网友您好, 请在下方输入框内输入要搜索的题目:

题目内容 (请给出正确答案)

After creating backups of critical system and user data, which of the following is the BEST location to store the backups?()

  • A、In the supply closet so anyone can access them if needed
  • B、Near the server for easy access to restore files
  • C、Locked in a cabinet in the IT Manager’s office
  • D、At a secure off-site storage facility

参考答案

更多 “After creating backups of critical system and user data, which of the following is the BEST location to store the backups?()A、In the supply closet so anyone can access them if neededB、Near the server for easy access to restore filesC、Locked in a cabinet in the IT Manager’s officeD、At a secure off-site storage facility” 相关考题
考题 Which two are true regarding MySQL binary and text backups?() A.Binary backups are usually faster than text backupsB.Binary backups are usually slower than text backupsC.Text backups are human-readable while binary backups are notD.Binary backups are not portable across different operating systems

考题 After a collision or accident involving an uninspected vessel,regulations require that the operator assist persons affected,but only if the operator can do so without ______.A.further damaging the other vesselB.undue delayC.serious danger to his or her own vesselD.creating a panic on either vessel

考题 A.a protector B.a judge C.a critic D.a guide

考题 Which two statements are true regarding the database in ARCHIVELOG mode?()A、You have to shut down the database to perform the backups.B、Archiving information is written to the data files and redo log files.C、You can perform complete database backups without closing the database.D、Online redo log files have to be multiplexed before putting the database in ARCHIVELOG mode.E、All the previous database backups become invalid after you configure the database to ARCHIVELOG mode.

考题 You are managing an Oracle Database 11g database. The database is open, and you plan to perform Recovery Manager (RMAN) backups.  Which three statements are true about these backups()A、The backups would be consistent.B、The backups would be inconsistent.C、The backups would be possible only if the database is running in ARCHIVELOG mode.D、The backups would be possible only if the database is running in NOARCHIVELOG mode.E、The backups need to be restored and the database has to be recovered in case of a media failure

考题 You issue the following RMAN command to set a retention policy on a database:       RMANCONFIGURE RETENTION POLICY TO REDUNDANCY 2;   What will be the outcome of the above command?()A、 After two days, the backup will be marked obsolete.B、 After two days, the backup will be deleted from the media.C、 If the RMAN repository has records of two or more recent backups of a file, then the older backup will be deleted from the media.D、 If the RMAN repository has records of two or more recent backups of a file, then the older backup will be marked obsolete.

考题 Which two statements are true about encrypting RMAN backup?()A、 The transparent encryption of backups uses the encryption walletB、 The database uses the same encryption key for every encrypted backupC、 The password encryption of backups only uses the password while creating and restoring backupD、 If transparent encryption is configured, you cannot use the SET ENCRYPTION BY PASSWORD command to make password-protected backups

考题 To enable faster incremental backups, you enabled block change tracking for the database. Which two statements are true about the block change tracking file?() A、 Multiple change tracking files can be created for a database.B、 The change tracking file must be created after the first level 0 backup.C、 RMAN does not support backup and recovery of the change tracking file.D、 The database clears the change tracking file and starts tracking changes again,after whole database restore and recovery operations.

考题 You issue the following RMAN command to set a retention policy on a database: RMANCONFIGURE RETENTION POLICY TO REDUNDANCY 2; What will be the outcome of issuing this command? ()A、After two days, a backup will be marked obsoleteB、After two days, a backup will be deleted from the mediaC、If the RMAN repository has records of two or more recent backups of a file, then older backups will be deleted from the media.D、If the RMAN repository has records of two or more recent backups of a file, then older backups will be marked obsolete.

考题 单选题You are maintaining your database in Oracle10g. You want to store the information about the backup of the database in the control file. You issue the following statement:    SQLALTER SYSTEM SET CONTROL_FILE_RECORD_KEEP_TIME=400;    What is the outcome of this statement? ()A  The statement will not execute successfully.B  The statement will execute successfully, and the backups metadata will be maintained in the control file for 400 daysC  The statement will execute successfully, and the backups metadata will be maintained in the recovery catalog for 400 days.D  Backups will be deleted from the media after 400 days.

考题 单选题You issue the following RMAN command to set a retention policy on a database:   RMANCONFIGURE RETENTION POLICY TO REDUNDANCY 2;   What will be the outcome of issuing this command?()A  After two days,a backup will be marked obsoleteB  After two days,a backup will be deleted from the mediaC  If the RMAN repository has records of two or more recent backups of a file,then older backups will be deleted from the media.D  If the RMAN repository has records of two or more recent backups of a file then older backups will be marked obsolete.

考题 单选题You are employed as the exchange administrator at Company.com.the Company.com network contains an exchange 2010 organization.you are responsible for managing an exchange server 2010 mailbox server named -ex01.You are in the process of implementing a policy that deletes e-mail messages automatically after 60 days.You receive an instruction from management to identify another location where users can store their messages after 60 days.However, administrators need to locate the e-mail messages in both locations when executing multi- mailbox searches. What should you do?()A You should consider creating a Retention Policy.B You should consider creating a.pst file for each user that is stored in a shared folder.C You should consider creating a Personal Archive for each user.D You should consider creating a journal rule.

考题 单选题After creating backups of critical system and user data, which of the following is the BEST location to store the backups?()A In the supply closet so anyone can access them if neededB Near the server for easy access to restore filesC Locked in a cabinet in the IT Manager’s officeD At a secure off-site storage facility

考题 多选题Which two statements are true about encrypting RMAN backup?()AThe transparent encryption of backups uses the encryption walletBThe database uses the same encryption key for every encrypted backupCThe password encryption of backups only uses the password while creating and restoring backupDIf transparent encryption is configured, you cannot use the SET ENCRYPTION BY PASSWORD command to make password-protected backups.

考题 多选题You are managing an Oracle Database 11g database. You configured the database to run in ARCHIVELOGmode.  Which two statements are true in this scenario()AYou must shut down the database instance to perform the backups.BYou must configure the Flash Recovery Area (FRA) for the database.CYou can perform complete database backups without closing the database.DAll the previous closed database backups including control files become invalid after you configure thedatabase to ARCHIVELOG mode.

考题 单选题You issue the following RMAN command to set a retention policy on a database:       RMANCONFIGURE RETENTION POLICY TO REDUNDANCY 2;   What will be the outcome of the above command?()A  After two days, the backup will be marked obsolete.B  After two days, the backup will be deleted from the media.C  If the RMAN repository has records of two or more recent backups of a file, then the older backup will be deleted from the media.D  If the RMAN repository has records of two or more recent backups of a file, then the older backup will be marked obsolete.

考题 多选题Which two statements are true regarding the database in ARCHIVELOG mode?()AYou have to shut down the database to perform the backups.BArchiving information is written to the data files and redo log files.CYou can perform complete database backups without closing the database.DOnline redo log files have to be multiplexed before putting the database in ARCHIVELOG mode.EAll the previous database backups become invalid after you configure the database to ARCHIVELOG mode.

考题 单选题You are the network administrator for All servers run Windows Server 2003. You are creating a backup schedule for the main file server. You need to create a schedule so that backup jobs are completed in the shortest amount of time possible. What should you do?()A Schedule a normal backup every Sunday. Schedule incremental backups every Monday through Saturday.B Schedule a normal backup every Sunday. Schedule differential backups every Monday through Saturday.C Schedule a copy backup every day.D Schedule a normal backup every day.

考题 多选题Which two statements are true about encrypting RMAN backup?()AThe transparent encryption of backups uses the encryption walletBThe database uses the same encryption key for every encrypted backupCThe password encryption of backups only uses the password while creating and restoring backupDIf transparent encryption is configured, you cannot use the SET ENCRYPTION BY PASSWORD command to make password-protected backups

考题 单选题While setting up an Oracle database for one of your critical applications, you want to ensure that the database is backed up at regular intervals without your intervention.What should you do to achieve the objective?()A configure the database to run in ARCHIVELOG modeB configure the Flash Recovery Area to enable automatic database backupC schedule the database backup using DBMS_JOB package after creating the databaseD schedule the database backup using Recovery Manager (RMAN)commands after creating the databaseE schedule the database backup using Database Configuration Assistant (DBCA)while creating the database

考题 单选题Which of the following security features are enabled by default after creating an instance?()A Password InvalidationB Login TimeoutC Cross Site Scripting ProtectionD Access Logging

考题 单选题You are a database administrator for your company. Each night, you perform full backups of your SQL Server 2005 computer. During business hours, you perform hourly transaction log backups. You rebuild database indexes each night. You need to modify your backup strategy. You must ensure that the database recovers to a new server as quickly as possible. What should you do?()A Schedule the full backups to run after the nightly index is rebuilt.B Schedule the full backup to run before the nightly index is rebuilt. Schedule a differential backup to run after the nightly index is rebuilt.C Schedule an additional transaction log backup to run after the nightly index is rebuilt.D Schedule a marker to be added to the transaction log before the nightly index is rebuilt.

考题 多选题Which two are true regarding MySQL binary and text backups?()ABinary backups are usually faster than text backupsBBinary backups are usually slower than text backupsCText backups are human-readable while binary backups are notDBinary backups are not portable across different operating systems

考题 多选题You are managing an Oracle Database 11g database. The database is open, and you plan to perform Recovery Manager (RMAN) backups.  Which three statements are true about these backups()AThe backups would be consistent.BThe backups would be inconsistent.CThe backups would be possible only if the database is running in ARCHIVELOG mode.DThe backups would be possible only if the database is running in NOARCHIVELOG mode.EThe backups need to be restored and the database has to be recovered in case of a media failure

考题 多选题Which two statements are true about encrypting RMAN backup?() (Choose two.)AThe transparent encryption of backups uses the encryption walletBThe database uses the same encryption key for every encrypted backupCThe password encryption of backups only uses the password while creating and restoring backupDIf transparent encryption is configured, you cannot use the SET ENCRYPTION BY PASSWORD command to make password-protected backups.

考题 问答题After the theatre critic gave the experimental play an uniustifiably harsh review, he has been fired from the                                 A              B      Cnewspaper for failing to keep an open mind. No error         D               E

考题 多选题You are a network administrator for your company. The design team provides you with the following list of requirements for server disaster recovery:   No more than two sets of tapes can be used to restore to the previous day.  A full backup of each server must be stored off-site.   A full backup of each server that is no more than one week old must be available on-site.  Backups must never run during business hours.   Tapes may be recalled from off-site storage only if the on-site tapes are corrupted or damaged. A full backup of all servers requires approximately 24 hours. Backing up all files that change during one week requires approximately 4 hours. Business hours for the company are Monday through Friday, from 6:00 A.M. to 10:00 P.M.  You need to provide a backup rotation plan that meets the design team’s requirements.   Which two actions should you include in your plan?()APerform a full normal backup for on-site storage on Friday night after business hours. Perform a full copy backup for off-site storage on Saturday night after the Friday backup is complete.BPerform a full normal backup for on-site storage on Friday night after business hours. Perform another full normal backup for off-site storage on Saturday night after the Friday backup is complete.CPerform a full copy backup for on-site storage on Friday night after business hours. Perform a full copy backup for off-site storage on Saturday night after the Friday backup is complete.DPerform differential backups on Sunday, Monday, Tuesday, Wednesday, and Thursday nights after business hours.EPerform incremental backups on Sunday, Monday, Tuesday, Wednesday, and Thursday nights after business hours.FPerform incremental backups on Sunday, Tuesday, and Thursday nights after business hours. Perform differential backups on Monday and Wednesday nights after business hours.