网友您好, 请在下方输入框内输入要搜索的题目:
题目内容
(请给出正确答案)
单选题
You need to recommend a BitLocker recovery method that meets the company’s technical requirements. Which recovery method should you recommend?()
A
a data recovery agent
B
a recovery key
C
a recovery password printed and stored in a secure location
D
a recovery password stored in Active Directory
参考答案
参考解析
解析:
暂无解析
更多 “单选题You need to recommend a BitLocker recovery method that meets the company’s technical requirements. Which recovery method should you recommend?()A a data recovery agentB a recovery keyC a recovery password printed and stored in a secure locationD a recovery password stored in Active Directory” 相关考题
考题
You are the network administrator at TestKing. You need to perform password recovery on Router TK1. What must you modify in the password recovery process?()
A. Configuration registerB. NVRAMC. Boot flashD. CMOSE. Flash
考题
You are the network administrator at TestKing. You need to perform password recovery on Router TK1. What must you modify in the password recovery process?()A、Configuration registerB、NVRAMC、Boot flashD、CMOSE、Flash
考题
You need to recommend a NAP enforcement method that meets the companyˉs security requirements. Which method should you recommend?()A、802.1XB、DHCPC、IPSecD、VPN
考题
In your production database, users report that they are unable to generate reports on an important table because it does not contain any data. While investigating the reason, you realize that another user executed the TRUNCATE TABLE command, which accidentally caused the data to be lost. Now you want to recover the lost data of the table without affecting objects in other schemas. Which method must you use to recover the lost data?()A、Complete Recovery with online redo logB、Complete Recovery with archived redo logC、Tablespace Point-in-Time Recovery (TSPITR)D、Incomplete Recovery with system change number (SCN)
考题
A data file become corrupted in your database due to bad sectors on the disk. Because of corruption, you lost all the important tables in that data file. Which method would you use for recovery?()A、 Flash back all the tables in the data file, one by one.B、 Restore the data file to a new location and perform a media recovery.C、 Flash back the database, there is no need to restore the data file.D、 Restore the data file from the most recent backup and flash the database.
考题
You are performing a block media recovery on the tools01.dbf data file in the SALES database using RMAN. Which two statements are correct in this scenario?()A、 You must ensure that the SALES database is mounted or open.B、 You must restore a backup control file to perform a block media recovery.C、 You must take the tools01.dbf data file offline before you start a block media recovery.D、 You must put the database in NOARCHIVELOG mode to perform a block media recovery.E、 You can perform only a complete media recovery of individual blocks, point-in-time recovery of individual data blocks is not supported.
考题
You have an enterprise subordinate certification authority (CA) configured for key archival. Three key recovery agent certificates are issued. The CA is configured to use two recovery agents. You need to ensure that all of the recovery agent certificates can be used to recover all new private keys. What should you do()A、Add a data recovery agent to the Default Domain Policy.B、Modify the value in the Number of recovery agents to use box.C、Revoke the current key recovery agent certificates and issue three new key recovery agent certificates.D、Assign the Issue and Manage Certificates permission to users who have the key recovery agent certificates.
考题
You need to test your disaster recovery solution. Which role should you transfer to the disaster recovery location during the test?()A、RID masterB、Schema masterC、PDC emulator masterD、Domain naming master
考题
You need to recommend a BitLocker recovery method that meets the company’s technical requirements. Which recovery method should you recommend?()A、a data recovery agentB、a recovery keyC、a recovery password printed and stored in a secure locationD、a recovery password stored in Active Directory
考题
You need to recommend a solution for starting the servers in the San Francisco office from Windows Recovery Environment (Windows RE). The solution must meet the company’s security requirements. What should you include in the recommendation?()A、an iSCSI initiatorB、the Multipath I/O featureC、Wake On LAND、Windows Deployment Services (WDS)
考题
You need to design Group Policy object (GPO) settings to support the use of the Encrypting File System (EFS). Your solution must meet business and security requirements. Which two actions should you perform?()A、Designate a data recovery agent and issue an EFS certificate to the data recovery agent. Export the private key and restrict access to the exported keyB、Make the data recovery agent a local administrator on all client computersC、Remove the default data recovery agent from the Default Domain Policy GPO. Then, include the new data recovery agent insteadD、Delete the Default Domain Policy GPO. Configure a new GPO linked to the domain that does not specify a data recovery agent
考题
You need to recommend a file recovery solution that meets the company's technical requirements. What should you include in the recommendation?()A、Distributed File System (DFS) ReplicationB、File Server Resource Manager (FSRM) active file screensC、shadow copiesD、Windows Storage Server 2008
考题
You need to recommend changes to the file server on the main campus that meet the company’s technical requirements. What should you include in the recommendation?()A、Encrypting File System (EFS) B、NTFS permissions C、Syskey D、Windows BitLocker Drive Encryption (BitLocker)
考题
You need to recommend a data management solution that meets the company’s technical requirements. What should you include in the recommendation?()A、DFS ManagementB、File Server Resource Manager (FSRM)C、Share and Storage ManagementD、Storage Explorer
考题
单选题A customer wants to configure two resource groups and create the following shared filesystem structure:Resource GroupFilsystem Mount Point Rg1/app1 Rg2/app1/data Which of the following will ensure the proper mount order for these filesystems?()A
Set filesystem recovery method to parallelB
Set filesystem recovery method to sequentialC
Set filesystem recovery method to parallel and configure a parent/child relationship for the resourcegroupsD
Set filesystem recovery method to sequential and configure a parent/child relationship for the resourcegroups
考题
单选题You need to recommend a NAP enforcement method that meets the companyˉs security requirements. Which method should you recommend?()A
802.1XB
DHCPC
IPSecD
VPN
考题
单选题You need to test your disaster recovery solution. Which role should you transfer to the disaster recovery location during the test?()A
RID masterB
Schema masterC
PDC emulator masterD
Domain naming master
考题
单选题You need to recommend a data management solution that meets the company’s technical requirements. What should you include in the recommendation?()A
DFS ManagementB
File Server Resource Manager (FSRM)C
Share and Storage ManagementD
Storage Explorer
考题
单选题You have an enterprise subordinate certification authority (CA) configured for key archival. Three key recovery agent certificates are issued. The CA is configured to use two recovery agents. You need to ensure that all of the recovery agent certificates can be used to recover all new private keys. What should you do()A
Add a data recovery agent to the Default Domain Policy.B
Modify the value in the Number of recovery agents to use box.C
Revoke the current key recovery agent certificates and issue three new key recovery agent certificates.D
Assign the Issue and Manage Certificates permission to users who have the key recovery agent certificates.
考题
单选题You need to recommend a file recovery solution that meets the company's technical requirements. What should you include in the recommendation?()A
Distributed File System (DFS) ReplicationB
File Server Resource Manager (FSRM) active file screensC
shadow copiesD
Windows Storage Server 2008
考题
单选题In your production database, users report that they are unable to generate reports on an important table because it does not contain any data. While investigating the reason, you realize that another user executed the TRUNCATE TABLE command, which accidentally caused the data to be lost. Now you want to recover the lost data of the table without affecting objects in other schemas. Which method must you use to recover the lost data?()A
Complete Recovery with online redo logB
Complete Recovery with archived redo logC
Tablespace Point-in-Time Recovery (TSPITR)D
Incomplete Recovery with system change number (SCN)
考题
单选题You need to recommend a solution for starting the servers in the San Francisco office from Windows Recovery Environment (Windows RE). The solution must meet the company’s security requirements. What should you include in the recommendation?()A
an iSCSI initiatorB
the Multipath I/O featureC
Wake On LAND
Windows Deployment Services (WDS)
考题
多选题You are the network administrator at TestKing. You need to perform password recovery on Router TK1. What must you modify in the password recovery process?()AConfiguration registerBNVRAMCBoot flashDCMOSEFlash
考题
单选题Because of a logical corruption in your production database, you wanted to perform Tablespace Point in Time Recovery (TSPITR). But before you start the recovery, you queried the TS_PITR_OBJECTS_TO_BE_DROPPED view and realized that there are a large number of objects that would be dropped when you start the recovery by using this method.You want to preserve these objects. Which option must you use to perform TSPITR and preserve the object?()A
Perform Export before TSPITR and Import after TSPITRB
Move objects to another schema that has the same tablespace assignedC
Perform Incomplete Recovery before TSPITR with the Log Sequence Number (LSN)D
Perform Incomplete Recovery before TSPITR with the System Change Number (SCN)
考题
单选题You need to test your disaster recovery solution. Which role should you transfer to the disaster recovery location during the test?()A
RID masterB
Schema masterC
PDC emulator masterD
Domain naming master
考题
单选题In your production database, users report that they are unable to generate reports on an important table because it does not contain any data. While investigating the reason, you realize that another user executed the TRUNCATE TABLE command, which accidentally caused the data to be lost. Now you want to recover the lost data of the table without affecting objects in other schemas. Which method must you use to recover the lost data?()A
Complete Recovery with online redo logB
Complete Recovery with archived redo logC
Tablespace Point-in-Time Recovery (TSPITR)D
Incomplete Recovery with system change number (SCN)
考题
单选题You need to recommend changes to the file server on the main campus that meet the company’s technical requirements. What should you include in the recommendation?()A
Encrypting File System (EFS) B
NTFS permissions C
Syskey D
Windows BitLocker Drive Encryption (BitLocker)
热门标签
最新试卷