You are evaluating whether to add an iSCSI target in the main office to add storage to the file servers. Which technical requirement cannot be met when using an iSCSI target?()
第1题:
your company has a main office and two branch offices. Domain controllers in the main office host an active directory-integrated zone. The DNS servers in the branch office host a secondary zone for the domain and use the main office DNS servers as their DNS master servers for the zone. The company adds a new branch office. You add a member server named branch3 and install the DNS service on the server. You configure a secondary zone for the domain. The zone transfer fails. You need to configure DNS to provide zone data to the DNS server in the new branch office. What should you do?()
第2题:
Which statements are true regarding the creation of an incident package file by using the EM Workbench Support?()
第3题:
You work as a database administrator for Supportcenter.cn. You are using Recovery Manager (RMAN) to perform backups in your databases. Which four backup operations can be performed using RMAN?()
第4题:
You are using the control file to maintain information about the database backups that are being performed by Recovery Manager (RMAN).Identify two scenarios is which you must have a recovery catalog. ()(Choose two.)
第5题:
You want to implement the backup and recovery strategy in your database using Recovery Manager (RMAN). You have chosen the control file of the target database for the RMAN repository. Which command-line RMAN command would you use to establish a local connection between RMAN and the RMAN repository if your database is using password file authentication?()
第6题:
Your company has an Active Directory Domain Services (AD DS) domain. All servers run Windows Server 2008 R2. All client computers run Windows 7. You virtualize applications by using Microsoft Application Virtualization (App - V). You are deploying servers to five new branch offices. Each branch office will stream virtual applications from a local file server and perform application sequencing locally. You need to replicate application packages to all file servers and minimize bandwidth usage. What should you do?()
第7题:
You are evaluating whether to deploy Hyper-V.Which technical requirement is NOT met by a Hyper-V deployment?()
第8题:
Your company has a main office and two branch offices.Domain controllers in the main office host an Active Directory-integrated zone.The DNS servers in the branch offices host a secondary zone for the domain and use the main office DNS servers as their DNS Master servers for the zone.The company adds a new branch office. You add a member server named Branch3 and install the DNS Server server role on the server. You configure a secondary zone for the domain. The zone transfer fails.You need to configure DNS to provide zone data to the DNS server in the new branch office.What should you do?()
第9题:
Your network contains the servers shown in the following table. Server name S erver role Server location Server share Server1 File server Office1 Data1 Server2 File server Office2 Data2 Office1 and Office2 connect to each other by using a WAN link. Users in Office2 frequently access the same set of files stored in Data1. You need to reduce the amount of file transfer traffic across the WAN link. What should you add to Server1?()
第10题:
You need to recommend a file access solution for the Templates share. Which two actions should you recommend?()
第11题:
rman TARGET / NOCATALOG
rman TARGET sys/password
rman TARGET sys/password AS SYSDBA
rman TARGET sys/password@db_name CATALOG rman_user/rman_password@rcat
第12题:
Ensure that the data on the file servers is protected by using BitLocker.
Ensure that the file servers can access additional storage as a local drive.
Ensure that new storage solutions are supported by Windows Failover Clustering.
Ensure that storage can be provisioned without causing any downtime of the file servers.
第13题:
A customer has one IBM System Storage DS8700 in their main data center with one DS6800 at a secondary site. They are using the Global Copy feature between the sites. They want to bring up a test image at the secondary site using the primary site data. Which sequence of actions will properly bring up the secondary site?()
第14题:
You are using the control file to maintain information about the database backups that are being performed by Recovery Manager (RMAN). Identify two scenarios is which you must have a recovery catalog.()
第15题:
It is a holiday and no transactions are being performed on the database. You took a consistent backup of your database without using Recovery Manager (RMAN). How would you make use of this consistent backup in RMAN?()
第16题:
In Recovery Manager (RMAN), you have set control file autobackup to ON by using the following command: CONFIGURE CONTROLFILE AUTOBACKUP ON; Which two events would cause the control file to be backed up automatically? ()
第17题:
You are evaluating whether to add an additional hard disk drive to each file server and create a striped volume for the data files. Which storage requirement is met by adding the hard disk drive and creating the striped volume?()
第18题:
Cer-tech .com hosts a single Active Directory domain. All servers have Windows Server 2008. You areinstructed to install an iSCSI storage area network (SAN) for a group of file servers. Corporate securitypolicy requires that all data communication to and from iSCSI SAN must be very secure. You are assignedthe task to implement the highest security available for communications to and from the iSCSI SAN. Whatshould you do to achieve this task?()
第19题:
You are the network administrator for ExamSheet. You plan to upgrade 550 computers from Windows 95 to Windows 2000 Professional. You create an Unattend.txt file by using Setup Manager. You copy the file to the network share that will be used to install Windows 2000 Professional. You start the installation on a test computer by using a network shared folder and an answer file. When the installation is complete, you realize that the upgraded computers are not utilizing their entire hard disks. You want to ensure that the unattended installation utilizes the entire hard drive on all computers. What should you do? ()
第20题:
You are the network administrator for The network consists of a single Active Directory domain named All network servers run Windows Server 2003. Your network includes domain controllers, file and print servers, and application servers. The application servers run a variety of programs, including Microsoft SQL Server 2000 and Microsoft Exchange Server 2003. Your staff are responsible for monitoring current system performance on all servers. You need to enable your staff to use System Monitor to gather performance data for each unique server type. The data will be used for trend analysis and forecasting. Which two actions should you perform? ()(Each correct answer presents part of the solution. Choose two)
第21题:
Your company has an Active Directory Domain Services (AD DS) domain. All servers run Windows Server 2008 R2. All client computers run Windows 7. You virtualize applications by using Microsoft Application Virtualization (App-V). You are deploying servers to five new branch offices. Each branch office will stream virtual applications from a local file server and perform application sequencing locally. You need to replicate application packages to all file servers and minimize bandwidth usage. What should you do?()
第22题:
A backup of the target database when it is mounted
A backup of online redo log files when the database is open
A backup of only used data blocks in the file beingbeingbackup up
A backup of online, read/write data files when the database is open
A backup of only those data blocks that have changed since a previous backup
A backup of online, read/write data files when the database is in the NOMOUNT state.
第23题:
a tablespace is taken offline
the database instance is restarted
a new data file is added to an existing tablespace
a successful backup is recorded in the RMAN repository
the RMAN connection is disconnected from the target database