网友您好, 请在下方输入框内输入要搜索的题目:

题目内容 (请给出正确答案)
A ()is a copy of a file for use in the event of failure or loss of the original.

A.second storage

B.buffer

C.backup

D.database


参考答案

更多 “ A ()is a copy of a file for use in the event of failure or loss of the original. A.second storageB.bufferC.backupD.database ” 相关考题
考题 Which of the following utilities would a technician use to prevent a service from starting duringsystem startup?() A. Event ViewerB. System File CheckerC. MSCONFIGD. Task Manager

考题 You are the network administrator for The network consists of asingle Active Directory domain named All domain controllers runWindows Server 2003, and all client computers run Windows XP Professional. Eachdomain server has a locally attached tape device.You need to back up each domain controller. Your backup process must fulfil thefollowing requirements:a. System recovery must be possible in the event of server failure.b. The system configuration and all current dynamic disk configurations must bebacked up.c. Other data partitions do not need to be backed up.What should you do?()A. Use the Backup utility to back up the system files and to create an Automated System Recovery (ASR) disk.B. Use the Backup utility to back up the contents of all mounted drives.C. Use the Backup utility to back up only the System State data.D. Use the Copy command to copy C:\windows and its subfolders to a shared folder on the network.E. Use the Xcopy command to copy C:\windows and its subfolders to a shared folder on the network.

考题 You are the network administrator for the Berlin office of The company network consists of a single Active Directory domain named The Berlin office contains 15 file servers that contain confidential files. All the fileservers run either Windows Server 2003 or Windows 2000 Server. All the file servers are in the BerlinFilePrint organizational unit (OU).TestKing‘s security department sets a rule that specifies the size and retention settings for the Security event log of all file servers. The rule also specified that local administrators on servers cannot override the changes you make to the settings for the Security event log.You need to define a method to modify the Security event log settings on each file server in the Berlin office in order to meet the states requirements.What should you do?()A. Modify the local security policy on each file server.Define the size and retention settings for the Security event log.B. Create a security template on one of the file servers by using the Security Configuration and Analysis tool. Define the size and retention settings for the Security event log in the template. Import the security template into the local security policy of the other 14 file servers.C. Use Event Viewer to modify the event log properties on each file server. Define the size and retention settings for the Security event log.D. Create a new Group Policy object (GPO) and link it to the BerlinFilePrint OU. In the GPO, define the size and retention settings for the Security event log.

考题 Which  kinds of failures make the Data Recovery Advisor (DRA) generate a manual checklist?()A、Failure when no standby database is configuredB、Failure because a data file is renamed accidentallyC、Failure that requires no archive logs to be applied for recoveryD、Failure due to loss of connectivity-for example, an unplugged disk cable

考题 You have discovered that one of three control files has been lost. What steps would you follow to recover that control file?()   a. Shut down the database.  b. Restore a control-file copy from backup media.  c. Use the create control file command to create a new control file.  d. Copy the backup control file into place.  e. Create a new copy of the control file from one of the surviving control files.  f. Recover the database using the recover database using backup control file command.  g. Start up the database. A、a, b, f, gB、c, f, gC、a, d, f, gD、a, f, gE、a, e, g

考题 You have a stand-alone computer that runs Windows XP Professional. Five users use the computer. Each user has a local user account. The user accounts are member of only the Users group. You need to share a document between all users of the computer. What should you do?() A、Copy the file to the Shared Documents folder. B、Copy the file to the My Documents folder of the local administrator. C、Copy the file to the %SystemRoot%/CSC folder. Add all user accounts to the guests group.D、Enable Offline File and Folder Caching. Copy the file to the %SystemRoot%/CSC folder.

考题 A program configuration file on a shared computer changes each time the program is run, causing the program to fail. Which of the following steps could a technician take to help prevent this file from being changed?()A、Set the group’s folder permissions to deny.B、Use Event Viewer to monitor changes to the file.C、Store a backup copy of the file on a USB drive.D、Change the file attribute to read only.

考题 失效时间failure event

考题 A folder on your Windows 2000 Professional computer contains bitmap files that have been compressed from 2MB to 1MB.  You want to copy one of the compressed bitmap files from the hard disk to 1.4-MBfloppy disk. When you attempt to copy, you receive the following error message ‘Destination drive is Full’.  What should to do?()A、Move, rather than copy, the compressed bitmap file to the floppy disk.B、Reformat the floppy disk.Then copy the compressed bitmap file to the floppy disk.C、Use another program to compress the bitmap file before copying it to the floppy disk.D、Copy an empty compressed folder to the floppy disk. Then copy the compressed bitmap file to the folder on the floppy disk.

考题 新建一个表JSNEW.DBF,其结构与表JS.DBF的结构完全相同,但记录不同,比较方便的建库命令是()A、USE JS COPY TO JSNEWB、USE JS COPY STRU TO JSNEWC、COPY FILE JS.DBF TO JSNEW.DBFD、CREAT JSNEW FROM JS

考题 Which of the following can help prevent data loss on a RAID array in the event of a power failure?()A、Using a RAID mirrorB、A battery backed write cacheC、Using RAID with parityD、A battery backed read cache

考题 Which of the following utilities would a technician use to prevent a service from starting duringsystem startup?()A、Event ViewerB、System File CheckerC、MSCONFIGD、Task Manager

考题 tony wants to create a duplicate of the video application. He wants to keep a version of the data on the same server as the production application but does not want any new documents or documents modifications to be replicated into his new database once he creates it. Which one of the following should tony do to create his archive?()A、create a new copy of the databaseB、create a replica of the databaseC、Use the windows explorer to create a copy of the database file.D、Create a replica copy of the database and disable replication on the database file.

考题 Which installation method enables the quickest recovery in the event of failure when upgrading from AIX 5.3 to AIX 6.1?()A、Use alt_disk_install.B、Apply the upgrade without commit.C、Use a backup image from a NIM server.D、Use a mksysb image from a locally attached DVD-RAM.

考题 A customer has downloaded new firmware files for the IBM support Web Site. Which of the following is the correct method for updating the firmware for the QLogic Intelligent Passthru Module using the command line?()A、Transfer the file to the FC module using FTP; use Telnet to the FC module to start the updateB、Use Telnet to the AMM to transfer the file using TFTP; start the updateC、Transfer the file to the FC module using Secure Copy Protocol (SCP);use Telnet to the FC module to start the updateD、Start the update and enter FC module IP address when prompted

考题 Which two kinds of failures make the Data Recovery Advisor (DRA) generate a manual checklist()A、failure when no standby database is configuredB、failure because a data file is renamed accidentallyC、failure that requires no archive logs to be applied for recoveryD、failure due to loss of connectivity-for example, an unplugged disk cable

考题 Last night, a media failure caused the loss of a temporary file that belongs to your database. Which two things may happen this morning when you try to open your database?()A、 The database writer writes to a trace file, indicating that the temporary file is not found.B、 The database prompts for a database recovery.C、 The database opens normally.D、 The database gets mounted and throws an error indicating that the temporary file requires recovery.

考题 Your database is having two control files, three redo log file groups with two members in each group. Failure of which file would cause an instance to shut down?()A、any control fileB、any archive log fileC、one of the redo log membersD、loss of the initialization parameter fileE、any data file belonging to the default permanent tablespac

考题 You are the network administrator for The network consists of a single Active Directory domain named All domain controllers run Windows Server 2003, and all client computers run Windows XP Professional. Each domain server has a locally attached tape device. You need to back up each domain controller. Your backup process must fulfil the following requirements: a. System recovery must be possible in the event of server failure. b. The system configuration and all current dynamic disk configurations must be backed up. c. Other data partitions do not need to be backed up. What should you do?()A、Use the Backup utility to back up the system files and to create an Automated System Recovery (ASR) disk.B、Use the Backup utility to back up the contents of all mounted drives.C、Use the Backup utility to back up only the System State data.D、Use the Copy command to copy C:/windows and its subfolders to a shared folder on the network.E、Use the Xcopy command to copy C:/windows and its subfolders to a shared folder on the network.

考题 You are the network administrator for your company. The network consists of a single Active Directory domain. All domain controllers run Windows Server 2003, and each one has a locally attached tape device. You need to back up each domain controller. Your backup process must fulfill the following requirements: System recovery must be possible in the event of server failure. The system configuration and all current dynamic disk configurations must be backed up. Other data partitions do not need to be backed up. What should you do?()A、Use the Backup utility to back up the system files and to create an Automated System Recovery (ASR) disk.B、Use the Backup utility to back up the contents of all mounted drives.C、Use the Backup utility to back up only the System State data.D、Use the Copy command to copy C:/windows and its subfolders to a shared folder on the network.E、Use the Xcopy command to copy C:/windows and its subfolders to a shared folder on the network.

考题 单选题You are a database administrator for your company. The company uses a SQL Server 2005 database. A full backup of the database is made each night. Transaction log backups are made each morning and each afternoon. You notice that the database transaction log file grows very large throughout the day. You need to minimize the size of the transaction log file. You also need to minimize data loss in the event of a failure. What should you do?()A Decrease the amount of time between transaction log backups.B Configure the database to use the simple recovery model.C Configure the RECOVERY INTERVAL option to be a smaller value.D Run DBCC SHRINKFILE on the transaction log file.

考题 单选题Which of the following can help prevent data loss on a RAID array in the event of a power failure?()A Using a RAID mirrorB A battery backed write cacheC Using RAID with parityD A battery backed read cache

考题 单选题You need to record package and task outcome in the ETLAudit table. Which components of SSIS should you use?()A Custom event handlersB Data flow error outputC SSIS log provider for SQL ServerD Execute SQL tasks with failure precedence constraints

考题 单选题Windows Communication Foundation (WCF) service will be hosted in Microsoft Internet Information Services (IIS).You create a new application in IIS to host this service and copy the service DLL to the bin directory of the application.You need to complete the deployment of this service to IIS. What should you do next?()A Create an asmx file and add a @ServiceHost directive to this file. Copy the file to the root of the application directory.B Create an .asmx file and add a @Register directive to this file. Copy the file to the bin directoyy of the application.C Create a svc file and add a @ServiceHost directive to this file. Copy the file to the root of the application directory.D Create a .svc file and add a @Register directive to this file. Copy the file to the bin directory of the application.

考题 单选题ou are implementing control file multiplexing. Which of the following choices identifies the method you can use in order to generate the control file copies that Oracle will maintain?()A Issue ALTER DATABASE BACKUP CONTROLFILE TO filenameB Make a copy of the control file with the database shut downC Issue ALTER DATABASE BACKUP CONTROLFILE TO traceD Make a copy of the control file with the database still running 

考题 多选题Last night, a media failure caused the loss of a temporary file that belongs to your database. Which two things may happen this morning when you try to open your database? ()AThe database opens normally.BThe database prompts for a database recovery.CThe database writer writes to a trace file, indicating that the temporary file is not found.DThe database gets mounted and throws an error indicating that the temporary file requires recovery.

考题 单选题A program configuration file on a shared computer changes each time the program is run, causing the program to fail. Which of the following steps could a technician take to help prevent this file from being changed?()A Set the group’s folder permissions to deny.B Use Event Viewer to monitor changes to the file.C Store a backup copy of the file on a USB drive.D Change the file attribute to read only.