By enabling the Slow Query Log because all queries that are not using indexes will be logged automatically
By enabling the Error Log because not using indexes is an error
By enabling the Slow Query Log and using the – log-queries-not-using-indexes option
By enabling the Error Log and using the – log-queries-not-using-indexes option
第1题:
You want to schedule a job to rebuild all indexes on the SALES table after the completion of a bulk load operation. The bulk load operation must also be a scheduled job that executes as soon as the first file that contains data arrives on the system. How would you create these jobs?()
第2题:
You suspect unauthorized data manipulation language (DML) operations on a particular table. You want to track users who are performing the transactions and the values used in the transactions. Also, you plan to transfer these values to another table for analysis. How would you achieve this?()
第3题:
You have many users complaining about slow inserts into a large table. While investigating the reason, you find that the number of indexes on the table is high. You want to find out which indexes are not being used. Which method would you follow to achieve this?()
第4题:
From the V$SESSION_LONGOPS view, you find that some of the database users have long-running queries that consume a lot of CPU time. This causes performance problems for other users in the database, who have much shorter queries. You would like to make sure that the users with large queries do not use all the CPU time, but you still do not want to terminate them with an error message. Which method would you follow to achieve this?()
第5题:
You are the network administrator for your company. The network consists of a single Active Directory domain. All servers run Windows Server 2003. The network contains a Web server that runs IIS 6.0 and hosts a secure intranet site. All users are required to connect to the intranet site by authenticating and using HTTPS. However, because an automated Web application must connect to the Web site by using HTTP, you cannot configure the intranet site to require HTTPS. You need to collect information about which users are connecting to the Web site by using HTTPS. What should you do?()
第6题:
By enabling the Slow Query Log because all queries that are not using indexes will be logged automatically
By enabling the Error Log because not using indexes is an error
By enabling the Slow Query Log and using the – log-queries-not-using-indexes option
By enabling the Error Log and using the – log-queries-not-using-indexes option
第7题:
In a SQL Trace log file, you should look for queries with low duration values and high read and write values.
In a query execution plan, you should look for queries with missing or out-of-date statistics.
In a SQL Trace log file, you should look for queries with high duration values and low read and write values.
In a query execution plan, you should look for queries with a large number of table scans.
第8题:
Run ipconfig /flushdns at the command prompt.
Reset the password for the local administrator user account.
From the Internet Options in Internet Explorer, clear the AutoComplete history.
From the Internet Options in Internet Explorer, delete the Temporary Internet Files.
第9题:
by using triggers
by using external tables
by using anonymous PL/SQL blocks
by auditing all DML operations on the table
第10题:
set the CPU time per call in the users profile
set the CPU time per session in the users profiles
set the CPU levels for the users’ group using Resource Manager
set the TIMED_STATISTICS parameter to TRUE in the parameter file
第11题:
Create both jobs by using events raised by the scheduler
Create both jobs by using events raised by the application
Create a job to rebuild indexes by using events arised by the application and then create another job to perform bulk load by using events raised by the scheduler
Create a job to rebuild indexes by using events arised by the Scheduller and then create another job to perform bulk load by using events raised by the application
第12题:
Java pool
Large pool
Shared pool
Streams pool
Library cache
Redo log buffer
Data dictionary cache
Database buffer cache
第13题:
You have recovered your Oracle Database 10g by using the control file backup because all copies of the current control file have been lost due to a media failure. You open your database by using the following statement: SQL>ALTER DATABASE OPEN RESETLOGS; Which of the following options is true about using the RESETLOGS option?()
第14题:
For the V$SESSION_LONGOPS view, you find that some of the database users have long-running queries that consume a lot of CPU time. This causes performance problems for other users in the database, who have much shorter queries. You would like to make sure that the users with large queries do not use all the CPU time, but you still do not want to terminate them with an error message. Which method would you follow to achieve this?()
第15题:
You are using replication and the binary log files on your master server consume a lot of disk space. Which two steps should you perform to safely remove some of the older binary log files?()
第16题:
You are a professional level SQL Server 2005 database administrator in an international corporation named Wiikigo. You are experienced in implementing high-availability solutions, monitoring the database server, and design deployment. In the company, you major job is the deployment, maintenance and support of Microsoft SQL Server 2005. You work as a database administrator for your company. The users report the slow performance of a SQL Server 2005 application. You are required to identify the queries which perform slowly because of blocking. Which action should you perform?()
第17题:
You want users to log on to Active Directory by using a new Principal Name (UPN). You need to modify the UPN suffix for all user accounts. Which tool should you use()
第18题:
Enable debug logging.
Enable automatic testing for simple queries.
Enable automatic testing for recursrve queries.
Configure event logging to log errors and warnings.
第19题:
Check the application log on the Web server.
Use Network Monitor to capture network traffic on the Web server.
Review the log files created by IIS on the Web server.
Configure a performance log to capture all Web service counters. Review the performance log data.
第20题:
Dsmod
Netdom
Redirusr
Active Directory Domains and Trusts
第21题:
enable index monitoring and query the DBA_OBJECTS view
enable index monitoring and query the DBA_INDEXES view
enable index monitoring and query the V$OBJECT_USAGE view
enable index monitoring and view the DBA_INDEXTYPE_COMMENTS view
第22题:
Set the CPU time per call in the users profile.
Set the CPU time per session in the users profile.
Set the CPU levels for the user’s group using Resource Manager.
Set the TIMED_STATISTICS parameter to TRUE in the parameter file.
第23题:
Dsmod
Netdom
Redirusr
Active Directory Domains and Trusts
第24题:
Create both jobs by using events raised by the scheduler
Create both jobs by using events raised by the application
Create a job to rebuild indexes by using events arised by the application and then create another job to perform bulk load by using events raised by the scheduler
Create a job to rebuild indexes by using events arised by the Scheduller and then create another job to perform bulk load by using events raised by the application