Users in your PROD database complain about the slow response of the transactions. While investigating the reason, you find that the transactions are waiting for the undo segments to be available, and undo retention has been set to zero. What would you do to overcome this problem?()
第1题:
Unfortunately,quite a number of the users a redissatisfied()your Straw Baskets supplied to Order No.T90.
第2题:
There is a problem with one of the disks used for your database and your system administrator informs you that the disk needs to be replaced. The replacement disk will not be available until tomorrow. There was only one data file on this disk; it belongs to the USERS tablespace in your PROD database. Your PROD database runs in ARCHIVELOG mode and nightly online backups are taken. The users need to be able to access the data in the USERS tablespace before the replacement disk arrives. You have already taken the USERS tablespace offline and have restored the data file from last night’s backup to a new disk. Which additional steps are required in order to make the USERS tablespace available?()
第3题:
You share your portable computer with a co-worker. You use separate user accounts to log on. A wireless network is available to you and your co-worker. You need to prevent your co-worker from modifying your wireless network profile. What should you do?()
第4题:
Rate your level of proficiency with monitoring and optimizing system performance and reliability of Windows XP Professional for desktop and mobile users.()
第5题:
Your company has a single Active Directory domain. The company network is protected by a firewall.Remote users connect to your network through a VPN server by using PPTP.When the users try to connect to the VPN server, they receive the following error message :Error 721:The remote computer is not responding.You need to ensure that users can establish a VPN connection.What should you do?()
第6题:
You are designing a strategy for migrating to the new environment. Which two factions from your current environment will affect your migration strategy?()
第7题:
Only bring the tablespace back online.
Only recover the tablespace and then bring the tablespace back online.
Shut down the database, recover the data file and then start up the database.
Issue the ALTER DATABASE RENAME FILE command, recover the tablespace, and then bring the tablespace online.
Recover the tablespace, issue the ALTER DATABASE RENAME FILE command, and then bring the tablespace online.
第8题:
It is a list of remote database links stored in the XML file that are available to the users of the database.
It is a list of users and network privileges stored in the XML file according to which a group of users can connect to one or more hosts.
It is a list of users and network privileges stored in the data dictionary according to which a group of users can connect to one or more hosts.
It is the list of the host names or the IP addresses stored in the data dictionary that can connect to your database through PL/SQL network utility packages such as UTL_TCP.
第9题:
the Federation Trust
the EWS virtual directory
the default sharing policy
the Organizational Relationship
第10题:
The TEMP tablespace is taken offline. The users using the TEMP tablespace for sorting are disconnected after their queries complete.
The TEMP tablespace is taken offline. The users using the TEMP tablespace for sorting are disconnected and must re-execute their queries.
The TEMP tablespace is taken offline. The users using the TEMP tablespace for sorting are not disconnected, but these users must re-execute their queries.
The TEMP tablespace is not taken offline. The users using the TEMP tablespace for sorting are not disconnected, and their queries execute successfully.
第11题:
<authorization> <allow users=?/> </authorization>
<authorization> <deny users=?/> </authorization>
<authorization> <deny users=*/></authorization>
<authorization> <allow users=*/> </authorization>
第12题:
Deploy one Microsoft SharePoint Foundation 2010 site. Require users to access the SharePoint site by using a Secure Socket Transmission Protocol (SSTP) connection.
Deploy two Microsoft SharePoint Foundation 2010 sites.Configure one site for internal users. Configure the other site for remote users. Publish the SharePoint sites by using HTTPS.
Configure a Network Policy and Access Services (NPAS) server to act as a VPN server. Require remote users to access the files by using an IPsec connection to the VPN server.
Store all sensitive files in folders that are encrypted by using Encrypting File System (EFS). Require remote users to access the files by using Secure Socket Transmission Protocol (SSTP).
第13题:
Your end users will need to change values in a REF lookup field in the form application you create. To facilitate choosing a new appropriate value, your provide them with? ()
第14题:
You work as the exchange administrator at TestKing.com. The TestKing.com network contains an Exchange Server 2010 Organization. TestKing.com has its headquarters in Stockholm where you are located. A new TestKing.com compliance policy requires that e-mail messages sent to the marketing users olderthan 150 days be deleted and e-mail messages sent to users in other departments are deleted after 90days. You receive an intruction from the CIO to recommend a solution to management that will complywith the eompliance policy. What should you do?()
第15题:
Your computer is part of a workgroup. You share files with other users on the network. You configure exceptions in Microsoft Windows Firewall to allow file sharing. Users report that they are unable to connect to your computer. You need to ensure that other users are able to access only the shared files. What should you do? ()
第16题:
Your network consists of an Active Directory domain named contoso.com. You have a computer namedcomputer1.contoso.com. Your network is configured to use only IPv6. You need to request that a DNS record be created to enable users to connect to your computer by using the name dev.contoso.com. Which type of record should you request ?()
第17题:
You have an Exchange Server 2010 organization.Users report that they can share free/busy information with users at a federated partner, but they cannot share contacts with those users. You need to ensure that your users can share contacts with users at the federated partner. What should you modify?()
第18题:
Configure the FTP host to accept incoming requests on service port 80.
Configure an Internet Connection Sharing application type for FTP to use remote server port 23.
Configure an Internet Connection Sharing service type for FTP use service port 21 on the FTP host computer.
Configure an Internet Connection Sharing service type for FTP use service port 23 on the FTP host computer.
第19题:
Move the Preferred Members role-mapping rule to the top of the list.
Remove the Preferred Members role from the role-mapping rule.
Edit the Preferred Members role-mapping rule so that the username is equal to *.
Edit the Preferred Members role-mapping rule so that only the select users are assigned to the role-mapping rule.
Edit the Preferred Members role-mapping rule and select Stop processing rules when this rule matches.
第20题:
Very High
High
Moderate
Low
Very Low
第21题:
Instruct the users to use IRM encryption method only
Instruct the users to use S/MIME encryption method only
Using command New-ExchangeCertificate cmdlet
Using the Set-ExchangeServer cmdlet
第22题:
Use Windows Explorer to receive the offline files
Using the Windows Explorer, disable the cache for the reports on the network share
Use the Windows NT explorer to grant the special access for the reports on the network share
Use the synchronization manager to configure synchronization not to occur when users are connected to the LAN connection.
第23题:
Managed Folder mailbox policies
an OWA mailbox policy
Personal Archives and an Archive policy
Retention Policy Tags and a Retention Policy