance notification is not required

考题 单选题You are loading a new assembly into an application. You need to override the default evidence for the assembly. You require the common language runtime (CLR) to grant the assembly a permission set,as if the assembly were loaded from the local intranet zone.  You need to build the evidence collection. Which code segment should you use?()A AB BC CD D