Monitor thealert.logfile
Enable server-side SQL tracing for user sessions
Enable fine-grained auditing for the customer table
Enable Fine-Grained Access Control (FGAC) for the customer table
Write a database trigger on the customer table on the SELECT event
第1题:
Your database is functioning in NOARCHIVELOG mode. Your database contains 15 tablespaces. You want to use Recovery Manager (RMAN) to perform backups. Which two backups would you be able to perform when the database is being accessed by users?()
第2题:
In one of your online transaction processing (OLTP) applications, users are manipulating and querying a database table simultaneously. From the Segment Advisor, you find that one of the tables is highly fragmented and you want to shrink the table immediately without affecting the currently active queries. Which option would you use with the ALTER TABLE command to achieve this objective?()
第3题:
You work as a database administrator for Supportcenter.cn. You suspect that in one of your applications the customer table is being accessed by some unauthorized users. Which option would you use to monitor the queries being executed on the customer table?()
第4题:
You observe that in your PROD database, customer information is being modified by some unauthorized users. You want to keep track of all of the transactions happening on the table using PL/SQL. Which type of PL/SQL subprogram or construct would you use to accomplish this task?()
第5题:
You are a professional level SQL Server 2005 database administrator in an international corporation named Wiikigo. You are experienced in implementing high-availability solutions, monitoring the database server, and design deployment. In the company, you major job is the deployment, maintenance and support of Microsoft SQL Server 2005. You work as a database administrator for your company. You utilize the SP:Recompile event class to run SQL Server Profiler. You find that a great amount of recompiles occurring. The possible causes of the large number of recompiles should be identified. From the flowing four options, which one is the most possible cause of the problem?()
第6题:
functions
packages
procedures
database triggers
anonymous PL/SQL block
第7题:
Database Control
Management Server
Management Repository
Application Server Control
Oracle Management Agent
第8题:
Memory Advisors
Segment Advisors
SQL Tuning and Access Advisors
Automated Workload Repository (AWR)
Automatic Database Diagnostic Monitor (ADDM)
第9题:
Monitor thealert.logfile
Enable server-side SQL tracing for user sessions
Enable fine-grained auditing for the customer table
Enable Fine-Grained Access Control (FGAC) for the customer table
Write a database trigger on the customer table on the SELECT event
第10题:
Hot backup
Online backup
consistent backup
incremental backup
inconsistent backup
第11题:
DBA_AUDIT_TRAIL
DBA_AUDIT_SESSION
DBA_FGA_AUDIT_TRAIL
DBA_COMMON_AUDIT_TRAIL
第12题:
REBUILD
CASCADE
TRUNCATE
ROW MOVEMENT
SHRINK SPACE COMPACT
SHRINK SPACE CASCADE
第13题:
You work as a database administrator for Supportcenter.cn. One of the database users accidentally deleted all the rows of a critical table and committed the delete at 1:30 p.m. You senior database administrator, SupportCenter, asks you to retrieve the lost data. Which two actions would you use to ensure that there is no impact on other connected users while retrieving the deleted rows?()
第14题:
You work as a database administrator for Supportcenter.cn. Your database is in NOARCHIVELOG mode and you want to perform a backup. Which type of backup would be appropriate in this case?()
第15题:
You work as a database administrator for Supportcenter.cn. Your database is in NOARCHIVELOG mode. The database has been configured with three redo logs groups, and there have been five log switches. You lost one non-system-critical data file from your database. Which method would you use to recover the data file?()
第16题:
You are a database administrator for your company. The company’s financial forecasting application uses a SQL Server 2005 database that enables business users to run both ad hoc and predefined queries. You suspect that some queries consume an excessive amount of server resources. You need to identify which queries consume the most resources. You want to achieve this goal as quickly as possible. What should you do?()
第17题:
Host naming
Local naming
Easy Connect
External naming
directory naming
第18题:
Memory Advisors
Segment Advisors
SQL Tuning and Access Advisors
Automated Workload Repository (AWR)
Automatic Database Diagnostic Monitor (ADDM)
第19题:
Use the DBCC INPUTBUFFER command.
Use the sys.dm_exec_query_stats dynamic management view (DMV).
Use the sqldiag utility.
Use the SHOWPLAN session option.
第20题:
REBUILD
CASCADE
TRUNCATE
ROW MOVEMENT
SHRINK SPACE COMPACT
SHRINK SPACE CASCADE
第21题:
Use a flashback query to retrieve the rows that were deleted
Useconventialincremental export and then import the affected object
Shutdown the database inNORMALmode and restart the database instance
Use DBMS_META package to reconstruct the object using undo segments
UseTablespacePoint in Time Recovery (TSPITR) method to recover the table and the data
Use Oracle DataPumptwithflashback_timeoption toentableflashback export and then import the affected object.
第22题:
Restore all the data files and open the database
Create the data file and perform tablespace recovery
No need to restore any file, just recover the database
Restore only the system data file and recover the database
Restore only lost date file and performtablespacerecovery
第23题:
heap tables
object tables
partitioned tables
index-organized tables (IOTs)