单选题Which is the correct description of the significance of the ORACLE_HOME environmental variable?()A It specifies the directory containing the Oracle software.B It specifies the directory containing the Oracle-Managed Files.C It specifies the directory f

题目
单选题
Which is the correct description of the significance of the ORACLE_HOME environmental variable?()
A

It specifies the directory containing the Oracle software.

B

It specifies the directory containing the Oracle-Managed Files.

C

It specifies the directory for database files, if not specified explicitly.

D

It specifies the base directory of Optimal Flexible Architecture (OFA) .


相似考题
参考答案和解析
正确答案: B
解析: 暂无解析
更多“单选题Which is the correct description of the significance of the ORACLE_HOME environmental variable?()A It specifies the directory containing the Oracle software.B It specifies the directory containing the Oracle-Managed Files.C It specifies the directory f”相关问题
  • 第1题:

    Which of the following statements is TRUE about mounting a file system?()

    A.A file system cannot be mounted on a directory containing data.

    B.Mounting a file system on a mount point containing data will delete the data.

    C.Mounting a file system on a amount point containing data will make the data temporarily inaccessible.

    D.A systems administrator must manually create an empty directory prior to mounting an AIX JFS.


    参考答案:C

  • 第2题:

    What is the objective of the aaa authentication login console-in local command?()

    • A、It specifies the login authentication method list named console-in using the local user database on the router
    • B、It specifies the login authorization method list named console-in using the local RADIUS username-password data base
    • C、It specifies the login authentication list named console-in using the local username- password data base on the router
    • D、It specifies the login authorization method list named console-in using the local username- password data base on the router

    正确答案:A

  • 第3题:

    Which of the following specifies a set of consistent requirements for a workstation or server?()

    • A、Vulnerability assessment
    • B、Imaging software
    • C、Patch management
    • D、Configuration baseline

    正确答案:D

  • 第4题:

    Which two statements are true of a network mask?()

    • A、A subnet mask specifies the portion of an IP address that is in a binary format.
    • B、A subnet mask specifies the portion of an IP address that is in a decimal format.
    • C、A subnet mask specifies the portion of an IP address that represents a network prefix.
    • D、A subnet mask specifies the portion of an IP address that represents network hosts.

    正确答案:C,D

  • 第5题:

    Which statement is true regarding checkpoints and recovery?()

    • A、A checkpoint defines the highest system change number (SCN).
    • B、All redo entries higher or at the SCN are known to be written to the data files.
    • C、Only the redo records containing SCNs higher then the checkpoint need to be applied during recovery.
    • D、The LOG_CHECKPOINT_INTERVAL initialization parameter specifies the amount of time between incremental checkpoints.

    正确答案:C

  • 第6题:

    单选题
    Which is the correct description of the significance of the ORACLE_HOME environmental variable?()
    A

    It specifies the directory containing the Oracle software.

    B

    It specifies the directory containing the Oracle-Managed Files.

    C

    It specifies the directory for database files, if not specified explicitly.

    D

    It specifies the base directory of Optimal Flexible Architecture (OFA) .


    正确答案: A
    解析: 暂无解析

  • 第7题:

    单选题
    What is the objective of the aaa authentication login console-in local command?()
    A

    It specifies the login authentication method list named console-in using the local user database on the router

    B

    It specifies the login authorization method list named console-in using the local RADIUS username-password data base

    C

    It specifies the login authentication list named console-in using the local username- password data base on the router

    D

    It specifies the login authorization method list named console-in using the local username- password data base on the router


    正确答案: C
    解析: 暂无解析

  • 第8题:

    多选题
    The NLS_TERRITORY parameter specifies the default conventions to be used for which of the following globalization elements?()
    A

    Date format

    B

    Decimal character

    C

    Group separator

    D

    First day of the month

    E

    None of the above

    F

    All of the above


    正确答案: F,B
    解析: 暂无解析

  • 第9题:

    单选题
    Which statement is true about the log-output variable?()
    A

    It is a static variable and can be set only at MySQL server startup

    B

    It enables and starts the General Query Log

    C

    It sets the target location for the binary logs generated by the MySQL sever

    D

    It specifies output destinations for the slow and General Query logs


    正确答案: A
    解析: 暂无解析

  • 第10题:

    多选题
    Which two statements are true of a network mask?()
    A

    A subnet mask specifies the portion of an IP address that is in a binary format.

    B

    A subnet mask specifies the portion of an IP address that is in a decimal format.

    C

    A subnet mask specifies the portion of an IP address that represents a network prefix.

    D

    A subnet mask specifies the portion of an IP address that represents network hosts.


    正确答案: C,D
    解析: 暂无解析

  • 第11题:

    单选题
    You are configuring for Oracle Shared Server. Which service is required? ()
    A

    Oracle Net Service

    B

    Oracle HTTP Service

    C

    Oracle Paging Service

    D

    Internet Directory Service


    正确答案: A
    解析: 暂无解析

  • 第12题:

    单选题
    Which of the following statements is TRUE about mounting a file system?()
    A

    A file system cannot be mounted on a directory containing data.

    B

    Mounting a file system on a mount point containing data will delete the data.

    C

    Mounting a file system on a amount point containing data will make the data temporarily inaccessible.

    D

    A systems administrator must manually create an empty directory prior to mounting an AIX JFS.


    正确答案: B
    解析: 暂无解析

  • 第13题:

    You are configuring for Oracle Shared Server. Which service is required? ()

    • A、Oracle Net Service
    • B、Oracle HTTP Service
    • C、Oracle Paging Service
    • D、Internet Directory Service

    正确答案:A

  • 第14题:

    Which two statements best describe the wireless security standard that is defined by WPA (Choose two.)()。

    • A、It specifies use of a static encryption key that must be changed frequently to enhance security
    • B、It requires use of an open authentication method
    • C、It specifies the use of dynamic encryption keys that change each time a client establishes a connection
    • D、It requires that all access points and wireless devices use the same encryption key
    • E、It includes authentication by PSK

    正确答案:C,E

  • 第15题:

    Which two statements are true of a network mask?()

    • A、A subnet mask specifies the portion of an IP address that is in a binary format
    • B、A subnet mask specifies the portion of an IP address that is in a decimal format
    • C、A subnet mask specifies the portion of an IP address that represents a network prefix
    • D、A subnet mask specifies the portion of an IP address that represetns network hosts

    正确答案:C

  • 第16题:

    When you create a backup control file, where is the resulting file written to?()  

    • A、 The database user dump destination directory
    • B、 The database diagnostic destination directory
    • C、 To $ORACLE_HOME/rdbms
    • D、 To $ORACLE_HOME/admin
    • E、 To the directory and filename you specify in the command

    正确答案:E

  • 第17题:

    Which statement is true about the log-output variable?()

    • A、It is a static variable and can be set only at MySQL server startup
    • B、It enables and starts the General Query Log
    • C、It sets the target location for the binary logs generated by the MySQL sever
    • D、It specifies output destinations for the slow and General Query logs

    正确答案:D

  • 第18题:

    单选题
    Which two statements are true of a network mask?()
    A

    A subnet mask specifies the portion of an IP address that is in a binary format

    B

    A subnet mask specifies the portion of an IP address that is in a decimal format

    C

    A subnet mask specifies the portion of an IP address that represents a network prefix

    D

    A subnet mask specifies the portion of an IP address that represetns network hosts


    正确答案: B
    解析: 暂无解析

  • 第19题:

    单选题
    Which statement is true regarding checkpoints and recovery?()
    A

    A checkpoint defines the highest system change number (SCN).

    B

    All redo entries higher or at the SCN are known to be written to the data files.

    C

    Only the redo records containing SCNs higher then the checkpoint need to be applied during recovery.

    D

    The LOG_CHECKPOINT_INTERVAL initialization parameter specifies the amount of time between incremental checkpoints.


    正确答案: D
    解析: 暂无解析

  • 第20题:

    单选题
    You are managing the APPPROD database as a DBA which is not using the Oracle-managed files. You plan to duplicate this database in the same system with the name DUPDB.You want to create the same directory structure for duplicate database files as of the target database. You executed the following RMAN commands:   RMAN> CONNECT TARGET sys/sys@APPPROD RMAN> CONNECT AUXILIARY sys/sys@DUPDB RMAN> DUPLICATE TARGET DATABASE TO dupdb  FROM ACTIVE DATABASE PASSWORD FILE SPILE  NOFILENAMECHECK;   What are the implications of this command?()
    A

     It creates database files for the duplicate database under the Oracle base with a different directory for the duplicate database.

    B

     It overwrites data files of the target database because a different location for data files is not mentioned for the duplicate database.

    C

     It creates database files for the duplicate database under the same Oracle home as that of the target database with the same directory structure.

    D

     It creates database files for the duplicate database under the same Oracle home as that of the target but with a different directory for the duplicate database.


    正确答案: A
    解析: 暂无解析

  • 第21题:

    单选题
    Referring to the exhibit, what is the purpose of the targets section of the configuration?()
    A

    It defines which devices will be sending traps.

    B

    It specifies where to send traps.

    C

    It defines the IP addresses of management systems that can access the device.

    D

    It specifies which devices can be polled for SNMP data.


    正确答案: D
    解析: 暂无解析

  • 第22题:

    单选题
    Which of the following specifies a set of consistent requirements for a workstation or server?()
    A

    Vulnerability assessment

    B

    Imaging software

    C

    Patch management

    D

    Configuration baseline


    正确答案: D
    解析: 暂无解析

  • 第23题:

    单选题
    When you create a backup control file, where is the resulting file written to?()
    A

     The database user dump destination directory

    B

     The database diagnostic destination directory

    C

     To $ORACLE_HOME/rdbms

    D

     To $ORACLE_HOME/admin

    E

     To the directory and filename you specify in the command


    正确答案: C
    解析: 暂无解析

  • 第24题:

    单选题
    Which of the following environment variables specifies a non-default location for the listener configuration file?()
    A

    LSN_ADMIN

    B

    TNS_ADMIN

    C

    ADMIN_TNS

    D

    TSN_ADMIN


    正确答案: C
    解析: 暂无解析