You have joined a new organization as a Database Administrator. The Security Administrator in your organization has kept human errors, such as erroneously dropping users, tables, and important data, to a minimum by carefully granting only the necessary privileges to each user. As a result of several ongoing transactions within your database, you discover that the flashback logs are rapidly increasing in the flash recovery area. To avoid out-of-space errors, you decide to delete the flashback logs from the flash recovery area. How can you delete the flashback logs from the database if your database is up and running?()
第1题:
What is necessary for your query on an existing view to execute successfully? ()
第2题:
Your database is in NOARCHIVELOG mode. After which two operations you should take the backup of control file?()
第3题:
You have a large amount of historical data in an operating system file. Some analysts in your organization need to query this data. The file is too large to load into your current database. Which is the most effective method to accomplish the task?()
第4题:
There is a problem with one of the disks used for your database and your system administrator informs you that the disk needs to be replaced. The replacement disk will not be available until tomorrow. There was only one data file on this disk; it belongs to the USERS tablespace in your PROD database. Your PROD database runs in ARCHIVELOG mode and nightly online backups are taken. The users need to be able to access the data in the USERS tablespace before the replacement disk arrives. You have already taken the USERS tablespace offline and have restored the data file from last night’s backup to a new disk. Which additional steps are required in order to make the USERS tablespace available?()
第5题:
In which two cases would you use an outer join? ()
第6题:
You have an Exchange Server 2010 organization.You create a distribution group for all users in your company.You need to ensure that new users can add their mailboxes to the distribution group.What should you do?()
第7题:
You have an Exchange Server 2010 organization. You plan to delegate Exchange administrative rights to some users in the organization. You need to recommend a solution that tracks all changes made to the Exchange organization. What should you include in the solution?()
第8题:
You have an Exchange organization.All servers in the organization have Exchange Server 2010 Service Pack 1 (SP1) installed. The organization contains two Mailbox servers named Server1 and Server2.Each Mailbox server has one mailbox database and one public folder database. You discover that all users create public folders on Server1 only. You need to ensure that all users create public folders on Server2 only. What should you do?()
第9题:
You are a systems administrator responsible for managing a Windows Server 2008 Web server. Recently,your organization set up a new IIS Web site that will be accessed by users outside of your organizations.Consultants should be able to connect to this Web site, using IIS Manager. Your organization’s securitypolicy prevents you from creating domain accounts or local user accounts for these users. You attempt touse the IIS Manager Permissions feature for the Web site. However, when you click Allow User, you areable to select only Windows users. How can you resolve this problem?()
第10题:
administrator audit logging
circular logging
diagnostic logging
Windows Security Auditing
第11题:
Get-EventLogLevel
Get-ExchangeServer
Exchange Best Practices Analyzer
Microsoft Baseline Security Analyzer (MBSA)
第12题:
Only bring the tablespace back online.
Only recover the tablespace and then bring the tablespace back online.
Shut down the database, recover the data file and then start up the database.
Issue the ALTER DATABASE RENAME FILE command, recover the tablespace, and then bring the tablespace online.
Recover the tablespace, issue the ALTER DATABASE RENAME FILE command, and then bring the tablespace online.
第13题:
You work as a database administrator for Certkiller .com. Your database is in NOARCHIVELOG mode. The database has been configured with three redo logs groups, and there have been five log switches. You lost one non-system-critical data file from your database. Which method would you use to recover the data file?()
第14题:
A data file become corrupted in your database due to bad sectors on the disk. Because of corruption, you lost all the important tables in that data file. Which method would you use for recovery?()
第15题:
While creating a database using Database Configuration Assistant tool, you created a database default temporary tablespace. Which activity would cause the default temporary tablespace of the database to be used?()
第16题:
You were recently hired by an organization as a database administrator. You are asked to find out whether the currently functional listener process, named L1, has been password protected or not. You are not familiar with the file system of the new organization. How would you accomplish the task?()
第17题:
Flashback Database is enabled in your Oracle 10g database. One of your database users erroneously purged an important table residing in his schema. The table was purged sometime between 10:00 P.M. and 10:30 P.M. The next day, you decide to flash back the database. Before you flash back the database, you want to ensure that you have all the necessary flashback data. Which dynamic performance view must you use to determine whether you have the required flashback data to recover the purged table?()
第18题:
You have an Exchange Server 2010 organization. You have a global security group named Legal that contains all the members of your companys legaldepartment. The companys security policy states that the Legal group must be able to search all mailboxes for e-mailmessages that contain specific keywords. You need to recommend a solution for the organization that complies with the security policy. What should you include in the solution?()
第19题:
You are an IIS Web server administrator implementing authentication settings for a new Web site.According to the requirements for the Human Resources Web site, users should be prompted forauthentication information when they attempt to access the site. The site will be accessed only by userswho have accounts in your organization’s Active Directory domain. You have already configured the filesystem permissions for the content based on the appropriate settings. You also want to maximize securityof the site. Which two actions should you take to meet these requirements?()
第20题:
You have an Exchange Server 2010 organization. You need to recommend a mailbox storage management solution for your organization to meet thefollowing requirements: .Apply quota limits for users by department.Automatically apply quota limits for new users What should you recommend?()
第21题:
You are employed as the exchange administrator at TestKing.com. The TestKing.com network containsan Exchange Server 2010 Organization. TestKing.com has its headquarters in Chicago and a branchoffice in Dallas. TestKing.com has a global security group named TestFinance. TestFinance contains all the users in theFinance department. A new TestKing.com policy state that TestFinance have the nesessary permissons tosearch the mailboxes for e-mail messages containing certain words. The CIO wants you to recommend asolution that will comply with the new policy. What should you do?()
第22题:
A storage group for each department.
A mailbox database for each department.
An organizational unit for each department.
A managed folder mailbox policy for each department.
第23题:
The tables being joined have NOT NULL columns.
The tables being joined have only matched data.
The columns being joined have NULL values.
The tables being joined have only unmatched data.
The tables being joined have both matched and unmatched data.
Only when the tables have a primary key-foreign key relationship.