This instance is being used to manage the operating system files.
This instance is being used to manage the files of other databases.
This instance is being used to manage the instances of other databases.
This instance is being used to manage the background processes of other instances.
第1题:
A new switch is being installed in the Ezonexam network and you have been assigned the task of connecting it to an existing switch. In doing this, you want to set up the VLAN Trunking Protocol so that VLAN information can be passed between the switches. Which of the following must you do to accomplish this? (Choose all that apply).
A.You must set each end of the trunk line to IEEE 802.1e encapsulation.
B.You must set the same VTP management domain name on both switches.
C.You must set all ports on the two switches as access ports.
D.You must configure one of the switches as a VTP server.
E.You must use a rollover cable to connect the two switches.
第2题:
You have been assigned to manage a set of databases. The previous DBA did not leave you notes regarding the structure of each of the databases. While analyzing an instance, you notice that the system identifier (SID) for the instance is set to ’+ASM’. What is the purpose of this instance?()
第3题:
(b) As a newly-qualified Chartered Certified Accountant in Boleyn & Co, you have been assigned to assist the ethics
partner in developing ethical guidance for the firm. In particular, you have been asked to draft guidance on the
following frequently asked questions (‘FAQs’) that will be circulated to all staff through Boleyn & Co’s intranet:
(i) What Information Technology services can we offer to audit clients? (5 marks)
Required:
For EACH of the three FAQs, explain the threats to objectivity that may arise and the safeguards that should
be available to manage them to an acceptable level.
NOTE: The mark allocation is shown against each of the three questions.
第4题:
Since 1991,the goals set in the plan()
第5题:
You have an Exchange Server 2010 organization that contains 20 mailbox databases. You configure each database to retain all deleted items for 30 days.You need to ensure that all items that pass the retention period are permanently deleted daily between 02:00 and 06:00. Which cmdlet should you use?()
第6题:
A. /27
B. /28
C. /29
D. /30
第7题:
You have specified the warning and critical threshold values of an application tablespace to be 60% and 70% respectively. From the tablespace space usage metrics, you find that the actual space usage has reached the specified warning threshold value, but no alerts have been generated. What could be the reason for this?()
第8题:
A.Pre-invitation
B.Pre-request
C.Pre-announcement
D.Pre-apology
第9题:
You have been assigned the /24 network and need to segment it into at least 60 subnets.Which network mask meets this requirement?()
第10题:
A new switch is being installed and you have been assigned the task of connecting it to an existing switch. In doing this, you want to set up the VLAN Trunking Protocol so that VLAN information can be passed between the switches. Which of the following must you do to accomplish this?()