网友您好, 请在下方输入框内输入要搜索的题目:
题目内容
(请给出正确答案)
About the 49 log steps: _______
参考答案和解析
familiar
更多 “About the 49 log steps: _______” 相关考题
考题
You are using replication and the binary log files on your master server consume a lot of disk space. Which two steps should you perform to safely remove some of the older binary log files?()
A.Use the command PURGE BINARY LOGS and specify a binary log file name or a date and time to remove unused filesB.Execute the PURGE BINARY LOGE NOT USED commandC.Remove all of the binary log files that have a modification date earlier than todayD.Edit the .index file to remove the files you want to deleteE.Ensure that none of the attached slaves are using any of the binary logs you want to delete
考题
By default, which command can be used to display information about packets that have been logged with the syslog firewall filter action?()
A. show logB. show firewallC. show log messagesD. show firewall log
考题
Which log contains information about service restarts, system errors, warnings, and requests to check server connectivity? ()
A. Events logB. System logC. User Access logD. Admin Access log
考题
Which statement about WSA access logs that are to be processed by sawmill for cisco ironport istrue?() A、 the default log format can be usedB、 the fields"%XC%X n" must be appended to the default access log formatC、 any log format can beused , but all WSAs must use the same formatD、 any log format can be used. And different WSAs may use different formats
考题
Which two statements are true about analog to digital conversion of voice signals for use in digital telephony networks?()A、The three required steps in the analog to digital conversion are sampling,encoding,and compression.B、The three required steps in the analog to digital conversion are sampling,quantization,and compression.C、The three required steps in the analog to digital conversion are sampling,quantization,and encoding.D、The output of the sampling process is a pulse code modulation (PCM) signal.E、The output of the sampling process is a pulse amplitude modulation (PAM) signal.
考题
Where do you find information about a missing redo log file?()A、trace fileB、audit trailC、control fileD、alert log fileE、event viewer
考题
Which statement is true about the digital to analog conversion process?()A、the two steps of digital to analog conversion are decompression and reconstruction of the analog signalB、the two steps of digital to analog conversion are decoding and filteringC、the two steps of digital to analog conversion are decompression and filtering of the analog signalD、the two steps of digital to analog conversion are quantization and decoding
考题
What is the FIRST and most important step in system troubleshooting?()A、back up the system dataB、gather information about the problemC、try rebooting the system to see if that fixes the problemD、check the System Error Log or Event Log
考题
You issued the following command: ALTER DATABASE ENABLE BLOCK CHANGE TRACKING; What will be the result of issuing this command?()A、 The block change tracking feature is enabled, and the information about the system change number is written in the change tracking file.B、 The block change tracking feature is enabled, and the information about the log sequence number is written in the change tracking file.C、 The block change tracking feature is enabled, and the information about the blocks that are changed since the last backup is written in the change tracking file.D、 The block change tracking feature is enabled, and the information about the locations of the datafiles and the online redo log files are written in the change tracking file.
考题
You are working on a database, where you have three redo log groups. When the database is down for a backup, an operating system (OS) user deletes all the redo log files in a group. What will happen when you open your database?()A、 The instance starts, the database is mounted, but efforts to open the database fail, and an error about the missing redo log group is displayed.B、 Before the instance starts, you receive an error about the missing redo log files of a group.C、 The instance starts and the database opens with an error message written to the alert log file.D、 The instance starts and the database opens because two redo log groups still exist.E、 The instance starts and the database opens, but every attempt to write to redo log files fails with an error.
考题
Which statement is true about FLUSH LOGS command?()A、It requires the RELOAD, FILE, and DROP privilegesB、It closes and reopens all log filesC、It closes and sends binary log files to slave serversD、It flushes dirty pages in the buffer pool to the REDO logs
考题
Which statement about recovering from the loss of a redo log group is true?()A、If the lost redo log group is ACTIVE, you should first attempt to clear the log file.B、If the lost redo log group is CURRENT, you must clear the log file.C、If the lost redo log group is ACTIVE, you must restore, perform cancel-based incomplete recovery, and open the database using the RESETLOGS option.D、If the lost redo log group is CURRENT, you must restore, perform cancel-based incomplete recovery, and open the database using the RESETLOGS option.
考题
单选题Where do you find information about a missing redo log file?()A
trace fileB
audit trailC
control fileD
alert log fileE
event viewer
考题
单选题Which log contains information about service restarts, system errors, warnings, and requests to check server connectivity? ()A
Events logB
System logC
User Access logD
Admin Access log
考题
多选题You are using replication and the binary log files on your master server consume a lot of disk space. Which two steps should you perform to safely remove some of the older binary log files?()AUse the command PURGE BINARY LOGS and specify a binary log file name or a date and time to remove unused filesBExecute the PURGE BINARY LOGE NOT USED commandCRemove all of the binary log files that have a modification date earlier than todayDEdit the .index file to remove the files you want to deleteEEnsure that none of the attached slaves are using any of the binary logs you want to delete
考题
单选题You are working on a database, where you have three redo log groups. When the database is down for a backup, an operating system (OS) user deletes all the redo log files in a group. What will happen when you open your database?()A
The instance starts, the database is mounted, but efforts to open the database fail, and an error about the missing redo log group is displayed.B
Before the instance starts, you receive an error about the missing redo log files of a group.C
The instance starts and the database opens with an error message written to the alert log file.D
The instance starts and the database opens because two redo log groups still exist.E
The instance starts and the database opens, but every attempt to write to redo log files fails with an error.
考题
单选题Which statement is true about the digital to analog conversion process?()A
the two steps of digital to analog conversion are decompression and reconstruction of the analog signalB
the two steps of digital to analog conversion are decoding and filteringC
the two steps of digital to analog conversion are decompression and filtering of the analog signalD
the two steps of digital to analog conversion are quantization and decoding
考题
多选题Which two statements are true about analog to digital conversion of voice signals for use in digital telephony networks?()AThe three required steps in the analog to digital conversion are sampling,encoding,and compression.BThe three required steps in the analog to digital conversion are sampling,quantization,and compression.CThe three required steps in the analog to digital conversion are sampling,quantization,and encoding.DThe output of the sampling process is a pulse code modulation (PCM) signal.EThe output of the sampling process is a pulse amplitude modulation (PAM) signal.
考题
单选题You issued the following command: ALTER DATABASE ENABLE BLOCK CHANGE TRACKING; What will be the result of issuing this command?()A
The block change tracking feature is enabled, and the information about the system change number is written in the change tracking file.B
The block change tracking feature is enabled, and the information about the log sequence number is written in the change tracking file.C
The block change tracking feature is enabled, and the information about the blocks that are changed since the last backup is written in the change tracking file.D
The block change tracking feature is enabled, and the information about the locations of the datafiles and the online redo log files are written in the change tracking file.
考题
单选题A database is running In ARCHIVBXXMS mode. It has two online redo log groups and each group has one member. A LGWR Input/output (I/O) fells due to permanent media failure that has resulted In the loss of redo log file and the LWGR terminates causing the instance to crash. The steps to recover from the loss of a current redo log group member in the random order are as follow. 1) Restore the corrupted redo log group. 2) Restore from a whole database backup. 3) Perform incomplete recovery. 4) Relocate by renaming the member of the damaged online redo log group to a new location. 5) Open the database with the RESETLOGS option. 6) Restart the database instance. 7) Issue a checkpoint and clear the log. Identify the option with the correct sequential steps to accomplish the task efficiently().A
1,3,4,and 5B
7,3,4. and 5C
2,3,4,and 5D
7,4,3,and 5E
Only 6 is required
考题
多选题An administrator receives an error when attempting to execute a WebSphere Commerce command and decides to take the following steps to troubleshoot the problem: Check to see if the request was processed by the WebSphere plug-in but was never received by the WebSphere Application Server Check for Java errors from EJBs and servlets Trace WebSphere Commerce Server subsystems and commands Which of the following files should the administrator check to accomplish these steps?()Aerror.logBtrace.logChttp_plugin.logDservlet.logESystemOut.log
考题
单选题Which statement is true about FLUSH LOGS command?()A
It requires the RELOAD, FILE, and DROP privilegesB
It closes and reopens all log filesC
It closes and sends binary log files to slave serversD
It flushes dirty pages in the buffer pool to the REDO logs
考题
单选题The instance abnormally terminates because of a power outage. Which statement is true about redo log filesduring instance recovery()A
Inactive and current redo log files are required to accomplish recovery.B
Online and archived redo log files are required to accomplish instance recovery.C
All redo log entries after the last checkpoint are applied from redo log files to data files.D
All redo log entries recorded in the current redo log file until the checkpoint position are applied to data files
考题
单选题You discover that the schema changes that were recently made to your SQL Server 2005 database have caused your Web site to stop functioning. It is unclear who made the changes. TestKing.com now mandates that all changes to the database schema be tracked. You need to implement a mechanism that will track schema changes in your database. What should you do?()A
Implement a stored procedure that writes data about schema changes to a log table.B
Implement DDL AFTER triggers that write user and schema information to a log table.C
Implement a DML INSTEAD OF trigger that writes data about schema changes to a log table.D
Implement a DML AFTER trigger that writes data about schema changes to a log table.
考题
单选题The instance abnormally terminates because of a power outage. Which statement is true about redolog files during instance recovery()A
Inactive and current redo log files are required to accomplish recovery.B
Online and archived redo log files are required to accomplish instance recovery.C
All redo log entries after the last checkpoint are applied from redo log files to data files.D
All redo log entries recorded in the current redo log file until the checkpoint position are applied to datafiles.
考题
单选题By default, which command can be used to display information about packets that have been logged with the syslog firewall filter action?()A
show logB
show firewallC
show log messagesD
show firewall log
考题
单选题Which statement about WSA access logs that are to be processed by sawmill for cisco ironport istrue?()A
the default log format can be usedB
the fields%XC%X n must be appended to the default access log formatC
any log format can beused , but all WSAs must use the same formatD
any log format can be used. And different WSAs may use different formats
考题
单选题Which statement about recovering from the loss of a redo log group is true?()A
If the lost redo log group is ACTIVE, you should first attempt to clear the log file.B
If the lost redo log group is CURRENT, you must clear the log file.C
If the lost redo log group is ACTIVE, you must restore,perform cancel-based incomplete recovery,and open the database using the RESETLOGS option.D
If the lost redo log group is CURRENT, you must restore,perform cancel-based incomplete recovery,and open the database using the RESETLOGS option.
热门标签
最新试卷