-
You lost the PRODSTD tablespace, which was read-only. The tablespace was read-only when the last backup was taken. How would you recover the tablespace?()
A . restore the tablespace from the backup, and then perform an incomplete recovery
B . restore the tablespace from the backup, and then apply all the redo information
C . restore all the data files in the database, and then perform an incomplete recovery
D . restore the tablespace from the backu
-
You upgraded Oracle Database 10g to Oracle Database 11g. How would this affect the existing users’ passwords?()
A . All passwords automatically become case-sensitive.
B . All passwords remain non-case-sensitive till they are changed.
C . All passwords remain non-case-sensitive and cannot be changed.
D . All passwords remain non-case-sensitive until their password attribute in the profile is altered.
-
Refer to the exhibit. How would you get the 1.1.1.1 network into the OSPF database? ()https://assets.asklib.com/images/image2/2018072616103459592.png
A . Configure RTA as an ASBR
B . Redistribute connected routes on RTA into OSPF
C . Set up a virtual link between area 1 and area 0
D . Set up a virtual link between area 1 and area 2
E . Add a static route into RTB and enter it into OSPF
F . Place a network 1.1.1.0 0.0.0.0 command into RTB
G . Set up a unique router ID on RTA using an RFC 1918 address
H . Change area 0 on RTB to area 1
-
You are using IPv6, and would like to configure EIGRPv3. Which three of these correctly describe how you can perform this configuration?()
A . EIGRP for IPv6 is directly configured on the interfaces over which it runs.
B . EIGRP for IPv6 is not configured on the interfaces over which it runs, but if a user uses passive-interface configuration, EIGRP for IPv6 needs to be configured on the interface that is made passive.
C . There is a network statement configuration in EIGRP for IPv6, the same as for IPv4.
D . There is no network statement configuration in EIGRP for IPv6.
E . When a user uses a passive-interface configuration, EIGRP for IPv6 does not need to be configured on the interface that is made passive.
F . When a user uses a non-passive-interface configuration, EIGRP for IPv6 does not need to be configured on the interface that is made passive
-
A healthcare and life sciences client wants to maintain electronic patient records, including medical images, for two years after each patient’s death. How would the IT storage industry describe this business goal?()
A . Archive solution that requires event-based retention
B . Backup solution that provides version-based expiration
C . Business continuity solution that provides two years Recovery Time Objective (RTO)
D . Business continuity solution that provides two years Recovery Point Objective (RPO)
-
How would you default the layout of a parameter form? ()
A . Use the default layout tool in the parameter form editor.
B . Select menu item tool->parameter form builder.
C . Open the parameter form editor and select menu items tool->default layout.
D . You cannot default the layout of the parameters.
-
If a log file becomes corrupted, it may cause the database to stall. How would you correct such a situation?()
A . Recover the online redo log from backup.
B . Delete and re-create the log file.
C . Use the alter database clear logfile command to clear the log file.
D . Shut down the database and restart it.
E . Shut down the database and then mount it. Clear the log file with the alter database clear logfile command and then restart the database with alter database open resetlogs.
-
How would you characterize the source and type in a denial of service attack on a router?()
A . By perfornubg a show ip interface to see the type and source of the attack based upon the access-listmatches
B . By performing a show interface to see the transmitted load "txload" and receive load "rxload" ;if the interface utilization is not maxed out ,there is no attack underway
C . By setting up an access-list to permit all ICMP,TCP,and UDP traffic with the log or log-input commands,then use the show access-list and show log commands to determine the type and sourceof attack
D . By applying an access-list to all incoming and outgoing interfaces,turning off route-cache on all interfaces,then,when telnetting into the router perform a debug IP packet detail
-
In your database, you discovered that a tempfile in a locally managed temporary tablespace has been deleted at the operating system level. How would you recover the tablespace?()
A . flash back the database
B . perform point-in-time recovery
C . perform a full database recovery
D . drop and re-create the tablespace
E . use Recovery Manager (RMAN) to recover the database
-
You create a salary report to display employee salaries grouped by the dept column. You need to change the break order from ascending to descending using the model. How would you reverse the display order of the department? ()
A . Double click the dept column in the group to alter the property palette and change the break out order value.
B . Double click the dept column in the group to open the property palette and change the set break order value.
C . Double click the g_dept group object to change the break order.
D . Click the dept column in the group to change the break order.
-
The character mode sales report is stored on the network drive as a .REX. You need to make changes to the report layout. Using the report builder how would you change this file?()
A . Open the file using the menu option file->open make the changes and recompile the report.
B . Convert the file into .REP file using the report compiler make the changes and convert the file back to a .REX file.
C . Execute the R30CONV command to convert the file to a .RDF file, make the changes and convert the file back to a .REX file.
D . Choose file -> administration->compile. Convert the file to a .REP file, make the changes and convert the file back to a .REX file.
E . Execute the R30CONV command to convert the file to a .REP file, make the changes and convert the file back to a .REX file.
-
You lost the PRODSTD tablespace, which was read/write. The tablespace was readonly when the last backup was performed. How would you recover the tablespace?()
A . restore the tablespace from the backup; there is no need to apply the redo information
B . restore the full database to recover the data up to the point when you performed the backup
C . restore the tablespace from the backup, and then perform a recovery using the backup control file
D . restore the tablespace from the backup, and then recover the tablespace; all the redo information from the point when the tablespace was made read/write is applied
-
How would you grant the RVPC user access to specific RMAN database records in the RMAN virtual private catalog?()
A . Issue the grant command from the SYS user (or equivalent) of the target database.
B . Issue the grant command from the SYS user (or equivalent) of the recovery-catalog database.
C . Issue the grant command from the recovery catalog-owning schema user account in the recovery catalog.
D . Issue the grant command from RMAN when connected to the recovery catalog-owning schema.
E . Issue the grant command from RMAN when connected to the target database.
-
Using the reports server how would you force the orders report in the orders entry application to run every six hours?()
A . Schedule the report's execution in the queue manager.
B . Schedule the reports execution using the R30RQM command line with scheduled parameter.
C . Create a trigger in the application to execute the report every six hours.
D . You cannot schedule a reports execution.
-
A healthcare and life sciences client wants to maintain electronic patient records, including medical images, for a period of seven years. How would the IT storage industry describe this business goal?()
A . an archive solution that requires event-based retention
B . a backup solution that provides version-based expiration
C . a PACS environment that provides two year litigation hold
D . a business continuity solution that provides two years Recovery Time Objective (RTO)
-
7.Your classmate from Britain would like to borrow your computer this weekend. Unfortunately, you need to use it at the same time. How would you refuse the request politely?
-
7.Your classmate from Britain would like to borrow your computer this weekend. Unfortunately, you need to use it at the same time. How would you refuse the request politely?
-
If you were giving an informative speech describing the different parts of the Forbidden City in China, you would probably arrange the speech in __________ order.
-
Japan is bigger than Israel. Japan is not bigger than China. Therefore, China is bigger than Israel. How would you describe the above example? (In assessing soundness, you may assume commonly known facts.)
-
Why did the tribe from Central Africa describe the picture differently from how you or I would describe the photo?
-
How would the author describe the animals' life in zoos?
A.Dangerous.
B.Unhappy.
C.Natural.
D.Easy.
-
Refer to the exhibit. How would you confirm on R1 that load balancing is actually occurring on the default - netw ork (0.0.0.0)?()
<img src='https://img2.soutiyun.com/ask/uploadfile/2019-03-27/ae2677f0b95075ecbebd837f23ecac04.jpg' />
A. Use ping and the show ip route command to confirm the timers for each default network resets to 0.
B. Load balancing does not occur over default networks; the second route will only be used for failover.
C. Use an extended ping al ong with repeated show ip route commands to confirm the gateway of last resort address toggles back and forth.
D. Use the traceroute command to an address that is not explicitly in the routing table.
-
How would you describe the author's personality()?
A.Shy and under confident
B.Strong but quiet.
C.Extremely pessimistic
D.Optimistic and outgoin
E.
-
询问客人付款的方式,现金还是信用卡:“How would you like to make the payment?Cashor()?”
A.credit card
B.rare
C.vinegar