-
USER_DATA is a nonencrypted tablespace that contains a set of tables with data. You want to convert all existing data in the USER_DATA tablespace and the new data into the encrypted format. Which methodswould you use to achieve this?()
A . Use Data Pump to transfer the existing data to a new encrypted tablespace
B . Use ALTER TABLE MOVE to transfer the existing data to a new encrypted tablespace
C . Use CREATE TABLE AS SELECT to transfer the existing data to a new encrypted tablespace
D . Enable row movement for each table to be encrypted and then use ALTER TABLESPACE to encrypt the tablespace
E . Encrypt the USER_DATA tablespace using the ALTER TABLESPACE statement so that all the data in the tablespace is automatically encrypted
-
You want users to log on to Active Directory by using a new Principal Name (UPN). You need to modify the UPN suffix for all user accounts. Which tool should you use()
A . Dsmod
B . Netdom
C . Redirusr
D . Active Directory Domains and Trust
-
You want to disable resumable space allocation for all sessions.Which value should be assigned to the RESUMABLE_TIMEOUT parameter to disable resumable space allocation for all sessions?()
A . 0
B . 10
C . 100
D . NULL
-
An operator wants to move all files inside the directory /home/operator to the current directory. Which of the following commands will complete the task?()
A . mv /home/operator .
B . mv /home/operator/* .
C . mv /home/operator ../..
D . mv /home/operator/all ../home/operator
-
Refer to the exhibit. You want to use all the routes in the EIGRP topology for IP load balancing. Which two EIGRP subcommands wou ld you use to accomplish this goal?()https://assets.asklib.com/images/image2/2018073016331495540.jpg
A . traffic - share balanced
B . distance
C . maximum- paths
D . default - network
E . variance
-
You plan to have a larger moving window size for the default system-defined moving window baseline because you want to use the adaptive threshold. Which statement factors in this consideration while increasing the size of the moving window?()
A . The collection level for the AWR should be set to BASIC
B . The moving window size must be less than Undo Retention
C . The moving window size should be greater than the Automatic Workload Repository (AWR) retention period
D . The moving window size should be equal to or less than the Automatic Workload Repository (AWR) retention period
-
You want to check all the data blocks being written to the datafiles by analyzing the data on each block every time the DBWn process writes. Which action will you perform to check the data blocks?()
A . Set the value of the DB_BLOCK_CHECKING initialization parameter to TRUE
B . Use the ANALYZE utility.
C . Use the DBVERIFY utility.
D . Use the DBMS_REPAIR package.
-
Company.com wants to reassign a host bus adapter (HBA) from one partition to another to handle increased I/O workload on that partition. What needs to be done to dynamically move the card?()
A . Use the rmdev command to remove the card from the current partition before doing the DLPAR process.
B . Take the source partition down and do the DLPAR function on the target partition.
C . Assign the card to the required section of the target partition and run cfgmgr.
D . Dynamically remove the card from the source and add to target profile then reactivate the target profile.
-
You want to move all objects of the APPS user in the test database to the DB_USER schema of theproduction database. Which option of IMPDP would you use to accomplish this task()
A . FULL
B . SCHEMAS
C . TRANSFORM
D . REMAP_SCHEMA
E . REMAP_TABLESPACE
-
You have an Exchange Server 2010 organization named contoso.com.All users have a Personal Archive.You need to ensure that messages that are older than 90 days are moved from the user’s mailboxto the Personal Archive.What should you do?()
A . Create a retention tag.Assign the retention tag to a retention policy.Apply the retention policy to all users
B . Create a retention tag.Assign the retention tag to a retention policy.Create a journal rule
C . Create managed custom folder.Run the New Managed Content Settings wizard.Create a journal rule
D . Run the New Managed Content Settings wizard.Create a new managed folder mailbox policy.Apply the policy to all user
-
You want to create a template to be used as a standard for all company reports. What is the easiest way to do this?()
A . Open an existing template file, rename it and modify the template objects.
B . Open the report wizard and create a new template.
C . Open the layout model and copy the paste items from the default templates provided in report builder.
D . Templates cannot be modified in release 2.
-
You have 30 NT 4.0 machines and 5 W2k Pro machines on your network. You want to share files on the W2kPro machines that only they can access. The NT 4 machines must not be able to access those shared files at all? ()
A . You should import hisecws.inf security template.
B . You should import hisecdc.inf security template.
C . You should import securews.inf security template.
D . You should import compatws.inf security template.
-
You want to use the Flashback Transaction Query feature to identify all the changes made to your database within a specific time period. What is a prerequisite for using the Flashback Transaction Query feature?()
A . You must use automatic undo management in the database.
B . You must configure OMF in your database.
C . You must configure ASM for storing the datafiles.
D . You must multiplex the online redo log file.
-
You are performing the shrink operation on the SCOTT.EMP table. You want to perform the same operation on all dependent objects of the SCOTT.EMP table. What is NOT a prerequisite for the operation?()
A . You must enable the row movement on the SCOTT.EMP table.
B . You must define the tablespace of the SCOTT.EMP table for automatic segment space management.
C . You must use the CASCADE clause in the ALTER TABLE SHRINK SPACE statement.
D . You must use the COMPACT clause in the ALTER TABLE SHRINK SPACE statement.
-
You want users to log on to Active Directory by using a new User Principal Name (UPN). You need to modify the UPN suffix for all user accounts. Which tool should you use()
A . Dsmod
B . Netdom
C . Redirusr
D . Active Directory Domains and Trust
-
You have an Exchange Server 2007 organization. You install a new Exchange Server 2010 Mailbox server.You need to move all mailboxes to the Exchange Server 2010 server. What are two possible ways to achieve this goal()?
A . From the Exchange Server 2007 Exchange Management Shell, run the Move-Mailbox cmdlet.
B . From the Exchange Server 2010 Exchange Management Shell, run the New-MoveRequest cmdlet
C . From the Exchange Server 2007 Exchange Management Console (EMC), run the Move Mailbox wizard.
D . From the Exchange Server 2010 Exchange Management Console (EMC), run the New Local Move Request wizard.
-
You want users to log on to Active Directory by using a new User Principal Name (UPN). You need to modify the UPN suffix for all user accounts. Which tool should you use()
A . Dsmod
B . Netdom
C . Redirusr
D . Active Directory Domains and Trust
-
You want to move all objects of the APPS user in the test database to the DB_USER schema of the productiondatabase. Which option of IMPDP would you use to accomplish this task()
A . FULL
B . SCHEMAS
C . TRANSFORM
D . REMAP_SCHEMA
E . REMAP_TABLESPACE
-
You are an administrator of a small business network. You have one dial-up account at an ISP and want all computers on your network connect to the Internet. What should you do? ()
A . Enable Internet Connection Sharing
B . Enable on-demand dialing
C . Enable sharing a modem on one computer on the network
D . Configure a DHCP Server
E . Disable Internet Connection Sharing
F . Configure all the other computers to be DHCP enabled.
-
The company wants to evaluate making all business office users administrators on their client computers. You need to design a method to ensure that this change can be made in a manner that meets business and security requirements. What should you do?()
A . On all domain controllers, implement registry access auditing for all registry keys that are considered sensitive by the company’s written security policy
B . On all client computers, implement logon auditing for all user account logons
C . On all client computers, configure registry access auditing for all registry keys that are considered sensitive by the company’s written security policy
D . On all domain controllers, implement logon auditing for all user account logo
-
You want to set up the Oracle Database 10g installation to follow the French language, with France as the territory, and the date to be displayed in French for all users’ sessions. Which environmental variable would you set to achieve this objective?()
A . NLSLANG
B . NLSLENGTHSEMANTICS
C . NLSTERRITORY
D . NLSLANGUAGE
E . NLSCHARACTERSET
F . NLSDATELANGUAGE
G . NLSNCHARCHARACTERSET
-
Are you looking for a good book to read? Do you need information about universities in the United States? Do you want to know the correct price of a used car? Would you like to read newspapers and magazines from all over different countries? Do you need a quiet place to study? Did you answer yes to any of these questions? Then you should visit the information placeyour local library.
A library is more than just a place where books are stored. A library is a source of information. The information may come from books (fiction , nonfiction, or reference book), from periodicals (newspapers, magazines, and journals), from audio-visual materials (records, cassettes, microfilms, video tapes, etc.), or even from a computer terminal.
Students go to libraries to study and write research papers. The periodicals room of a university library is where foreign students often find newspapers and magazines from their countries . In the reference room, they can find catalogs(目录) from many universities in the U.S. and other countries. If you are buying a used car, the reference librarian can show you the Blue Book which lists the prices of new and used cars. People who need information in a hurry can telephone the reference librarian at many libraries.
There are as many different library services as there are types of people who use them. Children’s libraries provide materials for young readers. They sometimes have storytellers who read stories to groups of children , and a few have computers for the children to play with. Music lovers can listen to recordings of their favorite musicians in music libraries . Some libraries have painting and sculpture exhibits, and most libraries offer special services for blind people, such as books in Braille, ―talking‖ books , and Kurzweil Reading Machines.
Libraries provide entertainment as well as information. Novels and short stories from a library’s fiction collection are a good source of enjoyable reading practice. Public libraries often sponsor lectures on topics of interest to member of the community, and a few even offer concerts and films. No matter what your interests are, you will find that a library can be a great place to enjoy yourself while you learn.
1.What is another name for a library?()
A.A bookstore.
B.The periodicals room.
C.A reference librarian.
D.The information place
2.In the reference room of the library you can find().
A. the fiction collection
B. newspapers and magazines
C. university catalogs
D. materials for young readers
3.Which of the following is NOT an example of a library service?()
A. Used cars.
B. Art exhibits.
C. Children’s storytellers.
D. Kurzweil Reading Machines
4."A library can be a great place to enjoy yourself while you learn." This means you can()in a library.
A. talk and laugh as much as you want
B. find entertainment and information
C. play with computers
D. enjoy yourself by doing everything you can
5.What is the main idea of the whole text? Choose the BEST answer.()
A. There are many kinds of libraries.
B. There are many books stored in a library.
C. Libraries provide entertainment.
D. Libraries offer many different services.
-
You have two servers named Server1 and Server2 that run Windows Server 2003 Service Pack 2 (SP2).Server1 is configured as a DHCP server.You plan to decommission the DHCP service on Server1.You need to move the DHCP server configuration to Server2. The configuration must include all configured scopes, leases, and DHCP options.What should you do first? ()
A. From the DHCP snap-in, export list.
B. From the DHCP snap-in, back up the server.
C. From Windows Explorer, copy the %systemroot%\System32\Dhcp\DHCP.mdb file.
D. From Windows Explorer, copy the %systemroot%\System32\Dhcp\backup\dhcpcfg file.
-
You want me to move all of them to C?A.你要我把他们都搬到 C 楼?
B.要我都搬到 C 楼去吗?