第1题:
Which of the following commands should be used to monitor the number of bytes read on any given disk?()
第2题:
A user is attempting to access files shared on a remote computer. The file share permissions allow the user to have full control; however, the NTFS permissions allow the user to have read access. Which of the following is the user’s resulting access level for the remotely shared directory?()
第3题:
Which of the following describes how to set the Read-only attribute on a folder?()
第4题:
A technician notices a machine’s performance has degraded. The machine has constant errorswhen trying to read data from the drive. Which of the following should be used to repair the disk errors?()
第5题:
Application A holds an Update lock on a single row and application B is trying to read that row. If both applications are using isolation level UR, which of the following will occur?()
第6题:
In order to determine how efficiently an application is reading and writing data, which of the following utilities will report read and write sizes on disk I/O requests?()
第7题:
Examine the following command that is used to duplicate a database on the same host: RMAN> RUN { ALLOCATE AUXILIARY CHANNEL, aux 1 DEVICE TYPE DISK; DUPLICATE TARGET DATABASE TO auxdb SKIP READONLY; / } Which two statements describe the effect after the database is duplicated successfully? ()(Choose two)
第8题:
rsize
nfs_max_read_size
nfs_server_clread
nfs_rfc1323
第9题:
N times the stripe unit size
N times the VMM minfree parameter
The same value as that of the VMM maxfree parameter
The same value as that of the VMM maxrndwrt parameter
第10题:
The data files of the read-only tablespaces in the target database are not duplicated
The read-only tablespaces in the target database are still defined in new the database
The read-only tablespaces in the target database are changed to online after duplication
The data files of the read-only tablespaces in the target database get duplicated
The read-only tablespaces in the target database are not defined in the new database
第11题:
In order to ensure best read performance, which of the following indicates how large an application’s read buffer size should be if the filesystem to be read is striped across N disks using LVM striping?()
第12题:
A user copied files from a CD and now the files can only be opened as read-only. Which of the following utilities can be used to allow the user the ability to edit the files?()
第13题:
Which of the following can help prevent data loss on a RAID array in the event of a power failure?()
第14题:
Which of the following statements allows USER1 to take away read access on the table ORG.TAB1 from USER2?()
第15题:
A disk contains several logical volumes. Which of the following commands indicates how much data is read from or written to a particular logical volume on the same disk?()
第16题:
To change the read sizes on a V3 network file system server, which of the following options would need to be set?()
第17题:
In which of the following scenarios is a tablespace recovery required?()
第18题:
notices
orders
advertisement
instructions
第19题:
tprof
topas
filemon
vmstat
第20题:
The database must be in read-write mode.
The database must have no external files.
The database must open in read-only mode.
The database must be mounted but not opened.