-
Stream ciphers run on which of the following?()
A . Fixed-length groups of digits called blocks
B . Individual blocks,one at a time,with the transformations varying during the encryption
C . Individual digits,one at a time,with the transformations varying during the encryption
D . Fixed-length groups of bits called block
-
Your database is open and the LISTENER listener running. You stopped the wrong listener LISTENER byissuing the following command:lsnrctl > STOPWhat happens to the sessions that are presently connected to the database Instance?()
A . They are able to perform only queries.
B . They are not affected and continue to function normally.
C . They are terminated and the active transactions are rolled back.
D . They are not allowed to perform any operations until the listener LISTENER is started
-
A database is running in ARCHIVELOG mode and regular backups are performed. A user receives the following error message . Which is the recommended sequence of operations you need to perform for the query successfully?()
A . Drop the affected tablespace, re-create the tablespace, restore the datafiles, and the tablespace.
B . Take the affected datafile offline (if not already offline), restore the damaged image of the datafile, and then bring it online.
C . Restart the database in MOUNT mode, restore the damaged datafile, recover the datafile and then open the database with resetlogs.
D . Put the database in RESTRICTED mode, restore all the datafiles in the affected datafile and recover the tablespace, and then put the database in normal operational mode.&e
-
You need to document the following configurations of a server that runs Windows Server 2008 R2: System services Startup programs Hardware configuration Current CPU, network, disk, and memory utilization Which command should you run?()
A . mrinfo.exe localhost
B . msinfo32.exe
C . perfmon.exe /report
D . systeminfo.exe
-
Your alert log file has the following information: Tue May 25 17:43:38 2004 ORA-00060: Deadlock detected. More info in file /u01/app/oracle/admin/ORCL/udump/orcl_ora_3173.trc. What would you do to ensure that database is still running correctly?()
A . examine the trace file and kill the session that caused the deadlock
B . examine the trace file and kill both the sessions responsible for the deadlock
C . examine the trace file for details and ask the user who caused the deadlock to roll back the transaction
D . examine the trace file for details and remember that deadlocks are resolved automatically by Oracle database
E . examine the trace file for details and use the Undo Advisor to rollback the transaction that caused the deadlock
-
You are using NBAR to get a statistical baseline for the applications running on your network butdiscover that some applications are not being recognized. Which of the following are possiblesolutions?(Choose all that apply.)()
A . Use the ip nbar pdlm command to allow NBAR to reference a new PDLM in flash memory
B . If NBAR doesn’t recognize certain applications you must contact Cisco and ask them to emailyou a new PDLM for that application
C . Use the ip nbar port-map command to allow NBAR to recognize certain applications with anev/port number
D . The applications not being recognized can be rerouted to an NBAR collector, which has a morecomplete list of applications
E . Use the copy nbar flash: command to download a new PDLM file to flash
F . Use the ip nbar pdlm command to download a new NBAR reference file from the Cisco website
-
You are running parallel to the coast and take a running fix using bearings of the same object.If you are making less speed than used for the running fix,in relation to the position indicated by the fix,you will be().
A . Closer to the coast
B . Farther from the coast
C . On the track line ahead of the fix
D . On the track line behind the fix
-
You are performing an incomplete recovery because a tablespace is dropped and purged from the Recycle Bin. In which mode will you execute the following code?() RMAN>RUN { SET UNTIL SEQUENCE THREAD ; RESTORE DATABASE; RECOVER DATABASE; }
A . NOMOUNT
B . MOUNT
C . OPEN
D . RESTRICTED
-
Why would you run the delete obsolete command?()
A . To remove missing backup set pieces physically from disk
B . To remove metadata related to backup set pieces in the control file and the recovery catalog
C . To mark as deleted records in the control file and the recovery catalog associated with obsolete backup sets
D . To delete backup set pieces associated with backups that are no longer needed due to retention criteria
E . To remove old versions of RMAN backu
-
Your alert log file has the following information: Tue May 25 17:43: 38 2004 ORA-00060: Deadlock detected. More info in file /u01/app/oracle/admin/ORCL/udump/orcl_ora_3173.trc. What would you do to ensure that database is still running correctly?()
A . examine the trace file and kill the session that caused the deadlock
B . examine the trace file and kill both the sessions responsible for the deadlock
C . examine the trace file for details and ask the user who caused the deadlock to rollback the transaction
D . examine the trace file for details and remember that deadlocks are resolved automatically by Oracle database
E . examine the trace file for details and use the Undo Advisor to rollback the transaction that caused the deadlock
-
You run Windows Defender on your computer and receive the following warning message: "Windows Defender Definitions havent been updated." You need to ensure that Windows Defender definition files are updated. What should you do?()
A . Restart the Windows Defender service.
B . Repair the Microsoft Location Finder program.
C . Download and install the appropriate files from Microsoft Windows Update.
D . Download and install the latest Windows Defender application from the Microsoft Web site.
-
Your database is up and running and one of your three control files is accidentally erased. You start RMAN and run the following command: RESTORE CONTROLFILE FROM AUTOBACKUP; Which of the following statements is true?()
A . The command restores only the missing control file.
B . The command restores all the control files.
C . The command fails because the database is running.
D . This is the correct way to address this problem.
E . This is not the correct way to address this problem.
-
Which of the following processes in IOS XR run exclusively on the Route Processor?()
A . bgp
B . mpls_idp
C . sysmgr
D . wdsysmon
E . g
-
A customer wants to implement the following Blades in BladeCenter H:Two POWER Blades running IBM i partitions.Two POWER Blades running AIX and LinuxFour x86 Blades running Windows. Which of the following design consideration statements is correct?()
A . The Blades must use the same CIOv and CFFh expansion adapter types.
B . Two physical BladeCenter H chassis will be required. One for the POWER Blades, the other for the x86 Blades.
C . The x86 Blades and POWER Blades may use different expansion adapters provided the POWER Blades are in bays 1-7 and the x86 Blades are in slots 8-14.
D . The x86 Blades and POWER Blades may use different expansion adapters, provided the corresponding I/O modules to Blade midplane connections are configured in the Advanced Management Module (AMM).
-
You have a computer that runs Windows 7. You run Runas and specify the /savecred parameter to start anapplication. You need to delete the stored password. What should you do?()
A . Run Del and specify the /p parameter.
B . Run Runas and specify the /noprofile parameter.
C . From Credential Manager, modify the Windows credentials.
D . From Authorization Manager, modify the Authorization Manager options.
-
You are the network administrator for The network consists of a single ActiveDirectory domain named All domain controllers run Windows Server 2003, and each one has a locally attached tape device.You need to back up each domain controller. Your backup process must fulfil the following requirements:System recovery must be possible in the event of server failure.The system configuration and all current dynamic disk configurations must be backed up.Other data partitions do not need to be backed up.What should you do?()
A. Use the Backup utility to back up the system files and to create an Automated System Recovery (ASR) disk.
B. Use the Backup utility to back up the contents of all mounted drives.
C. Use the Backup utility to back up only the System State data.
D. Use the Copy command to copy C:\windows and its subfolders to a shared folder on the network.
E. Use the Xcopy command to copy C:\windows and its subfolders to a shared folder on the network.
-
You need to document the following configurations of a server that runs Windows Server 2008 R2:System servicesStartup programsHardware configurationCurrent CPU, network, disk, and memory utilizationWhich command should you run?()
A. mrinfo.exe localhost
B. msinfo32.exe
C. perfmon.exe /report
D. systeminfo.exe
-
Your network contains a server named Server1 that runs Windows Server 2003 Service Pack 2 (SP2).An administrator named Admin1 logs on to Server1. Admin1 sends you a Remote Assistance invitation.You successfully establish a Remote Assistance session to Server1 by using the invitation.You request control of Server1 and you receive the following error message.You need to ensure that you can control Server1 by using Remote Assistance.What should you instruct Admin1 to do?()
<img src='https://img2.soutiyun.com/shangxueba/ask/64218001-64221000/64219062/d81dc261a874dd890a6bb63853c3b4c2.jpg' />
A. Add your user account to the HelpServicesGroup group.
B. Add your user account to the Remote Desktop Users group.
C. Send a Remote Assistance request by using Windows Messenger.
D. Open the System properties, and then modify the Remote settings.
-
Your network consists of a single Active Directory domain. All servers run Windows Server 2003 ServicePack 2 (SP2). All client computers run Windows XP Professional Service Pack 3 (SP3).A domain user named User1 attempts to log on to a computer named Computer1. After several failed logonattempts, User1 receives the following error message.You reset the password for User1 and provide the new password to User1.You need to ensure that User1 can log on immediately.What should you do? ()
<img src='https://img2.soutiyun.com/ask/uploadfile/2019-03-27/77d008e473eb9c6337cc252dffe790c3.jpg' />
A. Modify the Account settings for User1.
B. Modify the Session settings for User1.
C. Disable User1 and then enable User1.
D. Disable Computer1 and then enable Computer1.
-
You are the network administrator for TestKing. All network servers run Windows Server 2003.A member server named TestKingSrv is configured to run shadow copies without a storage limit. TestKingSrv has the disk configuration shown in the following table.You need to create additional free space on TESTKINGDATA1. You also need to improve the performance of TestKingSrv and ensure it has sufficient space for shadow copies in the future.Which two actions should you perform? ()(Each correct answer presents part of the solution. Choose two)
<img src='https://img2.soutiyun.com/shangxueba/ask/17127001-17130000/17128961/71325333bc54d713a67fe575c85cd7af.jpg' />
A. Delete the shadow copies on TESTKINGDATA1.
B. Delete Backup.bkf on TESTKINGDATA3.
C. In the properties of TESTKINGDATA1, relocate the shadow copies to TESTKINGDATA2.
D. In the properties of TESTKINGDATA1, relocate the shadow copies to TESTKINGDATA3.
E. Delete TESTKINGDATA3 and extend the TESTKINGDATA1 partition to include the space on TESTKINGDATA3.
-
Your network consists of a single Active Directory domain. All servers run Windows Server 2003Service Pack 2 (SP2). All client computers run Windows XP Professional Service Pack 3 (SP3).A domain user named User1 attempts to log on to a computer named Computer1. After several failedlogon attempts, User1 receives the following error message.You reset the password for User1 and provide the new password to User1.You need to ensure that User1 can log on immediately.What should you do? ()
<img src='https://img2.soutiyun.com/shangxueba/ask/17130001-17133000/17131642/0b0e3280a3236a3e54adff366d6b1021.jpg' />
A. Modify the Account settings for User1.
B. Modify the Session settings for User1.
C. Disable User1 and then enable User1.
D. Disable Computer1 and then enable Computer1.
-
Your company has a main office and 15 branch offices. The company has a single Active Directory domain. All servers run Windows Server 2008 R2.You need to ensure that the VPN connections between the main office and the branch offices meet the following requirements:¡¤All data must be encrypted by using en-to-end encryption.¡¤The VPN connection must use compute-level authentication.¡¤User names and passwords cannot be used for authenticationWhat should you do?()
A. Configure an IPsec connection to use tunnel mode and preshared key authentication.
B. Configure a PPTP connection to use version 2 of the MS-CHAP v2 authentication.
C. Configure a L2TP/IPsec connection to use the EAP-TLS authentication.
D. Configure a L2TP/IPsec connection to use version 2 of the MS-CHAP v2 authentication.
-
Your network consists of a single Active Directory domain. All servers run Windows Server 2003Service Pack 2 (SP2). All client computers run Windows XP Professional Service Pack 3 (SP3).You assign NTFS permissions to a folder on a file server as shown in the following table.You share the folder and assign the Change permission to the Everyone group.A user named User1 is a member of Group1, Group2, and Group3.You need to identify the least restrictive NTFS permission that User1 has when he accesses the folderover the network.Which permission should you identify? ()
<img src='https://img2.soutiyun.com/shangxueba/ask/17130001-17133000/17131514/26295659d9a0fab6ffcd7d0b723afbd3.jpg' />
A. Full Control
B. Modify
C. Read
D. Write
-
How can you keep the machine being run when you‘re away.()
对
错