Domains can be created using the Configuration Wizard.
Domains can be created using WLST.
Domain configuration files are located in the WebLogic home directory.
Domains can be created based on a domain template.
第1题:
Your database in running in the ARCHIVELOG mode. You issue the following command to back up datafile 2 in your database. RMAN> COPY DATAFILE 2 TO ’D:///ORACLE/ORA90/MYNEWDB/DA2.DBF’; Which two statements are true regarding the backup created using this command?()
第2题:
Which two statements are true about the rescue configuration file?()
第3题:
Which two statements regarding a SQL profile are true?()
第4题:
Which statement is true when Automatic Workload Repository (AWR) baselines are created using baseline templates?()
第5题:
View this parameter setting in your database: DB_CREATE_FILE_DEST=’D:// /oracle/product/10.2.0/oradata/oracle’ You created a tablespace by using this command: CREATE TABLESPACE USERS; Which two statements are true about the USERS tablespace?()
第6题:
You can add SQL test cases to the incident package.
You can add or remove the trace files to the package.
You cannot create an incremental incident package when the physical files are purged from the ADR.
You can create the incremental incident package ZIP file for new or modified diagnostic information for theincident package already created.
第7题:
It must include a root password
It is roll back file number 50, and you can recover it by issuing rollback 50
It is created by issuing request system configuration rescue save
It is updated automatically when you commit
第8题:
The Cisco VIC can create an unlimited number of Virtual NICs
The number of vNICs on the Cisco VIC that can be created is determined by the number of chassis uplinks
vNICs are created using software on the host operating system
The host operating system sees a vNIC as a physical PCIe device
The host operating system sees a vNIC as a sub-interface of a primary NIC
The Cisco VIC can create 1024 vNICs
第9题:
Constraint names must start with SYS_C
All constraints must be defines at the column level
Constraints can be created after the table is created
Constraints can be created at the same time the table is created
Information about constraints is found in the VIEW_CONSTRAINTS dictionary view
第10题:
Constraint names must start with SYS_C
All constraints must be defines at the column level.
Constraints can be created after the table is created.
Constraints can be created at the same time the table is created.
Information about constraints is found in the VIEW_CONSTRAINTS dictionary view.
第11题:
Domains can be created using the Configuration Wizard.
Domains can be created using WLST.
Domain configuration files are located in the WebLogic home directory.
Domains can be created based on a domain template.
第12题:
The tablespace has two data files.
An error is reported and tablespace creation fails.
Data files are created with names generated by the instance.
The tablespace can be extended without specifying the data file.
Data files belonging to the USERS tablespace cannot be renamed.
第13题:
Which two statements are true about the rescue configuration file?()
第14题:
Which three scenarios are true about Domains?()
第15题:
Which statement is true when Automatic Workload Repository (AWR) baselines are created using baseline templates?()
第16题:
You have created an Oracle 10g database named SALES, which will be used by an application named SalesOrders. Users of the SalesOrders application complain that application response time is slow when they generate reports. The SalesOrders application accesses a table that contains 10 million rows. You decide to create an index on this table using the NOLOGGING option so that the index creation process is completed in the least amount of time. Which of the following is NOT true about an index created with the NOLOGGING option?()
第17题:
Which two statements about creating constraints are true?()
第18题:
The copy of the datafile created is stored in the RMAN repository.
The copy of the datafile created can be viewed using the LIST BACKUP command.
The copy of the datafile created using this COPY command can be placed only on the disk.
The copy of the datafile created is similar to the backup of the file created using the BACKUP command.
The copy of the datafile created can be used for recovering the database using the user-managed recovery method.
第19题:
An SVI is normally created for the default VLAN (VLAN1) to permit remote switchadministration
Multiple SVIs can be associated with a VLAN
SVI is another name for a routed port
An SVI is created by entering the no switchport command in interface configuration mode
An SVI provides a default gateway for a VLAN
第20题:
It is built by Automatic Tuning Optimizer.
It cannot be stored persistently in the data dictionary.
It can be used by the query optimizer automatically.
It can be created manually by using the CREATE PROFILE command.
第21题:
A custom application security policy can be configured in the Advanced Firewall Security Configuration dialog box.
An optional DMZ interface can be specified in the Advanced Firewall Interface Configuration dialog box.
Custom application policies for e-mail, instant messaging, HTTP, and peer-to-peer services can be created using the Intermediate Firewall wizard.
Only the outside (untrusted) interface is specified in the Basic Firewall Interface Configuration dialog box.
The outside interface that SDM can be launched from is configured in the Configuring Firewall for Remote Access dialog box.
The SDM provides a basic, intermediate, and advanced firewall wizard.
第22题:
Views can be created as read only.
Views are data segments like tables.
Views can be created on the basis of more than one table.
Data manipulation language (DML) operations cannot be performed on views.
第23题:
AWR baselines are always created as repeating baselines.
AWR baselines can be created on the basis of two time values.
AWR baselines are always created with infinite expiration duration.
AWR baselines are always created using the Automatic Workload Repository (AWR) retention period as expiration duration.
第24题:
It must include a root password.
It is rollback file number 50, and you can recover it by issuing rollback 50.
It is created by issuing request system configuration rescue save.
It is updated automatically when you commit.