You can use the ls subcommand of ufsrestore.
You can use the add subcommand of ufsrestore.
You can use the select subcommand of ufsrestore.
You can view the selected files as they are marked with a plus sign (+) in the list that is permanently displayed in the upper half of the interactive ufsrestore screen view.
第1题:
You work as a database administrator for Certkiller .com. In the Certkiller PRODUCTION database you have granted RESUMABLE system privilege to the CONNECT role.Resumablespace operation has been enabled for all user session. You want users NOT to be aware of any kind of space-related problems while performing transactions. Instead, you want the problem to be resolved by a database trigger automatically. Which combination of triggering time and event would you use to achieve this objective?()
第2题:
You work as a database administrator for Certkiller .com. Your database is in NOARCHIVELOG mode. The database has been configured with three redo logs groups, and there have been five log switches. You lost one non-system-critical data file from your database. Which method would you use to recover the data file?()
第3题:
You are maintaining the PROD database for NetFx Corporation. You have configured controlfile autobackup in your database. At 6:00 P.M. on Monday, you issue the following command: RMAN>BACKUP DATABASE; At 8:00 A.M. on Tuesday, you are unable to start the database because all the control files are missing. You decide to restore the control files from the backup by using the RMAN> RESTORE CONTROLFILE FROM AUTOBACKUP; command. Which operation should you perform before using the RMAN> RESTORE CONTROLFILE FROM AUTOBACKUP; command?()
第4题:
While selecting files during an interactive restore with ufsrestore, you are interrupted by a junior administrator before you can complete the file selection process and start the restore. After answering the administrator’s question, you realize that you have forgotten which files you had already selected for the restore. How can you determine which files are already marked for extraction and restore? ()
第5题:
You are the desktop administrator for your company. Laura is a user in the company's accounting department. Laura uses a Windows XP Professional computer. Laura installs a new software application that was listed on her Add or Remove Programs list. Laura reports that the new application now opens whenever she double-clicks any file that has a .doc file name extension. She also reports that 24 new icons appear on the New menu when she right-clicks her desktop. Laura asks you to reconfigure her computer so that Microsoft Word opens when she double-clicks files that have a .doc file name extension. She also wants you to remove the new icons from the New menu. You instruct Laura to uninstall the new application. After she uninstalls the application, she reports that she can no longer open .doc files by double-clicking them. She also reports that the unwanted icons on the New menu are still present. You reinstall the new application, and it continues to open when Laura double-clicks .doc files. You want to restore the .doc file association and to remove the unwanted icons from the New menu on Laura's computer. You want to accomplish these tasks as quickly as possible. You also want to ensure that none of Laura's other documents or personal settings are affected. What should you do?()
第6题:
You are the network administrator for The network consists of a single Active Directory domain named A member server named TestKingA runs Windows Server 2003. You need to use the Backup utility to back up all data on TestKingA three times per day. Files that are currently opened by applications must not be backed up. What should you do?()
第7题:
You are the desktop administrator for your company. All client computers run Windows XP Professional. Currently, 10 of the computers in the graphics department contain two processors. You want to install a second processor in each of the remaining computers in the graphics department. You install a second processor in a test computer. When you start the computer, the start process begins normally and then terminates. You receive the following error message: "STOP: 0x00000079 HAL_MISMATCH." When you restart the computer, it stops again, and you receive the same error message. You remove the second processor, and the computer starts normally. When you attempt to install a second processor in a different test computer, the same STOP error occurs. You need to eliminate the error so that you can install the second processor on all of the computers. What should you do?()
第8题:
Start the database in the MOUNT stage.
Back up the control file to trace.
Set the DBID
Issue the RECOVER DATABASE command.
第9题:
Perform a default restoration.
Run the Automated System Recover (ASR) wizard.
Perform a restoration, and enable the Restore security option.
Perform a restoration, and disable the Restore security option
第10题:
Start the instance and open the database, instance recovery automatically recovers control files
Create a file based on the contents of the trace file and save it to the control file locations and start the database
Re-create the database (The recovery of the control file is not possible because you have lost all the control files.)
Start the instance, in the NOMOUNTstate,re-create the control file using the CREATE CONTROLFILE command stored in the trace file.
Start the instance and MOUNT the database, then re-create the control file using the CREATE CONTROLFILE command stored in the trace file.
第11题:
using only the RMAN SWITCH command to set the new location for the data file
placing the database in the MOUNT state for the restore and recovery operations.
using an RMAN RUN block with the SET NEWNAME and then the SWITCH command.
configuring two channels: one for the restore operation and the other for the recovery operation
第12题:
You can use the ls subcommand of ufsrestore.
You can use the add subcommand of ufsrestore.
You can use the select subcommand of ufsrestore.
You can view the selected files as they are marked with a plus sign (+) in the list that is permanently displayed in the upper half of the interactive ufsrestore screen view.
第13题:
You work as a database administrator for Supportcenter.cn. You added atablespaceto your database. Because of the changes to the physical structure of your database, you performed a backup of the control file to trace. After this, you lost only the control files and the instance aborted due to a hardware failure. How would you proceed to recover the database?()
第14题:
You are performing a block media recovery on the tools01.dbf data file in the SALES database using RMAN. Which two statements are correct in this scenario?()
第15题:
You work as a database administrator for Certkiller .com. You added atablespaceto your database. Because of the changes to the physical structure of your database, you performed a backup of the control file to trace. After this, you lost only the control files and the instance aborted due to a hardware failure. How would you proceed to recover the database?()
第16题:
You are performing a Weekly backup and you want to be sure that you backup everything including the registry, boot files, and COM. How can you do this with the least amount of administrative effort?()
第17题:
You are a network administrator for ExamSheet.net's Windows 2000 network. Your computer is installed with Windows 2000 Professional. You schedule a task that will copy files from your computer to another computer on the network. You notice that the task is not completing correctly. You manually copy the files from your computer to other computers on the network without any errors. You verify that all of your other tasks are working correctly. You want the task to complete successfully. What should you do? ()
第18题:
You are the network administrator for You administer a Windows Server 2003 computer named TestKing2. contains a shared folder named TestKingProjects. You use the Backup utility once each day to back up the TestKingProjects folder. You discover that a database file in the TestKingProjects folder is corrupt. You confirm that the file corruption is not the result of a virus. You need to replace the corrupted file by using the latest backup. You do not know whether the file was corrupted before or after the latest backup was completed. You need to verify that the file in the backup can be opened successfully before you overwrite the existing file. What should you do?()
第19题:
Restore the computer to the restore point that was created when Laura installed the new application.
Restore the System State data to Laura's computer from a backup tape.
Use the Windows XP Professional CD-ROM to perform an Automated System Recovery (ASR) restore.
Restart the computer by using the last known good configuration.
第20题:
Configure the backup to backup the system state area.
Configure the backup to backup the system partition.
Create a batch file to run RDISK.EXE /s-before backup starts.
Create a batch file to run RDISK.EXE /s- after backup is started.
第21题:
Start the instance and open the database, instance recovery automatically recoverscontrol files
Create a file based on the contents of the trace file and save it to the control file locations and start the database
Re-create the database (The recovery of the control file is not possible because you have lost all the control files.)
Start the instance, in the NOMOUNTstate,re-create the control file using the CREATE CONTROLFILE command stored in the trace file.
Start the instance and MOUNT the database, then re-create the control file using the CREATE CONTROLFILE command stored in the trace file.
第22题:
Start the Remote Procedure Call (RPC) Locater service and configure the service to start automatically.
Start the RunAs service and configure the service to start automatically.
Configure the Task Scheduler service account to use the local Administrator account and password. Restart the service.
Use Scheduled Tasks to configure the task to run under the security context of your account.
第23题:
fssnap -i
fssnap -r
ufsrestore -i
snaprestore -i
第24题:
Run a differential backup.
. Disable volume shadow copies.
Select the Exclude Files option.
Select the Compute selection information before backup and restore operations option