网友您好, 请在下方输入框内输入要搜索的题目:
题目内容
(请给出正确答案)
单选题
Which of the following environment variables specifies a non-default location for the listener configuration file?()
A
LSN_ADMIN
B
TNS_ADMIN
C
ADMIN_TNS
D
TSN_ADMIN
参考答案
参考解析
解析:
暂无解析
更多 “单选题Which of the following environment variables specifies a non-default location for the listener configuration file?()A LSN_ADMINB TNS_ADMINC ADMIN_TNSD TSN_ADMIN” 相关考题
考题
Given the following router output,which configuration file will the router use at its next reload?()
A.configB.clientqos.cnfC.startup-configD.running-configuration
考题
You are the Database Administrator (DBA) of your company. You execute the following statement on an Oracle 10g instance: SQL ALTER SYSTEM SWITCH LOGFILE; Which two tasks are performed when the statement is executed? ()A、 The DBWn process writes to the datafile.B、 Changes in the background process are recorded.C、 The log file is updated with the current SCN number.D、 The System Change Number (SCN) is recorded in the control file.E、 The changes to the listener configuration in the listener.ora file are recorded.
考题
When you use the Oracle Net Configuration Assistant to specify the naming method, which file is updated?()A、INIT.ORAB、SQLNET.ORAC、LISTENER.ORAD、TNSNAMES.ORA
考题
Which statement correctly describes the change tracking writer (CTWR) background process?()A、 It keeps track of changes in the background processes.B、 It records the system change number (SCN) in the control file.C、 It writes audit records for user changes to the change tracking file.D、 It records any changes to the listened configuration in the listener.ora file.E、 It records any changes to the database parameters in the change tracking file.F、 It records the physical location of all the changes that are made to the database in the change tracking file.
考题
Which of the following specifies a set of consistent requirements for a workstation or server?()A、Vulnerability assessmentB、Imaging softwareC、Patch managementD、Configuration baseline
考题
Which of the following tools is used to report the location of logical partitions of a file system on a physical volume?()A、 lsfsB、 iostatC、 lslv -pD、 lsvg -p
考题
In a DNS environment, the zone file that maps hostnames to IP address (sometimes called the named.hosts file), is created on which of the following servers?()A、CacheB、PrimaryC、SecondaryD、Primary and secondary
考题
A user would like their shell prompt to reflect the current directory. Which of the following environment variables can be set to accomplish this?()A、PS1B、PATHC、PROMPTD、LOCPATH
考题
You execute the following statement in a Microsoft Windows environment. There are no conflicts in the path name definitions. C: /> mysqld – install Mysql56 – defaults – file = C :/my –opts.cnf What is the expected outcome?()A、Mysql is installed as the Windows service name Mysql56, and uses c: /my-opts.cnf as the configuration fileB、An error message is issued because – install is not a valid option for mysqldC、A running Mysql 5.6 installation has its runtime configuration updated with the server variables set in c: /my-opts.cnfD、Mysqld acts as an MSI installer and installs the Mysql 5.6 version, with the c: /my-opts.cnf configuration file
考题
Which of the following files can be used to configure connection pooling in the shared server environment?()A、INIT.ORAB、SQLNET.ORAC、TNSNAMES.ORAD、SERVICES.ORAE、LISTENER.ORA
考题
The listener has shut down unexpectedly. You want to view the listener log file and listener trace file to find the cause of the problem. How can you view the contents of the listener log file and the listener trace file?()A、 Open the file at the location specified by the BACKGROUND_DUMP_DEST parameter in the pfile.B、 Open the file at the location specified by the USER_DUMP_DEST parameter in the pfile.C、 Issue the SERVICES command at the LSNRCTL prompt.D、 Issue the STATUS command at the LSNRCTL prompt.
考题
Which of the following environment variables specifies a non-default location for the listener configuration file?()A、LSN_ADMINB、TNS_ADMINC、ADMIN_TNSD、TSN_ADMIN
考题
Anyone who knows just the host name and the listener name can have full control over the listener. They can stop the listener and also obtain detailed information about the listener, database, and the configuration of the application. How would you avoid this scenario?()A、lock the listenerB、hide the listenerC、create multiple listenersD、run listener on a remote clientE、set a password for the listenerF、store listener.ora in a non-default location
考题
You are maintaining the database of a company. The listener process, listener1, is configured for remote access. You have issued the following command: LSNRCTLSTATUS listener1 Which information will NOT be displayed when you issue the above command?() A、 whether the password is set in the listener or a file or notB、 the number of client connections the service handler has refusedC、 the information will be displayed whether the instance can accept connections or notD、 the protocol addresses on which the listener is configured to listen
考题
Which of the following file should be configured for dynamic service registration?()A、LISTENER.ORAB、SQLNET.ORAC、INIT.ORAD、TNSNAMES.ORA
考题
单选题Which of the following tools is used to report the location of logical partitions of a file system on a physical volume?()A
lsfsB
iostatC
lslv -pD
lsvg -p
考题
单选题Which statement correctly describes the change tracking writer (CTWR) background process?()A
It keeps track of changes in the background processes.B
It records the system change number (SCN) in the control file.C
It writes audit records for user changes to the change tracking file.D
It records any changes to the listened configuration in the listener.ora file.E
It records any changes to the database parameters in the change tracking file.F
It records the physical location of all the changes that are made to the database in the change tracking file.
考题
单选题The listener has shut down unexpectedly. You want to view the listener log file and listener trace file to find the cause of the problem. How can you view the contents of the listener log file and the listener trace file?()A
Open the file at the location specified by the BACKGROUND_DUMP_DEST parameter in the pfile.B
Open the file at the location specified by the USER_DUMP_DEST parameter in the pfile.C
Issue the SERVICES command at the LSNRCTL prompt.D
Issue the STATUS command at the LSNRCTL prompt.
考题
单选题In a DNS environment, the zone file that maps hostnames to IP address (sometimes called the named.hosts file), is created on which of the following servers?()A
CacheB
PrimaryC
SecondaryD
Primary and secondary
考题
单选题Given the following router output,which configuration file will the router use at its next reload?()A
configB
clientqos.cnfC
startup-configD
running-configuration
考题
单选题Which modifier is used to change listener parameters in the Listener Control utility environment?()A
SETB
ALTERC
CHANGED
UPDATE
考题
单选题You execute the following statement in a Microsoft Windows environment. There are no conflicts in the path name definitions. C: /> mysqld – install Mysql56 – defaults – file = C :/my –opts.cnf What is the expected outcome?()A
Mysql is installed as the Windows service name Mysql56, and uses c: /my-opts.cnf as the configuration fileB
An error message is issued because – install is not a valid option for mysqldC
A running Mysql 5.6 installation has its runtime configuration updated with the server variables set in c: /my-opts.cnfD
Mysqld acts as an MSI installer and installs the Mysql 5.6 version, with the c: /my-opts.cnf configuration file
考题
单选题You are maintaining the database of a company. The listener process, listener1, is configured for remote access. You have issued the following command: LSNRCTLSTATUS listener1 Which information will NOT be displayed when you issue the above command?()A
whether the password is set in the listener or a file or notB
the number of client connections the service handler has refusedC
the information will be displayed whether the instance can accept connections or notD
the protocol addresses on which the listener is configured to listen
考题
单选题Anyone who knows just the host name and the listener name can have full control over the listener. They can stop the listener and also obtain detailed information about the listener, database, and the configuration of the application. How would you avoid this scenario?()A
lock the listenerB
hide the listenerC
create multiple listenersD
run listener on a remote clientE
set a password for the listenerF
store listener.ora in a non-default location
考题
单选题A user would like their shell prompt to reflect the current directory. Which of the following environment variables can be set to accomplish this?()A
PS1B
PATHC
PROMPTD
LOCPATH
考题
单选题Because of changes in an application environment, the /etc/inittab file needs to be modified. Which of the following commands would be used to accomplish this in a supported manner()A
viB
chitabC
chssysD
chrsrc
考题
多选题You are the Database Administrator (DBA) of your company. You execute the following statement on an Oracle 10g instance: SQL ALTER SYSTEM SWITCH LOGFILE; Which two tasks are performed when the statement is executed? ()AThe DBWn process writes to the datafile.BChanges in the background process are recorded.CThe log file is updated with the current SCN number.DThe System Change Number (SCN) is recorded in the control file.EThe changes to the listener configuration in the listener.ora file are recorded.
考题
单选题Which of the following environment variables specifies a non-default location for the listener configuration file?()A
LSN_ADMINB
TNS_ADMINC
ADMIN_TNSD
TSN_ADMIN
热门标签
最新试卷