-
You are designing a strategy to migrate user accounts. Which two actions should you perform? ()
A . Change the functional level.
B . Create an external trust relationship.
C . Run adprep to prepare the research.com forest.
D . Run adprep to prepare the research.com domain.
-
You are designing a strategy of enforce the corporate security policy. Which action or actions should you perform?()
A . Configure a password policy that requires strong passwords
B . Configure a password policy that requires all users to change their passwords once a month.
C . Allow users in the branch offices to log on between the hours of 8:00 AM and 5:00 PM, Monday through Friday.
D . Allow users in the retail outlets to log on between the hours of 6:00 AM and 11:00 PM, daily.
E . Enable a policy that forces users to log off when their logon hours expire.&e
-
You are designing a strategy to install the new scheduling application. Which two actions should you perform?()
A . Assign the scheduling application package to the Instructor OU.
B . Publish the scheduling application package to the Instructor OU.
C . Ensure that the scheduling application can install across slow WAN links.
D . Prevent the scheduling application from installing across slow WAN links.
-
You are analyzing the performance of a SQL Azure database. You need to recommend an approach for identifying the indexes that should be added to improve database performance. What should you recommend?()
A . Use SQL Server Profiler to identify missing indexes.
B . Use the Database Engine Tuning Advisor to identify missing indexes.
C . Use a Dynamic Management View to analyze query plans.
D . Use a DynamicManagement View to ascertain the number of pending I/O requests.
-
You are designing a domain naming strategy for the new environment. Which two actions should you perform?()
A . Register airlines.com as a new domain name.
B . Register manifest.airlines.com as a new domain name.
C . Register manifest.blueyonderairlines.com as a new domain name.
D . Maintain the existing blueyonderairlines.com registered domain name.
E . Use the UPN suffix of airlines.com for all new users.
F . Use the UPN suffix of blueyonderairlines.com for all new users.&e
-
The database has the data block size set to 8 KB. You need to import a tablespace with a 4 KB block size into the database. Which additional memory parameter(s) should be configured to perform a transportable tablespace import?()
A . DB_4K_CACHE_SIZE only
B . DB_8K_CACHE_SIZE only
C . DB_BLOCK_SIZE and DB_4K_CACHE_SIZE
D . DB_BLOCK_SIZE and DB_8K_CACHE_SIZE
E . SGA_TARGET and DB_4K_CACHE_SIZE
F . DB_CACHE_SIZE only
-
You are performing a block media recovery on the tools01.dbf data file in the SALES database using RMAN. Which two statements are correct in this scenario?()
A . You must ensure that the SALES database is mounted or open.
B . You must restore a backup control file to perform a block media recovery.
C . You must take the tools01.dbf data file offline before you start a block media recovery.
D . You must put the database in NOARCHIVELOG mode to perform a block media recovery.
E . You can perform only a complete media recovery of individual blocks, point-in-time recovery of individual data blocks is not supported.
-
You are creating a form that will access an Oracle8 database. On which three sources can you base a data block?()
A . BFILE
B . REF column
C . Object table
D . Column object
E . INSTEAD-OF trigger
-
You are designing a strategy for migrating the UNIX user accounts to Active Directory. Which three actions should you perform?()
A . Import the user accounts as inetOrgPerson objects.
B . Import the user accounts into Active Directory by using the Ldifde command-line tool.
C . Export all user accounts from the UNIX servers to a text file.
D . Export all user accounts and their passwords from the UNIX servers to a text file. Encrypt this file to achieve extra security.
E . Assign random passwords to each user object, and securely distribute the password to the users.
F . Create the same strong password for each user object, and require users to change their passwords at first logon.
G . Instruct users to use the same name and password as they used on the UNIX servers.
-
You are designing a strategy to improve the performance and reliability of the domain controllers. What should you do?()
A . Create one RAID-5 volume.
B . Create two RAID-5 volumes.
C . Create one mirrored volume and two RAID-5 volumes.
D . Create two mirrored volumes and one RAID-5 volume.
-
You are performing a database recovery because a user’s schema is dropped. While performing the recovery, you use the UNTIL SEQUENCE clause. Which type of database recovery are you performing?()
A . user managed complete recovery
B . user managed incomplete recovery
C . RMAN-based complete recovery
D . RMAN-based incomplete recovery
-
You are designing a password management solution to meet the business and technical requirements. Which two actions should you perform?hich two actions should you perform?()
A . Delegate the password management controls to the help desk staff.
B . Delegate the password management controls to the Domain Users group.
C . Configure the Default Domain Policy to enforce password expiration settings.
D . Configure the Default Domain Controller Policy to enforce password expiration settings.
-
he data blocks in your form module are based on object tables. How would you create a master-detail relationship between two of these blocks?()
A . Use the Data Block Wizard and base the relation on a REF pointer.
B . In the Object Navigator, select the Relation node under the master block and click the Create icon. Build the relation manually and coordinate the blocks using triggers.
C . Use the Data Block Wizard, and base the relation on the primary key-foreign key relationship in the database.
D . This task is not possible because master-detail relations can be implemented only for blocks based on relational tables.&e
-
You are designing a strategy for migrating the UNIX user accounts to Active Directory. Which three actions should you perform?()
A . Import the user accounts as inetOrgPerson objects.
B . Import the user accounts into Active Directory by using the Ldifde command-line tool.
C . Export all user accounts from the UNIX servers to a text file.
D . Export all user accounts and their passwords from the UNIX servers to a text file. Encrypt this file to achieve extra security.
E . Assign random passwords to each user object, and securely distribute the password to the users.
F . Create the same strong password for each user object, and require users to change their passwords at first logon.&e
-
You are using Recovery Manager (RMAN) to perform backups. In which three situations would you perform a compressed backup?()
A . You are backing up to tape and your tape device performs its own compression.
B . You are making image copies, and you have not enabled tablespace compression.
C . You are using disk-based backups and disk space in your Flash Recovery Area, or other disk-based backup destinations are limited.
D . You are performing your backups to some device over a network where reduced network bandwidth is more important than CPU usage.
E . You are using some archival backup media, such as CD or DVD, where reducing backup sizes saves media costs and archival storage.
-
You are designing a DNS strategy to meet the business and technical requirements. Which two actions should you perform?()
A . Create a dynamic reverse lookup zone for each subnet.
B . Create a dynamic forward lookup for each domain.
C . Install caching-only DNS servers in the branch offices.
D . Enable the BIND secondaries option for each DNS server.
-
You are designing a strategy to improve the performance and reliability of the domain controllers. What should you do?()
A . Create one RAID-5 volume.
B . Create two RAID-5 volumes.
C . Create one mirrored volume and two RAID-5 volumes.
D . Create two mirrored volumes and one RAID-5 volume.
-
You need to perform a block media recovery on the tools01.dbf data file in the SALES database by using Recovery Manager (RMAN).Which two are the prerequisites to perform this operation?()
A . You must configure block change tracking file
B . You must have first level 1 backups for RMAN to restore blocks
C . You must ensure that the SALES database is mounted or open
D . You must have full or level 0 backups for RMAN to restore blocks
E . You must take the tools01.dbf data file offline before you start a block media recovery
-
You are designing a DNS implementation strategy for the Paris office. Which two actions should you perform?()
A . Create an Active Directory-integrated zone named cohovineyard.com.
B . Create an Active Directory-integrated zone named paris.cohovineyard.com.
C . Create a standard primary zone named paris.cohovineyard.com.
D . Configure all computers in Paris to use DC3 as their DNS server.
E . Configure all computers in Paris to use DC6 as their DNS server.
-
The datafiles of your database are ASM files. You are performing a check for datafile block corruption by using the DBVERIFY utility. What is a prerequisite for checking block corruption on an ASM datafile by using the DBVERIFY utility?()
A . The block change tracking feature must be enabled.
B . OMF must be configured on your database.
C . The database must be in ARCHIVELOG mode.
D . A USERID must be supplied.
-
You are designing a domain naming strategy for the new environment. Which two actions should you perform?()
A . Register airlines.com as a new domain name.
B . Register manifest.airlines.com as a new domain name.
C . Register manifest.blueyonderairlines.com as a new domain name.
D . Maintain the existing blueyonderairlines.com registered domain name.
E . Use the UPN suffix of airlines.com for all new users.
F . Use the UPN suffix of blueyonderairlines.com for all new users.
-
You need to perform a block media recovery on the tools01.dbf data file in the SALES database by using Recovery Manager (RMAN). Which two are the prerequisites to perform this operation? ()(Choose two)
A . You must configure block change tracking file
B . You must have first level 1 backups for RMAN to restore blocks
C . You must ensure that the SALES database is mounted or open
D . You must have full or level 0 backups for RMAN to restore blocks
E . You must take the tools01.dbf data file offline before you start a block media recovery
-
You are designing a DNS implementation strategy for the Paris office.Which two actions should you perform?()
A . Create an Active Directory-integrated zone named cohovineyard.com.
B . Create an Active Directory-integrated zone named paris.cohovineyard.com.
C . Create a standard primary zone named paris.cohovineyard.com.
D . Configure all computers in Paris to use DC3 as their DNS server.
E . Configure all computers in Paris to use DC6 as their DNS server.
-
You are designing a strategy to install the new scheduling application. Which two actions should you perform?()
A . Assign the scheduling application package to the Instructor OU.
B . Publish the scheduling application package to the Instructor OU.
C . Ensure that the scheduling application can install across slow WAN links.
D . Prevent the scheduling application from installing across slow WAN links.