052(三十七)

181、

181.Given below is a list of scenarios: 
1. A user terminates his session abnormally. 
2. The connection between the server and the client application terminates because of a network failure. 
3. A schema is accidentally dropped. 
4. The tablespace is accidentally dropped from the database.  
5. The hard disk gets corrupted and the data files in the disk are lost. 
6. The database instance abnormally shuts down because of power failure. 
Which scenarios require DBA intervention to perform recovery? 
A. 1, 3, and 6 
B. 4, 5, and 6 
C. 3, 4, and 5 
D. 1, 2, and 6 
Answer: C
View Code

 

182、

182.View the Exhibit1, which shows the options that are selected to create the user SL_REP. 
View the Exhibit2 and examine the contents of DATABASE_PROPERTIES. 
Which two statements are true regarding this user? (Choose two.) 
A. The user is authenticated by the operating system. 
B. The objects created by the user are placed in the USERS tablespace. 
C. The user does not require quota on the TEMP tablespace to perform sort operations. 
D. The user is forced to change the password at the first login to the database instance. 
E. The objects created by the user in future are unlocked to be accessed by all the users in the database by default. 

 

 

183、

183.Which two statements are true regarding B-tree index? (Choose two.) 
A. The leaf blocks in the index are doubly linked. 
B. The leaf node stores a bitmap for each key value. 
C. The rows with NULL value in key columns also have entries in the index. 
D. The deletion of a row from the table causes a logical deletion in index leaf block and the space becomes available for the new leaf entry. 
Answer: AD
View Code

 

184、

184.In your production database, data manipulation language (DML) operations are executed on the SALES table. 
You have noticed some dubious values in the SALES table during the last few days. 
You are able to track users, actions taken, and the time of the action for this particular period but the changes in data are not tracked. 
You decide to keep track of both the old data and new data in the table long with the user information. 
What action would you take to achieve this task? 
A. Apply fine-grained auditing. 
B. Implement value-based auditing. 
C. Impose standard database auditing to audit object privileges. 
D. Impose standard database auditing to audit SQL statements.
Answer: B

value-based auditing进行数据库审计时会记录审计对象中发生的插入、更新和删除操作,但是不会捕获更改的实际值
View Code

 

185、

185.You are managing an Oracle Database 11g database. The database is open, and you plan to perform Recovery Manager (RMAN) backups.
Which three statements are true about these backups? (Choose three.)
A. The backups would be consistent.  
B. The backups would be inconsistent. 
C. The backups would be possible only if the database is running in ARCHIVELOG mode. 
D. The backups would be possible only if the database is running in NOARCHIVELOG mode. 
E. The backups need to be restored and the database has to be recovered in case of a media failure. 
Answer: BCE

RMAN支持脱机备份和联机备份。
View Code

 

转载于:https://www.cnblogs.com/huanhuanang/p/5366520.html

评论
添加红包

请填写红包祝福语或标题

红包个数最小为10个

红包金额最低5元

当前余额3.43前往充值 >
需支付:10.00
成就一亿技术人!
领取后你会自动成为博主和红包主的粉丝 规则
hope_wisdom
发出的红包
实付
使用余额支付
点击重新获取
扫码支付
钱包余额 0

抵扣说明:

1.余额是钱包充值的虚拟货币,按照1:1的比例进行支付金额的抵扣。
2.余额无法直接购买下载,可以购买VIP、付费专栏及课程。

余额充值