Examine the command: SQL> DBMS_STATS.SET_TABLE_PREFS(’SH’, ’CUSTOMERS’, ’PUBLISH’, ’false’); Which statementdescribes the effect of the above command()
第1题:
Examine the output of the query that you executed to list the objects in the recycle bin:You verified that no table named SALES_TAB exists in the schema. Then you executed the following command to purge the objects in the recycle bin:SQL> PURGE TABLE sales_tab;What would be the outcome of this command?()

A. All three tables in the recycle bin are purged
B. Only the table with the oldest DROPSCN is purged
C. The command returns an error because multiple entries with the same name exist in the recycle bin
D. Only the table with the latest DROPSCN is purged
第2题:
After adding a new Ethernet card to a system and rebooting, the system administrator notices the card was not configured. How can the system administrator determine if there were errors during the configuration process for the card?()
第3题:
Examine the following RMAN command: RMAN> CONFIGURE ENCRYPTION FOR DATABASE ON; RMAN> BACKUP DATABASE PLUS ARCHIVELOG; Which prerequisite must be met before accomplishing the backup?()
第4题:
You are the network administrator for You administer a Windows Server 2003 computer named TestKing5. The hardware vendor for TestKing5 notifies you that a critical hotfix is available. This hotfix is required for all models of this computer that have a certain network interface card. You need to find out if the network interface card that requires the hotfix is installed in TestKing5. What are two possible ways to achieve this goal? (Each correct answer presents a complete solution. Choose two.)()
第5题:
Provide a password for the encryption
Set up an Oracle wallet for the encryption
No setup is required as it is a default encryption method
Both Oracle wallet and password must be set up for the encryption
第6题:
errpt -t
errpt -a
errpt -D
errpt
第7题:
The SKD user cannot log in to the database instance.
The objects owned by the SKD user are not accessible to any user.
The other users can access the objects owned by the SKD user, on which they have access.
The password for the SKD user expires and the user is forced to change the password at the next log in
第8题:
Data files that belong to only the root container
Data files that belong to the root container and all the pluggable databases (PDBs)
Data files that belong to only the root container and PDB$SEED
Data files that belong to the root container and all the PDBs excluding PDB$SEED
第9题:
In Event Viewer, examine the Application log.
In Windows Update, examine the update history.
At the command prompt, run Wusa.exe and specify the /kb parameter.
At the command prompt, run Verifier.exe and specify the /query parameter.
第10题:
when ASM disk goes offline
when one or more ASM files are dropped
when some disks in a disk group are offline
when some disks in a failure group for a disk group are rebalancing
第11题:
View the Exhibit to examine the error during the database startup.You open an RMAN session for the database instance. To repair the failure, you executed the following as the first command in the RMAN session:RMAN> REPAIR FAILURE;Which statement describes the consequence of the command?()

A. The command performs the recovery and closes the failures.
B. The command only displays the advice and the RMAN script required for repair.
C. The command produces an error because the ADVISE FAILURE command has not been executed before the REPAIR FAILURE command.
D. The command executes the RMAN script to repair the failure and removes the entry from the Automatic Diagnostic Repository (ADR).
第12题:
Which three statements are true about Cisco IOS Firewall?()
第13题:
You have a computer that runs Windows 7. You configure the computer to automatically install all updates.You need to verify whether a specific update is installed. What should you do?()
第14题:
The PRIMARY KEY is created along with a new index.
The PRIMARY KEY is created and it would use an existing unique index.
The PRIMARY KEY would be created in a disabled state because it is using an existing index.
The statement produces an error because the USING clause is permitted only in the CREATE TABLE command.
第15题:
The ALTER TABLE command modifies the column successfully.
The DDL operation gets higher priority and transaction for user a is rolled back.
The ALTER TABLE command waits indefinitely until user a ends the transaction.
The ALTER TABLE command fails after waiting for 60 seconds due to the resource being busy.
第16题:
Automatic statistics collection is stopped for the CUSTOMERS table.
Statistics for the CUSTOMERS table are locked and cannot be overwritten.
Existing statistics for the CUSTOMERS table become unusable for the query optimizer.
Subsequently, statistics gathered on the CUSTOMERS table are stored as pending statistics
第17题:
Automatic statistics collection is stopped for the CUSTOMERS table.
Statistics for the CUSTOMERS table are locked and cannot be overwritten.
Existing statistics for the CUSTOMERS table become unusable for the query optimizer.
Subsequently, statistics gathered on the CUSTOMERS table are stored as pending statistics.
第18题:
The shrink operation touches every block in the BOOKING table
The high-water mark (HWM) for the BOOKING table is shifted from its original position
The progress of the shrink operation is saved in the bitmap blocks of the BOOKING table
The data manipulation language (DML) triggers on the BOOKING table are executed because the shrink operation is internally handled by the INSERT/DELETE operation
第19题:
when ASM disk goes offline
when one or more ASM files are dropped
when some disks in a disk group are offline
when some disks in a failure group for a disk group are rebalancing