Identify the persistent configuration setting for the target

题目
多选题
Identify the persistent configuration setting for the target database that can be set for the backup by using RMAN.() (Choose all that apply.)
A

Backup retention policy

B

Default backup device type

C

Default destinations for backups

D

Multiple backup device types for single backup

E

Default section size for backups

如果没有搜索结果或未解决您的问题,请直接 联系老师 获取答案。
相似问题和答案

第1题:

Which three statements are true about persistent configuration?()

A. A user cannot set privileges on the persistent lightweight jobs

B. Persistent lightweight jobs generate a large amount of metadata

C. It is possible to create fully self-contained persistent lightweight jobs

D. The use of a template is mandatory to create persistent lightweight jobs

E. Persistent lightweight jobs are useful when users need to create a large number of jobs in a short time


参考答案:A, D, E

第2题:

Which three statements are true about persistent configuration?() (Choose three.)

A. A user cannot set privileges on the persistent lightweight jobs

B. Persistent lightweight jobs generate a large amount of metadata

C. It is possible to create fully self-contained persistent lightweight jobs

D. The use of a template is mandatory to create persistent lightweight jobs

E. Persistent lightweight jobs are useful when users need to create a large number of jobs in a short time


参考答案:A, D, E

第3题:

Project life cycles are very useful for _____ and _____ .

A.Configuration management, termination

B.Objective setting, information gathering

C.Standardization, control

D.Configuration management, weekly status updates

E.Approval, termination


正确答案:C

第4题:

What is the purpose of the secure boot-config global configuration ?()

  • A、takes a snapshot of the router running configuration and securely archives it in persistent storage
  • B、stores a secured copy of the Cisco IOS image in its persistent storage
  • C、backs up the Cisco IOS image from flash to a TFTP server
  • D、enables Cisco IOS image resilience

正确答案:A

第5题:

In your Database, the TBS PERCENT USED parameter is set to 60 and the TBS PERCENT FREE parameter is set to 20.Which two storage-tiering actions might be automated when using information Lifecycle Management (ILM) to automate data movement?()

A. The movement of all segments to a target tablespace with a higher degree of compression, on a different storage tier, when the source tablespace exceeds TBS PERCENT USED

B. Setting the target tablespace to read-only

C. The movement of some segments to a target tablespace with a higher degree of compression, on a different storage tier, when the source tablespace exceeds TBS PERCENT USED

D. Setting the target tablespace offline

E. The movement of some blocks to a target tablespace with a lower degree of compression, on a different storage tier, when the source tablespace exceeds TBS PERCENT USED


参考答案:B, C

第6题:

Identify the persistent configuration setting for the target database that can be set for the backup by using RMAN.()

A. Backup retention policy

B. Default backup device type

C. Default destinations for backups

D. Multiple backup device types for single backup

E. Default section size for backups


参考答案:A, B, C

第7题:

Identify the persistent configuration setting for the target database that can be set for the backup by using RMAN.() (Choose all that apply.)

A. Backup retention policy

B. Default backup device type

C. Default destinations for backups

D. Multiple backup device types for single backup

E. Default section size for backups


参考答案:A, B, C

第8题:

● Project life cycles are very useful for _____ and _____ .

A Configuration management, termination

B Objective setting, information gathering

C Standardization, control

D Configuration management, weekly status updates

E Approval, termination


正确答案:C

第9题:

Which two statements are true about pool-based source NAT? ()(Choose two.)

A. PAT is not supported.

B. PAT is enabled by default.

C. It supports the address-persistent configuration option.

D. It supports the junos-global configuration option.


参考答案:B, C

第10题:

When configuring non-IP point-to-point networks on clusters that are larger than two nodes, which Type of configuration should be defined?()

  • A、 A start
  • B、 A ring
  • C、 A target mode fc
  • D、 A target mode scsi

正确答案:B

更多相关问题