It specifies the directory containing the Oracle software.
It specifies the directory containing the Oracle-Managed Files.
It specifies the directory for database files, if not specified explicitly.
It specifies the base directory of Optimal Flexible Architecture (OFA) .
第1题:
A.A file system cannot be mounted on a directory containing data.
B.Mounting a file system on a mount point containing data will delete the data.
C.Mounting a file system on a amount point containing data will make the data temporarily inaccessible.
D.A systems administrator must manually create an empty directory prior to mounting an AIX JFS.
第2题:
What is the objective of the aaa authentication login console-in local command?()
第3题:
Which of the following specifies a set of consistent requirements for a workstation or server?()
第4题:
Which two statements are true of a network mask?()
第5题:
Which statement is true regarding checkpoints and recovery?()
第6题:
It specifies the directory containing the Oracle software.
It specifies the directory containing the Oracle-Managed Files.
It specifies the directory for database files, if not specified explicitly.
It specifies the base directory of Optimal Flexible Architecture (OFA) .
第7题:
It specifies the login authentication method list named console-in using the local user database on the router
It specifies the login authorization method list named console-in using the local RADIUS username-password data base
It specifies the login authentication list named console-in using the local username- password data base on the router
It specifies the login authorization method list named console-in using the local username- password data base on the router
第8题:
Date format
Decimal character
Group separator
First day of the month
None of the above
All of the above
第9题:
It is a static variable and can be set only at MySQL server startup
It enables and starts the General Query Log
It sets the target location for the binary logs generated by the MySQL sever
It specifies output destinations for the slow and General Query logs
第10题:
A subnet mask specifies the portion of an IP address that is in a binary format.
A subnet mask specifies the portion of an IP address that is in a decimal format.
A subnet mask specifies the portion of an IP address that represents a network prefix.
A subnet mask specifies the portion of an IP address that represents network hosts.
第11题:
Oracle Net Service
Oracle HTTP Service
Oracle Paging Service
Internet Directory Service
第12题:
A file system cannot be mounted on a directory containing data.
Mounting a file system on a mount point containing data will delete the data.
Mounting a file system on a amount point containing data will make the data temporarily inaccessible.
A systems administrator must manually create an empty directory prior to mounting an AIX JFS.
第13题:
You are configuring for Oracle Shared Server. Which service is required? ()
第14题:
Which two statements best describe the wireless security standard that is defined by WPA (Choose two.)()。
第15题:
Which two statements are true of a network mask?()
第16题:
When you create a backup control file, where is the resulting file written to?()
第17题:
Which statement is true about the log-output variable?()
第18题:
A subnet mask specifies the portion of an IP address that is in a binary format
A subnet mask specifies the portion of an IP address that is in a decimal format
A subnet mask specifies the portion of an IP address that represents a network prefix
A subnet mask specifies the portion of an IP address that represetns network hosts
第19题:
A checkpoint defines the highest system change number (SCN).
All redo entries higher or at the SCN are known to be written to the data files.
Only the redo records containing SCNs higher then the checkpoint need to be applied during recovery.
The LOG_CHECKPOINT_INTERVAL initialization parameter specifies the amount of time between incremental checkpoints.
第20题:
It creates database files for the duplicate database under the Oracle base with a different directory for the duplicate database.
It overwrites data files of the target database because a different location for data files is not mentioned for the duplicate database.
It creates database files for the duplicate database under the same Oracle home as that of the target database with the same directory structure.
It creates database files for the duplicate database under the same Oracle home as that of the target but with a different directory for the duplicate database.
第21题:
It defines which devices will be sending traps.
It specifies where to send traps.
It defines the IP addresses of management systems that can access the device.
It specifies which devices can be polled for SNMP data.
第22题:
Vulnerability assessment
Imaging software
Patch management
Configuration baseline
第23题:
The database user dump destination directory
The database diagnostic destination directory
To $ORACLE_HOME/rdbms
To $ORACLE_HOME/admin
To the directory and filename you specify in the command
第24题:
LSN_ADMIN
TNS_ADMIN
ADMIN_TNS
TSN_ADMIN