-
Your database is running in ARCHIVELOG mode,and the database is open. You execute an RMAN backup and specify the KEEP clause.Which components are backed up when this option is specified?()
A . only the control file, the current SPFILE, and data files
B . only the current SPFILE and data files if autobackup is disabled
C . only the data files and the archived redo logs
D . the control file, current SPFILE file, data files, and archived redo log
-
RMAN enables you to open the target database when it is already mounted. Which command must you execute at the RMAN prompt to open the database?()
A . ’SQL ALTER DATABASE OPEN’;
B . SQL ALTER DATABASE ’OPEN’;
C . OPEN DATABASE;
D . DATABASE OPEN
-
You are tuning RMAN to optimize performance.You want tape I/O to be asynchronous when you perform tape backups. Which action should you take?()
A . Set the BACKUP_TAPE_IO_SLAVES parameter to FALSE
B . Set the BACKUP_TAPE_IO_SLAVES parameter to TRUE
C . Use compression when performing tape backups
D . Configure multiple SBT channel
-
When performing incomplete recovery using UNTIL SEQUENCE with RMAN, which two pieces of information are required?()
A . Thread number.
B . Log Sequence number.
C . Control file sequence number.
D . Name of the last archived log.
-
You are tuning RMAN to optimize performance. You want tape I/O to be asynchronous when you perform tape backups. Which action should you take?()
A . Set the BACKUP_TAPE_IO_SLAVES parameter to FALSE
B . Set the BACKUP_TAPE_IO_SLAVES parameter to TRUE
C . Use compression when performing tape backups
D . Configure multiple SBT channel
-
Which of the following are valid until command options when attempting point-in-time recovery in RMAN?()
A . until time
B . until change
C . until sequence
D . until SCN
E . until commit
-
Which authentication types are allowed with the Cisco ADU when selecting WPA/WPA2/CCKMunderthe security options?()
A . Cisco-LEAP, EAP-FAST, EAP-PEAP (GTC), EAP-TLS
B . Cisco-LEAP, EAP-PSK, EAP-PEAP (MS-CHAP v2), EAP-TLS
C . Cisco-LEAP, EAP-FAST, EAP-PEAP (MS-CHAP v2), EAP-TTLS
D . Cisco-LEAP, EAP-MD5, EAP-PEAP (GTC), EAP-TTLS
-
Under what condition are you allowed to depart from the rules of the road().
A . To avoid immediate danger
B . When authorized by the rig superintendent
C . To comply with an operator's requirement
D . Under no conditio
-
You are using RMAN to backup your ARCHIVELOG mode database. You have enabled control-file autobackups. Which files are not backed up during the RMAN backup?()
A . Database Datafiles
B . Database Control Files
C . Online redo logs
D . Archived redo logs
E . The database SPFILE
F . None of the above,all these files are backed u
-
You are using RMAN to backup your ARCHIVELOG mode database. You have enabled control-file autobackups. Which files are not backed up during the RMAN backup?()
A . Database Datafiles
B . Database Control Files
C . Online redo logs
D . Archived redo logs
E . The database SPFILE
F . None of the above, all these files are backed up.&e
-
You performed the RMAN database backup with the KEEP option. Which two statements are true regarding this backup?()
A . The backup contains data files, the server parameter file,and the control file even if the control file autobackup is disabled.
B . The KEEP option overrides the configured retention policy.
C . The backup contains only data files and archived redo log files.
D . The KEEP option is an attribute of an individual backup piece.
-
You are managing an Oracle Database 11g database. The database is open, and you plan to performRecovery Manager (RMAN) backups. Which three statements are true about these backups()
A . The backups would be consistent.
B . The backups would be inconsistent.
C . The backups would be possible only if the database is running in ARCHIVELOG mode.
D . The backups would be possible only if the database is running in NOARCHIVELOG mode.
E . The backups need to be restored and the database has to be recovered in case of a media failure.
-
You are managing an Oracle Database 11g database. The database is open, and you plan to perform Recovery Manager (RMAN) backups. Which three statements are true about these backups()
A . The backups would be consistent.
B . The backups would be inconsistent.
C . The backups would be possible only if the database is running in ARCHIVELOG mode.
D . The backups would be possible only if the database is running in NOARCHIVELOG mode.
E . The backups need to be restored and the database has to be recovered in case of a media failure
-
You are using Recovery Manager (RMAN) to perform backups. In which three situations would you perform a compressed backup?()
A . You are backing up to tape and your tape device performs its own compression.
B . You are making image copies, and you have not enabled tablespace compression.
C . You are using disk-based backups and disk space in your Flash Recovery Area, or other disk-based backup destinations are limited.
D . You are performing your backups to some device over a network where reduced network bandwidth is more important than CPU usage.
E . You are using some archival backup media, such as CD or DVD, where reducing backup sizes saves media costs and archival storage.
-
You work as a database administrator for Supportcenter.cn. You are using Recovery Manager (RMAN) to perform backups in your databases. Which four backup operations can be performed using RMAN?()
A . A backup of the target database when it is mounted
B . A backup of online redo log files when the database is open
C . A backup of only used data blocks in the file beingbeingbackup up
D . A backup of online, read/write data files when the database is open
E . A backup of only those data blocks that have changed since a previous backup
F . A backup of online, read/write data files when the database is in the NOMOUNT state.
-
You use a recovery catalog for maintaining your database backups.You execute the following command:$rman TARGET / CATALOG rman / cat@catdbRMAN > BACKUP VALIDATE DATABASE ARCHIVELOG ALL;Which two statements are true?()
A . Corrupted blocks, if any, are repaired.
B . Checks are performed for physical corruptions.
C . Checks are performed for logical corruptions.
D . Checks are performed to confirm whether all database files exist in correct locations
E . Backup sets containing both data files and archive logs are created.
-
You are granted the CREATE VIEW privilege. What does this allow you to do? ()
A . Create a table view.
B . Create a view in any schema.
C . Create a view in your schema.
D . Create a sequence view in any schema.
E . Create a view that is accessible by everyone.
F . Create a view only of it is based on tables that you created.
-
Your database is running in ARCHIVELOG mode, and the database is open. You execute an RMAN backup and specify the KEEP clause. Which components are backed up when this option is specified?()
A . only the control file, the current SPFILE, and data files
B . only the current SPFILE and data files if autobackup is disabled
C . only the data files and the archived redo logs
D . the control file,current SPFILE file,data files,and archived redo log
-
You are using RMAN to perform a closed database backup of your database. You issue these RMAN commands: STARTUP MOUNT; BACKUP FORMAT ’/BACKUP/df_%d_%s_%p.bus’ DATABASE filesperset = 2; Which components are included in the backup?()
A . Only the data files.
B . Only the data files and the online logs.
C . The data files, control files, and the online logs.
D . The data files and control files, but not the online logs.
-
You are not allowed to write Task 2 first.
-
You are using Recovery Manager (RMAN) with a recovery catalog to back up your production d
You are using Recovery Manager (RMAN) with a recovery catalog to back up your production database. Thebackups and the archived redo log files are copied to a tape drive on a daily basis.Because of media failure,you lost your production database completely along with the recovery catalog database.You want to recover the target database and make it functional. You consider performing the following steps to accomplish the task:1) Restore an autobackup of the server parameter file.2) Restore the control file3) Start the target database instance4) Mount the database5) Restore the data files6) Open the database with RESETLOGS option7) Recover the data files8) Set DBID for the target databaseWhich option illustrates the correct sequence that you must use?()
A.8,1,3,2,4,5,7,6
B.1,8,3,4,2,5,7,6
C.1,3,4,2,8,5,6,7
D.1,3,2,4,6,5,7,8
-
We do not allow()in the lecture hall,so you are not allowed()here.
A.smoking;to smoke
B.to smoke;smoking
C.smoking;smoking
D.to smoke;to smoke
-
You are the administrator of a Junos Pulse Access Control Service implementation. You must restrict authenticated users connected from the branch offices to a few specific resources within the data center. However, when the authenticated users are connected at the corporate office, they are allowed more access to the data center resources.You have created two roles with different levels of access and are trying to determine the best way of controlling when a user is mapped to a specific role. Having the user prompted to manually select their role is possible, but you want to automate the process.Which configuration solves this problem?()
A. Implement a RADIUS request attribute policy to assist with realm selection and create different role-mapping rules for the user in each realm.
B. Implement a directory/attribute server on the realm and set up this server to determine by group membership the proper role to which a user should be mapped.
C. Reorder the role-mapping rules to allow for the more open role to be mapped first and then enable the "stop processing rules when this rule matches" function on this role.
D. Implement a Host Checker policy on the realm that determines the geographic location of the device and restricts the user based on the results of the policy.
-
You are creating a custom user control. The custom user control will be used on 10 Web Forms for an ASP.NET Web site that allows users to register and log on to a personalized experience.The custom user control uses two TextBox controls and two Button controls.You need to ensure that the controls are visible only when users are not logged on to the Web site. You also need to minimize the amount of effort in development and maintenance for the Web site.Which two actions should you perform?()
A. Add the OnClick event handler for the Login button to the code used in the custom user control.
B. Add the OnClick event handler for the Login button to the code used in the Web Form where the control is added.
C. In the Page_Load method of the Web Form, add a code segment to set the visibility of the TextBox and Button controls where the control is added.
D. In the Page_Load method of the custom user control, add a code segment to set the visibility of the TextBox and Button controls.