-
When you are performing media recover, and an archived log is lost or corrupt, which type of recover must you perform?()
A . Until SCN
B . Until time
C . Until cancel
D . Recover using backup control file.
-
When abandoning ship and jumping into the water from a substantial height without a life jacket,you should().
A . dive head first,using your hands to break the surface of the water
B . hold your arms firmly at your sides and jump feet first
C . jump feet first,covering your nose and mouth with one hand and grasping the opposing upper arm with the other
D . jump feet first,holding your knees to your chest
-
A Windows Communication Foundation (WCF) service sends notifications when the service is started and stopped.You need to implement a client that logs these notifications. Which class should you use?()
A . AnnouncementService
B . AnnouncementClient
C . DiscoveryClient
D . HttpListener
-
You need to dump the data from the master server and import it into a new slave server. Which mysqldump option can be used when dumping data from the master server in order to include the master server's binary log information?()
A . Include-master-info
B . Master-binlog
C . Include-log-file
D . Master-data
-
When you are allowing RMAN to backup your archived redo log files,how does RMAN know which archived redo logs to back up from your archive log destination?()
A . RMAN keeps a list of archive logs in a text file.
B . The DBA must manually tell RMAN which archive logs to backup.
C . RMAN has access to target control file and/or catalog information.
D . RMAN looks at the ARCHIVE_LOG_DEST parameter of your target database and backs up all archive logs found.
-
While logged into a Company switch you issue the following command: CompanySwitch(config-mst)# instance 10 vlan 11-12 What does this command accomplish?()
A . It enables a PVST+ instance of 10 for vlan 11 and vlan 12
B . It enables vlan 11 and vlan 12 to be part of the MST region 10
C . It maps vlan 11 and vlan 12 to the MST instance of 10.
D . It creates an Internal Spanning Tree (IST) instance of 10 for vlan 11 and vlan 12
E . It create a Common Spanning Tree (CST) instance of 10 for vlan 11 and vlan 12
F . It starts two instances of MST, one instance for vlan 11 and another instance for vlan 12.
-
After logging into a router, you type in "enable" and then enter the correct password when prompted. What is the current router prompt symbol at this point?()
A . >
B . #
C . ?
D . *
E . All of the above
F . None of the above
-
You are designing a plan to migrate an application to Windows Azure. The application generates log files in a proprietary format. You need to recommend an approach for retaining the existing log file format. What should you recommend?()
A . Configure Windows Azure Diagnostics to transfer event logs.
B . Configure Windows Azure Diagnostics to transfer directories.
C . Configure Windows AzureDiagnostics to transfer performance counters.
D . Configure Windows Azure Diagnostics to transfer basic Windows Azure logs.
-
You plan to deploy a Virtual Desktop Infrastructure (VDI). You need to ensure that all of the changes made to the virtual machines (VMs) in the VDI are discarded when users log off of their session. What should you include in the deployment?()
A . mandatory profiles
B . a virtual desktop pool
C . roaming profiles
D . personal virtual deskto
-
You are adding redo logs to the Oracle database. Creating a new redo log adds information to which of the following Oracle resources? ()
A . Shared pool
B . Control file
C . SGA
D . PGA
-
After logging into a router and typing in a few show commands, you press the up arrow key. What will this do?()
A . It will recall the previous command line
B . It will move the cursor one line up
C . It will redisplay the current command line
D . It will capitalize the command line
E . None of the above
-
When performing a database duplication, which duplicate database parameter would you set to ensure that the online redo logs are created in the correct location?()
A . log_file_name_convert
B . convert_log_file_name
C . file_name_convert_log
D . redo_log_file_name_convert
E . logfile_convert_directory
-
You have implemented OMF for redo log management. Which of the following choices reflects a log filename that might be employed when OMF is enabled?()
A . log01.log
B . logORCL01.log
C . 1_2.logALTER ROLLBACK SEGMENT
D . ora_1_asdf1234.log
-
While logged into a router, you wish to see the RIP routing updates in real time as they are sent and received. Which command would you issue to see these updates?()
A . Show ip protocols
B . Show ip route rip
C . Debug ip rip
D . Debug ip updates
E . Debug ip transactio
-
When a user tries to log into the system, the following error occurs: "3004-004. You must "exec" login from the lowest login Shell". Which of the following procedures should be performed next to determine the cause of the problem?()
A . Reboot the system.
B . Increase the number of ptys.
C . Increase number of licenses.
D . Run df -k to check for full filesystems.
-
You need to design a method to log changes that are made to servers and domain controllers. You also need to track when administrators modify local security account manager objects on servers. What should you do?()
A . Enable failure audit for privilege user and object access on all servers and domain controllers
B . Enable success audit for policy change and account management on all servers and domain controllers
C . Enable success audit for process tracking and logon events on all servers and domain controllers
D . Enable failure audit for system events and directory service access on all servers and domain controller
-
When you are in a situation where you make a plan as you go, you're
-
You are developing a Windows Communication Foundation (WCF) service. You enable logging in
You are developing a Windows Communication Foundation (WCF) service. You enable logging in the configuration file.The opening tag is defined as follows.<messagelogging br="" logentiremessage="true"> logMalformedMessages="true"logMessagesAtServiceLevel="true"logMessagesAtTransportLevel="true"maxMessagesToLog="20">You need to ensure that logging is implemented so that only messages with SOAP headers are logged.What should you add to the filters element of the application configuration file?()
A.<img src='https://img2.soutiyun.com/ask/uploadfile/2019-02-04/dabf07576919d2888eaaebeeefbe8e42.jpg' />
B.<img src='https://img2.soutiyun.com/ask/uploadfile/2019-02-04/0d3fc5a751c48bf4454f58321ef53f4c.jpg' />
C.<img src='https://img2.soutiyun.com/ask/uploadfile/2019-02-04/c3e7538a5accad25aa4ac16ce8d2126d.jpg' />
D.<img src='https://img2.soutiyun.com/ask/uploadfile/2019-02-04/241428daaa8185f55a085326b8cf7f39.jpg' />
-
You are developing a Web application. The Web application restricts access to an administrative page. The Web application uses the following code segment to protect the page.If Page.User.Identity.Name "CONTOSO\Administrator" Then Response.Redirect("login.aspx")End IfYou are logged on as Administrator. When you display the page, you are redirected to Login.aspx. You discover that the User.Identity.Name property is not being correctly populated. You need to ensure that you can access the page when you are logged on as Administrator. Which two actions should you perform? ()
A. In the Web.config file, enable impersonation.
B. In IIS, enable anonymous access.
C. In IIS, disable anonymous access.
D. In the Web.config file, set the authentication mode to Windows.
-
You are moving a Windows Communication Foundation (WCF) service into production. You need
You are moving a Windows Communication Foundation (WCF) service into production. You need to be able to monitor the health of the service. You only want to enable all performance counter instances exposed by the ServiceModelService counter group. Which element should you add to the system.serviceModel section in the application configuration file?()
A. <diagnostics performancecounters="ServiceOnly">
B. <diagnostics performancecounters="Off" wmiproviderenabled="true">
C. <diagnostics performancecounters="All">
D. <diagnostics wmiproviderenabled="true">
-
Didn't you go into a cave when it()?
A、has rained
B、rains
C、had rained
D、was raining
-
You are the network administrator for Active Directory domain. Thedomain includes Windows Server 2003 domain controllers and Windows XPProfessional client computers.A new administrator named Sandra is hired to assist you in deploying Windows XPProfessional to 100 new computers. Sandra installs the operating system on a newcomputer named TestKing11.However, when Sandra tries to log on to the domain from TestKing11, she isunsuccessful. The logon dialog box does now allow her to view and select the domainname.You need to ensure that Sandra can log on to the domain from TestKing11.What should you do?()
A. Enable the computer account for Testking11.
B. Configure TestKing11 as a member of the domain.
C. Add Sandra‘s user account to the Enterprise Admins group.
D. Add Sandra‘s user account to the Server Operators group.
-
Your network consists of a single domain. All domain controllers run Windows Server 2003 ServicePack 2 (SP2). All client computers run Windows XP Professional Service Pack 3 (SP3).You need to ensure that users’ personal settings are the same when they log on to different clientcomputers in the domain.What should you do? ()
A. From the properties of each user account, configure a profile path.
B. From the properties of each user account, configure a home folder path.
C. From the Default Domain Policy, configure a logon script that runs Loadstate.exe.
D. From the Default Domain Policy, configure a logon script that runs Scanstate.exe.
-
You are creating a custom user control. The custom user control will be used on 10 Web Forms for an ASP.NET Web site that allows users to register and log on to a personalized experience.The custom user control uses two TextBox controls and two Button controls.You need to ensure that the controls are visible only when users are not logged on to the Web site. You also need to minimize the amount of effort in development and maintenance for the Web site.Which two actions should you perform?()
A. Add the OnClick event handler for the Login button to the code used in the custom user control.
B. Add the OnClick event handler for the Login button to the code used in the Web Form where the control is added.
C. In the Page_Load method of the Web Form, add a code segment to set the visibility of the TextBox and Button controls where the control is added.
D. In the Page_Load method of the custom user control, add a code segment to set the visibility of the TextBox and Button controls.