单选题When configuring non-IP point-to-point networks on clusters that are larger than two nodes, which Type of configuration should be defined?()AA startBA ringCA target mode fcDA target mode scsi

题目
单选题
When configuring non-IP point-to-point networks on clusters that are larger than two nodes, which Type of configuration should be defined?()
A

 A start

B

 A ring

C

 A target mode fc

D

 A target mode scsi


相似考题
更多“单选题When configuring non-IP point-to-point networks on clusters that are larger than two nodes, which Type of configuration should be defined?()A  A startB  A ringC  A target mode fcD  A target mode scsi”相关问题
  • 第1题:

    You are maintaining a database that is in ARCHIVELOG mode. You have configured the flash recovery area in your database. The database is in MOUNT EXCLUSIVE mode, and you want to configure the Flashback Database feature. Which two options are NOT required to configure the Flashback Database feature? ()

    • A、 Open the database in read-only mode.
    • B、 Set the retention target with the DB_FLASHBACK_RETENTION_TARGET initialization parameter.
    • C、 Enable the block change tracking feature.
    • D、 Execute the ALTER DATABASE FLASHBACK ON statement.

    正确答案:A,C

  • 第2题:

    Attaching to a SCSI storage system through redundant paths will provide which of the following?()

    • A、The ability to interleave writes to the array
    • B、High Availability and failover
    • C、LUN sharing via Target Mode SCSI on the storage system
    • D、A greater number of LUNS available on the same storage system

    正确答案:B

  • 第3题:

    When configuring non-IP point-to-point networks on clusters that are larger than two nodes, which Type of configuration should be defined?()

    • A、 A start
    • B、 A ring
    • C、 A target mode fc
    • D、 A target mode scsi

    正确答案:B

  • 第4题:

    Which two statements are true about the configure exclusive command?()

    • A、It allows users to retain all uncommitted changes when exiting exclusive configuration mode.
    • B、It allows multiple users to edit private copies of the configuration concurrently.
    • C、It causes the loss of all uncommitted changes when exiting exclusive configuration mode.
    • D、It excludes other users from editing the configuration.

    正确答案:C,D

  • 第5题:

    Which new key architectural element introduced in WebLogic Server l2c should you take  advantage of when designing Disaster Recovery Centers with active - passive mode?()

    • A、MAN Clusters, because they would allow you to synchronously replicate state in low latency networks 
    • B、WAN Clusters, because they would allow you to asynchronously replicate state in nonlow latency networks.  
    • C、Transaction Log in the database, because you could avoid synchronizing two replication technologies (database and file)  
    • D、Data Guard, because it is the most effective way to replicate a state across locations
    • E、GoldenGate, because it is the most effective way to replicate a state across locations

    正确答案:E

  • 第6题:

    多选题
    Which two statements are true about the configure exclusive command?()
    A

    It allows users to retain all uncommitted changes when exiting exclusive configuration mode.

    B

    It allows multiple users to edit private copies of the configuration concurrently.

    C

    It causes the loss of all uncommitted changes when exiting exclusive configuration mode.

    D

    It excludes other users from editing the configuration.


    正确答案: B,C
    解析: 暂无解析

  • 第7题:

    单选题
    Fibre channel requires which of the following elements?()
    A

     FC Initiator

    B

     Multi-Mode fibre

    C

     Physical Adapter

    D

     Fibre Target Management Agent


    正确答案: D
    解析: 暂无解析

  • 第8题:

    单选题
    Which new key architectural element introduced in WebLogic Server l2c should you take  advantage of when designing Disaster Recovery Centers with active - passive mode?()
    A

    MAN Clusters, because they would allow you to synchronously replicate state in low latency networks 

    B

    WAN Clusters, because they would allow you to asynchronously replicate state in nonlow latency networks.  

    C

    Transaction Log in the database, because you could avoid synchronizing two replication technologies (database and file)  

    D

    Data Guard, because it is the most effective way to replicate a state across locations

    E

    GoldenGate, because it is the most effective way to replicate a state across locations


    正确答案: E
    解析: 暂无解析

  • 第9题:

    单选题
    You are creating a client application and configuring it to call a Windows Communication Foundation (WCF) service.When the application is deployed, it will be configured to send all messages to a WCF routing service. You need to ensure that the application can consume the target service after the application is deployed. What should you do?()
    A

    In the client application, add a service reference to the router service. In the client binding configuration, specify the address of the router service.

    B

    In the client application, add a service reference to the target service. In the client binding configuration, specify the address of the target service.

    C

    In the client application, add a service reference to the router service. In the client binding configuration, specify the address of the target service.

    D

    In the client application, add a service reference to the target service. In the client binding configuration, specify the address of the router service.


    正确答案: A
    解析: 暂无解析

  • 第10题:

    单选题
    When configuring non-IP point-to-point networks on clusters that are larger than two nodes, which Type of configuration should be defined?()
    A

     A start

    B

     A ring

    C

     A target mode fc

    D

     A target mode scsi


    正确答案: A
    解析: 暂无解析

  • 第11题:

    多选题
    Examine the following command that is used to duplicate a database on the same host:   RMAN> RUN {  ALLOCATE AUXILIARY CHANNEL, aux 1 DEVICE TYPE DISK; DUPLICATE TARGET DATABASE TO auxdb SKIP READONLY; / } Which two statements describe the effect after the database is duplicated successfully?()
    A

    The data files of the read-only tablespaces in the target database are not duplicated

    B

    The read-only tablespaces in the target database are still defined in new the database

    C

    The read-only tablespaces in the target database are changed to online after duplication

    D

    The data files of the read-only tablespaces in the target database get duplicated

    E

    The read-only tablespaces in the target database are not defined in the new database


    正确答案: D,B
    解析: 暂无解析

  • 第12题:

    多选题
    Examine the following command that is used to duplicate a database on the same host: RMAN> RUN { ALLOCATE AUXILIARY CHANNEL, aux 1 DEVICE TYPE DISK; DUPLICATE TARGET DATABASE TO auxdb SKIP READONLY; / } Which two statements describe the effect after the database is duplicated successfully? ()(Choose two)
    A

    The data files of the read-only tablespaces in the target database are not duplicated

    B

    The read-only tablespaces in the target database are still defined in new the database

    C

    The read-only tablespaces in the target database are changed to online after duplication

    D

    The data files of the read-only tablespaces in the target database get duplicated

    E

    The read-only tablespaces in the target database are not defined in the new database


    正确答案: D,B
    解析: 暂无解析

  • 第13题:

    When performing recover of a database in NOARCHIVELOG mode with RMAN, the target database must be in the () state to restore the control file.

    • A、OPEN
    • B、IDLE
    • C、MOUNT
    • D、NOMOUNT

    正确答案:D

  • 第14题:

    Fibre channel requires which of the following elements?()

    • A、 FC Initiator
    • B、 Multi-Mode fibre
    • C、 Physical Adapter
    • D、 Fibre Target Management Agent

    正确答案:C

  • 第15题:

    A cluster administrator is trying to configure tmssa for the non-IP network. Having installed the devices.ssa.tm.rte fileset, what is the next step that must be performed to create the target mode devices?()  

    • A、 Reboot each cluster node.
    • B、 Change the ssa node number to a non-zero value.
    • C、 Change the SSAR device state from defined to available.
    • D、 Run the cfgmgr process on each node to create the target mode devices.

    正确答案:B

  • 第16题:

    Examine the following command that is used to duplicate a database on the same host: RMAN> RUN { ALLOCATE AUXILIARY CHANNEL, aux 1 DEVICE TYPE DISK; DUPLICATE TARGET DATABASE TO auxdb SKIP READONLY; / } Which two statements describe the effect after the database is duplicated successfully? ()(Choose two)

    • A、The data files of the read-only tablespaces in the target database are not duplicated
    • B、The read-only tablespaces in the target database are still defined in new the database
    • C、The read-only tablespaces in the target database are changed to online after duplication
    • D、The data files of the read-only tablespaces in the target database get duplicated
    • E、The read-only tablespaces in the target database are not defined in the new database

    正确答案:A,B

  • 第17题:

    Examine the following command that is used to duplicate a database on the same host:   RMAN> RUN {  ALLOCATE AUXILIARY CHANNEL, aux 1 DEVICE TYPE DISK; DUPLICATE TARGET DATABASE TO auxdb SKIP READONLY; / } Which two statements describe the effect after the database is duplicated successfully?()

    • A、 The data files of the read-only tablespaces in the target database are not duplicated
    • B、 The read-only tablespaces in the target database are still defined in new the database
    • C、 The read-only tablespaces in the target database are changed to online after duplication
    • D、 The data files of the read-only tablespaces in the target database get duplicated
    • E、 The read-only tablespaces in the target database are not defined in the new database

    正确答案:A,B

  • 第18题:

    单选题
    Fibre channel requires which of the following elements?()
    A

    FC Initiator

    B

    Multi-Mode fibre

    C

    Physical Adapter

    D

    Fibre Target Management Agent


    正确答案: C
    解析: 暂无解析

  • 第19题:

    单选题
    When performing recover of a database in NOARCHIVELOG mode with RMAN, the target database must be in the () state to restore the control file.
    A

    OPEN

    B

    IDLE

    C

    MOUNT

    D

    NOMOUNT


    正确答案: B
    解析: 暂无解析

  • 第20题:

    多选题
    Which two statements describe the behavior of the server's SQL mode?()
    A

    The server's SQL mode determines how the server should behave when performing data validation check and interpreting different forms of syntax

    B

    The server's SQL mode determines whether the server should be read-only or should accept commands such as INSERT and UPDATE

    C

    The server's SQL mode can be changed at the session level with a SET SESSION sql_mode=new_value command

    D

    The server's SQL mode, when globally set on a slave server, applies to events sent from the master


    正确答案: D,A
    解析: 暂无解析

  • 第21题:

    多选题
    Which two statements are true when using the configure exclusive CLI command?()
    A

    Multiple users can enter configuration mode and have their own private configuration.

    B

    When a user commits, only the user's changes are committed.

    C

    A message indicates which other users are in configuration mode and what portion of the configuration they are editing.

    D

    Only a single user can edit the configuration.


    正确答案: A,B
    解析: 暂无解析

  • 第22题:

    单选题
    Attaching to a SCSI storage system through redundant paths will provide which of the following?()
    A

    The ability to interleave writes to the array

    B

    High Availability and failover

    C

    LUN sharing via Target Mode SCSI on the storage system

    D

    A greater number of LUNS available on the same storage system


    正确答案: D
    解析: 暂无解析

  • 第23题:

    单选题
    Which two components are created during configuration of space-efficient storage in an extent pool()
    A

    volume and virtual space

    B

    background copy and target copy

    C

    virtual space and repository space

    D

    source volume and target volume


    正确答案: B
    解析: 暂无解析

  • 第24题:

    单选题
    A cluster administrator is trying to configure tmssa for the non-IP network. Having installed the devices.ssa.tm.rte fileset, what is the next step that must be performed to create the target mode devices?()
    A

     Reboot each cluster node.

    B

     Change the ssa node number to a non-zero value.

    C

     Change the SSAR device state from defined to available.

    D

     Run the cfgmgr process on each node to create the target mode devices.


    正确答案: A
    解析: 暂无解析