URL white lists
intelligent pre-screening
trickling
scan mode extensions
第1题:
A. show security utm anti-virus status
B. show security anti-virus database status
C. show security utm anti-virus database
D. show security utm anti-virus update
第2题:
You created a custom menu for the Order Entry application. Which step do you perform before attaching the menu module to the form module?()
第3题:
Which command do you use to display the status of an antivirus database update?()
第4题:
You have not configured Oracle Managed Files (OMF) in your database. You do not want to scan the entire datafile every time an incremental backup is performed. You decide to enable the block change tracking feature. Which statement will you use to enable the block change tracking feature?()
第5题:
You work as a database administrator for Certkiller .com. Your database is in NOARCHIVELOG mode. The database has been configured with three redo logs groups, and there have been five log switches. You lost one non-system-critical data file from your database. Which method would you use to recover the data file?()
第6题:
Your company has file servers located in an organizational unit named Payroll. The file servers contain payroll files located in a folder named Payroll. You create a GPO. You need to track which employees access the Payroll files on the file servers. What should you do()
第7题:
You are the network administrator for Company.com. Your Windows 2000 Professional computer has 128 MB of RAM and two physical hard disks. Each hard disk has a single partition configured as drive C and D. Each partition has more than 500 MB of free disk space. Windows 2000 Professional and all applications are installed on drive C. You frequently run two or more memory-intensive graphics applications simultaneously. You notice that access to drive C is much slower when you are using the graphics applications. You want to maximize overall disk performance for your computer. What should you do?()
第8题:
ALTER DATABASE ENABLE BLOCK CHANGE TRACKING;
ALTER SYSTEM ENABLE BLOCK CHANGE TRACKING USING FILE <path>;
ALTER DATABASE ENABLE BLOCK CHANGE TRACKING USING FILE <path>;
ALTER SYSTEM ENABLE BLOCK CHANGE TRACKING;
第9题:
Restore all the data files and open the database
Create the data file and perform tablespace recovery
No need to restore any file, just recover the database
Restore only the system data file and recover the database
Restore only lost date file and performtablespacerecovery
第10题:
Adjust the processor scheduling to optimize for background services.
Connect a USB flash drive to the computer. Enable the ReadyBoost feature.
Configure the virtual memory file to exist on the same drive as the operating system.
Configure the local security policy setting of the computer to clear the virtual page file upon shutdown.
第11题:
to recover a dropped tablespace
to recover data from a truncated table
to recover a data file that has been shrunk
to recover a database to the state that existed before the RESETLOGS operation
第12题:
In the Backup utility, select the Verify data after backup option.
Run the Ntbackup //TestKing2/TestKingProjects /v:yes command.
Restore the file to a temporary folder. Verify that the database file contains the correct data. Copy the restored file to the TestKingProjects folder.
Restore the file to a temporary folder. Use the Windiff utility to compare the file in the temporary folder to the file in the TestKingProjects folder. Copy the restored file to the TestKingProjects folder.
第13题:
Certkiller .com has asked you to create a file management application to monitor the hosts file.Certkiller .com has instructed you to change the hosts file if it has been changed.You, therefore, need to display the size and whether the hosts file is set to read-only.What should you do?()
A.
B.
C.
D.
第14题:
You have enabled backup optimization for the RMAN environment.Identify two criteria on which RMAN will skip the file, if it has already been backed up.()
第15题:
To determine whether a particular file has a virus by only inspecting a few initial packets before receiving the entire file, which UTM feature do you enable?()
第16题:
In which case would you use the Flashback Database feature to perform a recovery?()
第17题:
You have enabled backup optimization for the RMAN environment. Identify two criteria on which RMAN will skip the file, if it has already been backed up.()
第18题:
Your portable computer has two 512-MB memory modules installed in the only two memory slots available. You need to improve the speed of your computer. What should you do? ()
第19题:
You are the network administrator for You administer a Windows Server 2003 computer named TestKing2. contains a shared folder named TestKingProjects. You use the Backup utility once each day to back up the TestKingProjects folder. You discover that a database file in the TestKingProjects folder is corrupt. You confirm that the file corruption is not the result of a virus. You need to replace the corrupted file by using the latest backup. You do not know whether the file was corrupted before or after the latest backup was completed. You need to verify that the file in the backup can be opened successfully before you overwrite the existing file. What should you do?()
第20题:
ALTER DATABASE ENABLE BLOCK CHANGE TRACKING
ALTER SYSTEM ENABLE BLOCK CHANGE TRACKING USING FILE
ALTER DATABASE ENABLE BLOCK CHANGE TRACKING USING FILE
ALTER SYSTEM ENABLE BLOCK CHANGE TRACKING
第21题:
Configure the paging file to reside on drive C only
Configure the paging file to reside on drive D only
Configure the initial size of the paging file and the maximum size of paging file to 64 MB
Configure the initial size of the paging file and the maximum size of the paging file to 128 MB
Configure the initial size of the paging file and the maximum size of the paging file to 256 MB
第22题:
show security utm anti-virus status
show security anti-virus database status
show security utm anti-virus database
show security utm anti-virus update
第23题:
URL white lists
intelligent pre-screening
trickling
scan mode extensions
第24题:
Select file-->Administration-->Convert
Select file-->Administration-->Execute
Select file-->Administration-->Compile File
No further step is necessary.