itgle.com

You set the recovery window to seven days and the backup optimization to ON using the CONFIGURE command of Recovery Manager (RMAN). The most recent backup of the TOOLS tablespace to disk was taken on January 3. The TOOLS tablespace is read/x7fonly.  On F

题目

You set the recovery window to seven days and the backup optimization to ON using the CONFIGURE command of Recovery Manager (RMAN). The most recent backup of the TOOLS tablespace to disk was taken on January 3. The TOOLS tablespace is read/x7fonly.  On February 21, when you execute a command to back up all the tablespaces to disk, you find that RMAN backs up the TOOLS tablespace also, even though the contents of the tablespace have not changed after the backup on January 3.  Because there are no changes made to the TOOLS tablespace, you decide that the tablespace should not be backed up by RMAN. What can you to do skip backing up the TOOLS tablespace without changing the current backup optimization setting?()

  • A、configure a default device for RMAN backups
  • B、temporarily disable the retention policy for RMAN backups
  • C、configure automatic channel allocation for RMAN backups
  • D、use the CONFIGURE command to reconfigure the recovery window to 60 days

相似考题
更多“You set the reco”相关问题
  • 第1题:

    You work as the enterprise exchange administrator at Xxx .Xxx is using Microsoft Exchange Server 2010 as their messaging solution.A new Xxx usage policy prohibits the employees from using certain words in internal e-mail messaging.What actions must you take to have the policy implemented?()

    • A、You must set up an IP Block list.
    • B、You must set up sender filtering.
    • C、You must set up managed folders.
    • D、You must build a transport rule

    正确答案:D

  • 第2题:

    You have an Exchange Server 2010 organization that contains 20 mailbox databases. You configure each database to retain all deleted items for 30 days.You need to ensure that all items that pass the retention period are permanently deleted daily between 02:00 and 06:00. Which cmdlet should you use?()

    • A、Set-MailboxDatabase
    • B、Set-MailboxServer
    • C、Set-OrganizationConfig
    • D、Set-RetentionPolicy

    正确答案:A

  • 第3题:

    You are configuring an 802.1Q trunk between a Layer 2 switch and a firewall. You read in the documentation that the best way to set up a trunk is to set the port as dynamic desirable. The trunk is not coming up. Which one of these options would be a valid explanation? ()

    • A、The firewall does not support Cisco Discovery Protocol. You should set the switchport trunk mode ON
    • B、The firewall does not support Cisco Discovery Protocol. You should set the switchport trunk mode to OFF
    • C、The firewall does not support Cisco Discovery Protocol. You should set the switchport trunk mode asauto.
    • D、The firewall does not support DTP. You should set the switchport trunk mode to ON

    正确答案:D

  • 第4题:

    You work as a database administrator for Certkiller .com. You want to create your database with the automatic undo management feature enable.Which two tasks must you perform to achieve this?()

    • A、Set the UNDO_RETENTION parameter to AUTO.
    • B、Create an initial undo segment in undotablespace.
    • C、Set the UNDO_RETENTION parameter to 900 or more
    • D、Set the initialization parameter UNDO_MANAGEMENT to AUTO
    • E、Set the UNDO_MANAGEMENT parameter to the name of an undotablespace

    正确答案:D,E

  • 第5题:

    You are developing a Windows Communication Foundation (WCF) service. You need to enable security auditing for all events. What should you do?()

    • A、Set the serviceAuthorizationAuditLevel setting to Success and the messageAuthenticationAuditLevel setting to Success.
    • B、Set the messageAuthenticationAuditLevel setting to Success and the auditLogLocation setting to Application.
    • C、Set the serviceAuthorizationAuditLevel setting to SuccessAndFailure and the messageAuthenticationAuditLevel setting to SuccessAndFailure.
    • D、Set the messageAuthenticationAuditLevel setting to SuccessAndFailure and the auditLogLocation setting to Security.

    正确答案:C

  • 第6题:

    You develop a Web application that contains two master pages. You need to dynamically set the master page when a user views pages in the application. What should you do? ()

    • A、Set Page.MasterPageFile in the Page's Page_Init event.
    • B、Set Page.MasterPageFile in the Page's OnInit event.
    • C、Set Page.MasterPageFile in the Page's Page_Load event.
    • D、Set Page.MasterPageFile in the Page's Page_PreInit event.

    正确答案:D

  • 第7题:

    You are developing a class library. Portions of your code need to access system environment variables. You need to force a runtime SecurityException only when callers that are higher in the call stack do not have the necessary permissions. Which call method should you use?()

    • A、set.Demand();
    • B、set.Assert();
    • C、set.PermitOnly();
    • D、set.Deny();

    正确答案:A

  • 第8题:

    You are debugging a Windows Communication Foundation (WCF) service. The service uses signed and encrypted messages.You need to configure logging so that you can read the contents of the messages. What should you do?()

    • A、Set maxSizeMessagesToLog to 10
    • B、Set logMessageAtServiceLevel to true.
    • C、Set maxMessagesToLog to 10.
    • D、Set logMessageAtTransportLevel to true.

    正确答案:B

  • 第9题:

    You work as the enterprise exchange administrator at Xxx .The Xxx network consists of a domain named xxx .What actions must you take to use administrative delegation on a series of cmdlets?()

    • A、You must implement log transactions
    • B、You must set up new management role
    • C、You must implement Mailbox journaling
    • D、You must set up a Role Based Access Control (RBAC) role

    正确答案:B

  • 第10题:

    Your organization has Exchange Server 2010.You need to ensure that users in the organization are notified before they send e-mail messages to external recipients. Which cmdlet should you run?()

    • A、set-Mailbox
    • B、set-OrganizationConfig
    • C、set-TransportAgent
    • D、set-TransportConfig

    正确答案:B

  • 第11题:

    单选题
    You are creating a Windows Forms Application by using the .NET Framework 3.5.You plan to create a Windows Installer package for a Windows Forms application. The package will be deployed on Windows Vista computers.You need to ensure that during deployment the installation does not elevate privileges of the user installing the application.What should you do?()
    A

    Create a custom action and set the NoImpersonate property to true

    B

    Create a custom action and set the NoImpersonate property to false

    C

    Create a manifest and set the RequestedExecutionLevel level attribute to AsInvoker

    D

    Create a manifest and set the RequestedExecutionLevel level attribute to AsAdministrator


    正确答案: A
    解析: 暂无解析

  • 第12题:

    单选题
    You work in a company which uses SQL Server 2008. You are the administrator of the company database. Now you are in charge of a SQL Server 2008 instance. There are queries that have an estimated execution cost less than 3. You intend to configure the instance, make it use a single thread for these queries. In the options below, which sp_configure configuration option should you set?()
    A

    You should set query governor cost limit

    B

    You should set cost threshold for parallelism

    C

    You should set priority boost 

    D

    You should set precompute rank


    正确答案: B
    解析: 暂无解析

  • 第13题:

    You set up scheduled tasks to run and notify you of any failures. 3 days later you see that none of the tasks ran and you received no notifications. What should you do?()

    • A、Set the schedule service to run under the administrator account.
    • B、Set the scheduled tasks to run under the administrator account.
    • C、Enable the messenger service
    • D、Set the schedule service to run under the local system account and set it to start automatically.

    正确答案:D

  • 第14题:

    You plan to use Windows PowerShell scripts to configure system settings when you deploy Windows 7.   You need to ensure that Windows PowerShell scripts will run on the client computers during initial setup.   What should you do?()

    • A、Set the script execution policy to RemoteSigned.
    • B、Set the script execution policy to AllSigned.
    • C、Set the script execution policy to Restricted.
    • D、Use Group Policy preferences.

    正确答案:A

  • 第15题:

    A new switch is being installed and you have been assigned the task of connecting it to an existing switch. In doing this, you want to set up the VLAN Trunking Protocol so that VLAN information can be passed between the switches. Which of the following must you do to accomplish this?()

    • A、You must set each end of the trunk line to IEEE 802.1e encapsulation.
    • B、You must set the same VTP management domain name on both switches.
    • C、You must set all ports on the two switches as access ports.
    • D、You must configure one of the switches as a VTP server.
    • E、You must use a rollover cable to connect the two switches.

    正确答案:B,D

  • 第16题:

    Which of the following would you use to enable automatic media recovery for a database?()

    • A、SET AUTORECOVERY ON
    • B、SET RECOVERY ON
    • C、SET AUTO ON
    • D、You cannot enable automatic media recovery.

    正确答案:A

  • 第17题:

    You work in a company which uses SQL Server 2008. You are the administrator of the company database. Now you are in charge of a SQL Server 2008 instance. There are queries that have an estimated execution cost less than 3. You intend to configure the instance, make it use a single thread for these queries. In the options below, which sp_configure configuration option should you set?()

    • A、You should set query governor cost limit
    • B、You should set cost threshold for parallelism
    • C、You should set priority boost 
    • D、You should set precompute rank

    正确答案:B

  • 第18题:

    You have a secured Windows Communication Foundation (WCF) service. You need to track unsuccessful attempts to access the service. What should you do?()

    • A、Set the authorization Manager Type attribute of the service Authorization behavior to Message.
    • B、Set the include Exception Detailsln Faults attribute of the service Debug behavior to true.
    • C、Set the Mode attribute of the security configuration element to Message.
    • D、Set the message Authentication AuditLevel attribute of the service Security Audit behavior to Failure.

    正确答案:D

  • 第19题:

    You are creating a Windows Forms application by using the .NET Framework 3.5.You have resource files in five different languages.You need to test the application in each language. What should you do?()

    • A、Set the CurrentCulture property explicitly to the respective culture for each language.
    • B、Set the CurrentCulture property explicitly to IsNeutralCulture for each language.
    • C、Set the CurrentUICulture property explicitly to IsNeutralCulture for each language.
    • D、Set the CurrentUICulture property explicitly to the respective culture for each language.

    正确答案:D

  • 第20题:

    You are developing an ASP.NET Web page. You add a data-bound GridView control. The GridView contains a TemplateField that includes a DropDownList. You set the GridViews ClientIDMode property to Static, and you set the ClientIDRowSuffix property to ProductID. You need to be able to reference individual DropDownList controls from client-side script by using the ProductID. What should you set the ClientIDMode property of the DropDownList to? ()

    • A、AutoID
    • B、Static
    • C、Inherit
    • D、Predictable

    正确答案:D

  • 第21题:

    You are developing an application that will perform mathematical calculations.You need to ensure that the application is able to perform multiple calculations simultaneously. What should you do?()

    • A、Set the IdealProcessor property of the ProcessThread object.
    • B、Set the ProcessorAffinity property of the ProcessThread object.
    • C、For each calculation, call the QueueUserWorkItem method of the ThreadPool class.
    • D、Set the Process.GetCurrentProcess().BasePriority property to High.

    正确答案:C

  • 第22题:

    多选题
    Your computer has a wired network adapter and a wireless network adapter. You use the wireless network adapter only when you are traveling.  You need to configure the network adapter profile settings to ensure that the computer discovers other network devices only when you are at home.  Which two actions should you perform?()
    A

    When you configure access to the wired network at home, set the wired network adapter location type to Public.

    B

    When you configure access to the wired network at home, set the wired network adapter location type to Private.

    C

    When you configure access to the public wireless access points, set the wireless network adapter location type to Public.

    D

    When you configure access to the public wireless access points, set the wireless network adapter location type to Private.


    正确答案: D,B
    解析: 暂无解析

  • 第23题:

    单选题
    Terminal Services application runs on the server. Users report that the application stops responding. You monitor the memory usage on the server for a week. You discover that the application has a memory leak. A patch is not currently available.  You create a new resource-allocation policy in Microsoft Windows Server Resource Manager. You configure a Process Matching Criteria named TrackShip and select the application.  You need to terminate the application when the application consumes more than half of the available memory on the server. What should you do?()
    A

    Configure the resource-allocation policy and set the maximum working set limit option to half the available memory on the server. Set the new policy as a Profiling Policy.

    B

    Configure the resource-allocation policy and set the maximum working set limit option to half the available memory on the server. Set the new policy as a Managing Policy.

    C

    Configure the resource-allocation policy and set the maximum committed memory option to half the available memory on the server. Set the new policy as a Profiling Policy.

    D

    Configure the resource-allocation policy and set the maximum committed memory option to half the available memory on the server. Set the new policy as a Managing Policy.


    正确答案: A
    解析: 暂无解析

  • 第24题:

    单选题
    You are creating a Windows Forms Application by using the .NET Framework 3.5.You plan to create a Windows Installer package for a Windows Forms application.The package will be deployed on Windows Vista computers.You need to ensure that during deployment the installation does not elevate privileges of the user installing the application.What should you do?()
    A

    Create a custom action and set the NoImpersonate property to true

    B

    Create a custom action and set the NoImpersonate property to false

    C

    Create a manifest and set the RequestedExecutionLevel level attribute to AsInvoker.

    D

    Create a manifest and set the RequestedExecutionLevel level attribute to AsAdministrator.


    正确答案: D
    解析: 暂无解析