You want to identify the most senior employee in the company.
You want to find the manager supervising the largest number of employees.
You want to identify the person who makes the highest salary for all employees.
You want to rank the top three sales representatives who have sold the maximum number of products.
第1题:
In which scenario would TOP N analysis be the best solution? ()
第2题:
You are connected to Recovery Manager (RMAN) without a recovery catalog. There is no copy of the control file available. You want to restore the control file from an autobackup. To retrieve the autobackup, you need the database ID (DBID). In which two sources would you find the DBID? ()
第3题:
You are maintaining the SALES database for eSoft Corporation. You have not configured ASMM on the database. You want to know what size of the SGA will provide the best performance. Which advisor would you use to determine the suitable size of the SGA?()
第4题:
You have many users complaining about slow inserts into a large table. While investigating the reason, you find that the number of indexes on the table is high. You want to find out which indexes are not being used. Which method would you follow to achieve this?()
第5题:
In which scenario will you use the Flashback Version Query feature?()
第6题:
&
ACCEPT
PROMPT
&&
第7题:
DBMS_REPAIR
DBMS_SCHDULER
DBMS_STATS
DBMS_RESOURCE_MANAGER
第8题:
SQL Tuning Advisor
Undo Advisor
ADDM
Memory Advisor
第9题:
enable index monitoring and query the DBA_OBJECTS view
enable index monitoring and query the DBA_INDEXES view
enable index monitoring and query the V$OBJECT_USAGE view
enable index monitoring and view the DBA_INDEXTYPE_COMMENTS view
第10题:
You want to identify the most senior employee in the company.
You want to find the manager supervising the largest number of employees.
You want to identify the person who makes the highest salary for all employees.
You want to rank the top three sales representatives who have sold the maximum number of products.
第11题:
when you want to restore a table that has been dropped from the Recycle Bin
when you want to identify the transaction ID of the transaction that deleted some important records from a table
when you want to recover the schema of a dropped user
when you want to restore a dropped tablespace
第12题:
zones on which an attack might arrive
zones you want to protect from attack
interfaces on which an attack might arrive
interfaces you want to protect from attack
第13题:
Which substitution variable would you use if you want to reuse the variable without prompting the user each time? ()
第14题:
In which case would you use a FULL OUTER JOIN?()
第15题:
In which scenario will you use the Flashback Transaction Query feature?()
第16题:
The current time is 12:00 noon. You want to recover the USERS tablespace from a failure that occurred at 11:50 a.m. You discover that the only member of an unarchived redo log group containing information from 11:40 a.m. onwards is corrupt. With reference to this scenario, if you are not using Recovery Manager (RMAN), which recovery method would you use?()
第17题:
You want to access employee details contained in flat files as part of the EMPLOYEE table. You plan to add anew column to the EMPLOYEE table to achieve this. Which data type would you use for the new column()
第18题:
when you want to restore an important table that is dropped from the Recycle Bin
when you want to obtain the SQL statements to undo the deletion of some important records from a table by a transaction
when you want to restore a dropped user’s schema
when a row of a table is updated many times within a specific time period and you want all the versions of the row in the specified time period
第19题:
when you want to conserve tunnel resources
when the remote peer is a dialup or remote access client
when you want to configure a tunnel policy with an action of deny
when a dynamic routing protocol such as OSPF must be sent across the VPN
第20题:
EAP
Chap
Ms-Chap
PPTP
PAP
SPAP
第21题:
one external trust relationship
two external trust relationships
six external trust relationships
twelve external trust relationships
one two-way cross-forest trust relationship
第22题:
timebased recovery
log sequence recovery
cancelbased recovery
changebased recovery
第23题:
When you want all unauthenticated traffic to be redirected
When you want all clear text traffic to be redirected.
When you want all authenticated traffic to be redirected.
When you want all encrypted traffic to be redirected.
第24题:
CLOB
BLOB
BFILE
LONG RAW