It checks the database for intrablock corruptions.
It can detect corrupt pfiles.
It can detect corrupt spfiles.
It checks the database for interblock corruptions.
It can detect corrupt block change tracking files.
第1题:
Your database in running in the ARCHIVELOG mode. You issue the following command to back up datafile 2 in your database. RMAN> COPY DATAFILE 2 TO ’D:///ORACLE/ORA90/MYNEWDB/DA2.DBF’; Which two statements are true regarding the backup created using this command?()
第2题:
You use a recovery catalog for maintaining your database backups.You execute the following command:$rman TARGET / CATALOG rman / cat@catdbRMAN > BACKUP VALIDATE DATABASE ARCHIVELOG ALL;Which two statements are true?()
第3题:
Which statement is true regarding the VALIDATE DATABASE command?()
第4题:
Which two statements regarding the control file and Recover Manager are true? ()
第5题:
You issue this RMAN command: RMAN> create script Level0Backup { backup incremental level 0 format ‘/u01/db01/backup/%d_%_Sp’ fileperset 5 (database include current controlfile); sql ‘alter database archive log current’; } Which three statements are true about the Level0Backup script you just created?()
第6题:
Health Monitor checks can be used to scan the contents of the redo log and archive logs for accessibility and corruption.
Health Monitor checks can be used to verify the integrity of database files and report failures if these files are inaccessible,corrupt or inconsistent.
Health Monitor checks can be used to verify the contents of dictionary entries for each dictionary object and fix it automatically.
Health Monitor checks are always initiated manually when there is some critical error.
第7题:
It can be configured to block Java traffic.
It can be configured to detect and prevent SYN-flooding denial-of-service (DoS) network attacks.
It can only examine network layer and transport layer information.
It can only examine transport layer and application layer information.
The inspection rules can be used to set timeout values for specified protocols.
The ip inspect cbac-name command must be configured in global configuration mode.
第8题:
It checks the database for intrablock corruptions.
It can detect corrupt pfiles.
It can detect corrupt spfiles.
It checks the database for interblock corruptions.
It can detect corrupt block change tracking files.
第9题:
The script is stored only in the control file.
The script is stored only in the recover catalog.
The script can be executed only by using the RMAN RUN command.
The commands of the script can be displayed with the LIST command.
The commands of the script can be displayed with the PRINT command.
The commands of the script can be displayed with the REPORT command.
第10题:
The control file can grow in size.
The control file can store RMAN scripts.
CONTROL_FILE_RECORD_KEEP_TIME determines retention time for RMAN records.
The RMAN catalog can exist solely in the control file of the target database.
第11题:
The ADR base keeps all diagnostic information in binary format
SQL*Plus provides the ADRI script, which can be used to work with ADR
The ADR can be used for problem diagnosis only when the database is open
The ADR can be disabled by settting the DIAGNOSTIC_DEST parameter to null
The ADR can be used for problem diagnosis even when the database instance is down
The ADR base is shared across multiple instances
第12题:
The ADR base keeps all diagnostic information in binary format
SQL*Plus provides the ADRI script, which can be used to work with ADR
The ADR can be used for problem diagnosis only when the database is open
The ADR can be disabled by settting the DIAGNOSTIC_DEST parameter to null
The ADR can be used for problem diagnosis even when the database instance is down
The ADR base is shared across multiple instances
第13题:
Which two statements are true about the Automatic Diagnostic Repository (ADR)?()
第14题:
Which two statements are true regarding hot patching?()
第15题:
Which two statements are true about the Automatic Diagnostic Repository (ADR)?() (Choose two.)
第16题:
Which two statements are true regarding Health Monitor checks in Oracle Database 11g?()
第17题:
Which of the following methods can be used to detect block corruption?()
第18题:
The copy of the datafile created is stored in the RMAN repository.
The copy of the datafile created can be viewed using the LIST BACKUP command.
The copy of the datafile created using this COPY command can be placed only on the disk.
The copy of the datafile created is similar to the backup of the file created using the BACKUP command.
The copy of the datafile created can be used for recovering the database using the user-managed recovery method.
第19题:
It checks the database for intrablock corruptions only.
It checks for block corruption in the valid backups of the database.
It checks the database for both intrablock and interblock corruptions.
It checks for only those corrupted blocks that are associated with data files.
第20题:
It requires relinking of the Oracle binary.
It does not require database instance shutdown.
It can detect conflicts between two online patches.
It is available for installing all patches on all platforms.
It works only in a single database instance environment.
第21题:
Online redo log files can be backed up.
Archived redo log files are backed up.
Only used data blocks can be backed up as backup sets.
Only consistent database backups can be performed.
RMAN backup can be taken only if the database is configured in ARCHIVELOG mode.
第22题:
It checks the database for intrablock corruptions only.
It checks for block corruption in the valid backups of the database.
It checks the database for both intrablock and interblock corruptions.
It checks for only those corrupted blocks that are associated with data files.
第23题:
A role can be granted to itself.
Roles are owned by the SYS user.
Roles can be granted to other roles.
A role cannot be assigned external authentication.
A role can contain both system and object privileges.
第24题:
ANALYZE operations
dbv
SQL queries that access the potentially corrupt block
RMAN
All of the above