You have been assigned to manage a set of databases. The pre

题目
单选题
You have been assigned to manage a set of databases. The previous DBA did not leave you notes regarding the structure of each of the databases. While analyzing an instance, you notice that the system identifier (SID) for the instance is set to ’+ASM’. What is the purpose of this instance?()
A

 This instance is being used to manage the operating system files.

B

 This instance is being used to manage the files of other databases.

C

 This instance is being used to manage the instances of other databases.

D

 This instance is being used to manage the background processes of other instances.

如果没有搜索结果或未解决您的问题,请直接 联系老师 获取答案。
相似问题和答案

第1题:

A new switch is being installed in the Ezonexam network and you have been assigned the task of connecting it to an existing switch. In doing this, you want to set up the VLAN Trunking Protocol so that VLAN information can be passed between the switches. Which of the following must you do to accomplish this? (Choose all that apply).

A.You must set each end of the trunk line to IEEE 802.1e encapsulation.

B.You must set the same VTP management domain name on both switches.

C.You must set all ports on the two switches as access ports.

D.You must configure one of the switches as a VTP server.

E.You must use a rollover cable to connect the two switches.


正确答案:BD
解析:Explanation:ThefollowingdescribeswhatisneededinordertocorrectlysetupVTP:IncorrectAnswers:A.TheencapsulationcanbeeitherISLor802.1Q,andneedtomatchateachendofthetrunk.C.PortsmustonlybeassignedtoVLANS.Oncethatisdoneandthetrunkisupandrunning,theVLANinformationwillbepassedbetweentheswitches.E.AregularCAT5cableisusedtoconnecttheswitches,assuming10/100Ethernetisused.

第2题:

You have been assigned to manage a set of databases. The previous DBA did not leave you notes regarding the structure of each of the databases. While analyzing an instance, you notice that the system identifier (SID) for the instance is set to ’+ASM’. What is the purpose of this instance?()

  • A、 This instance is being used to manage the operating system files.
  • B、 This instance is being used to manage the files of other databases.
  • C、 This instance is being used to manage the instances of other databases.
  • D、 This instance is being used to manage the background processes of other instances.

正确答案:B

第3题:

(b) As a newly-qualified Chartered Certified Accountant in Boleyn & Co, you have been assigned to assist the ethics

partner in developing ethical guidance for the firm. In particular, you have been asked to draft guidance on the

following frequently asked questions (‘FAQs’) that will be circulated to all staff through Boleyn & Co’s intranet:

(i) What Information Technology services can we offer to audit clients? (5 marks)

Required:

For EACH of the three FAQs, explain the threats to objectivity that may arise and the safeguards that should

be available to manage them to an acceptable level.

NOTE: The mark allocation is shown against each of the three questions.


正确答案:
(b) FAQs
(i) Information Technology (IT) services
The greatest threats to independence arise from the provision of any service which involves auditors in:
■ auditing their own work;
■ the decision-making process;
■ undertaking management functions of the client.
IT services potentially pose all these threats:
■ self-interest threat – on-going services that provide a large proportion of Boleyn’s annual fees will contribute to a
threat to objectivity;
■ self-review threat – e.g. when IT services provided involve (i) the supervision of the audit client’s employees in the
performance of their normal duties; or (ii) the origination of electronic data evidencing the occurrence of
transactions;
■ management threat – e.g. when the IT services involve making judgments and taking decisions that are properly
the responsibility of management.
Thus, services that involve the design and implementation of financial IT systems that are used to generate information
forming a significant part of a client’s accounting system or financial statements is likely to create significant ethical
threats.
Possible safeguards include:
■ disclosing and discussing fees with the client’s audit committees (or others charged with corporate governance);
■ the audit client providing a written acknowledgment (e.g. in an engagement letter) of its responsibility for:
– establishing and monitoring a system of internal controls;
– the operation of the system (hardware or software); and
– the data used or generated by the system;
■ the designation by the audit client of a competent employee (preferably within senior management) with
responsibility to make all management decisions regarding the design and implementation of the hardware or
software system;
■ evaluation of the adequacy and results of the design and implementation of the system by the audit client;
■ suitable allocation of work within the firm (i.e. staff providing the IT services not being involved in the audit
engagement and having different reporting lines); and
■ review of the audit opinion by an audit partner who is not involved in the audit engagement.
Services in connection with the assessment, design and implementation of internal accounting controls and risk
management controls are not considered to create a threat to independence provided that the firm’s personnel do not
perform. management functions.
It would be acceptable to provide IT services to an audit client where the systems are not important to any significant
part of the accounting system or the production of financial statements and do not have significant reliance placed on
them by the auditors, provided that:
■ a member of the client’s management has been designated to receive and take responsibility for the results of the
IT work undertaken; and
■ appropriate safeguards are put in place (e.g. using separate partners and staff for each role and review by a partner
not involved in the audit engagement).
It would also generally be acceptable to provide and install off-the-shelf accounting packages to an audit client.

第4题:

Since 1991,the goals set in the plan()

  • A、have been largely achieved
  • B、have largely not been achieved
  • C、have been achieved in some significant areas
  • D、have not been achieved at all

正确答案:B

第5题:

You have an Exchange Server 2010 organization that contains 20 mailbox databases. You configure each database to retain all deleted items for 30 days.You need to ensure that all items that pass the retention period are permanently deleted daily between 02:00 and 06:00. Which cmdlet should you use?()

  • A、Set-MailboxDatabase
  • B、Set-MailboxServer
  • C、Set-OrganizationConfig
  • D、Set-RetentionPolicy

正确答案:A

第6题:

You have been assigned the /24 network and need to segment it into at least 60 subnets. Which network mask meets this requirement?()

A. /27

B. /28

C. /29

D. /30


参考答案:D

第7题:

You have specified the warning and critical threshold values of an application tablespace to be 60% and 70% respectively. From the tablespace space usage metrics, you find that the actual space usage has reached the specified warning threshold value, but no alerts have been generated. What could be the reason for this?()

  • A、 The EVENT parameter was not set
  • B、 The SQL_TRACE parameter is set to FALSE
  • C、 The Enterprise Manager Grid Control is not used
  • D、 The STATISTICS_LEVEL parameter is set to BASIC
  • E、 The TIMED_STATISTICS parameter is set to FALSE

正确答案:D

第8题:

What kind ofpre-sequence is A’s first utterance in the following discourse? ()A: Do you have a rubber?B: Yes.A: May I use it?B: Here you are.

A.Pre-invitation

B.Pre-request

C.Pre-announcement

D.Pre-apology


正确答案:B

第9题:

You have been assigned the /24 network and need to segment it into at least 60 subnets.Which network mask meets this requirement?()

  • A、/27
  • B、/28
  • C、/29
  • D、/30

正确答案:D

第10题:

A new switch is being installed and you have been assigned the task of connecting it to an existing switch. In doing this, you want to set up the VLAN Trunking Protocol so that VLAN information can be passed between the switches. Which of the following must you do to accomplish this?()

  • A、You must set each end of the trunk line to IEEE 802.1e encapsulation.
  • B、You must set the same VTP management domain name on both switches.
  • C、You must set all ports on the two switches as access ports.
  • D、You must configure one of the switches as a VTP server.
  • E、You must use a rollover cable to connect the two switches.

正确答案:B,D

更多相关问题