• 053(十一)


    51、

    51.To control the execution of a server process when it is receiving bad packets from a potentially malicious client, 
    you set the SEC_PROTOCOL_ERROR_FURTHER_ACTION initialization parameter as follows:
    SQL> ALTER SYSTEM SET SEC_PROTOCOL_ERROR_FURTHER_ACTION = Drop,10;
    What is the significance of this setting?
    A. It terminates the client connection after 10 bad packets and the client cannot reconnect to the same instance.
    B. It terminates the client connection after 10 bad packets but the client can still reconnect, and attempt the same operation again.
    C. It terminates the client connection 10 seconds after receiving a bad packet and the client cannot reconnect to the same instance.
    D. It terminates the client connection after receiving a bad packet and the client can reconnect to the same instance after 10 minutes.
    Answer: B
    View Code

    52、

    52.You have the following requirements in relation to the detection of block corruption for your database instance:
    Check for logical self-consistency of data blocks when modified in memory.
    Checksums are calculated before and after the block change.
    Checks are performed for the lost writes to the physical standby database.
    Which method would help you perform the above checks automatically?
    A. Set the DB_SECUREFILE parameter to PERMITTED. 
    B. Set the DB_ULTRA_SAFE parameter to DATA_ONLY. 
    C. Set the DB_LOCK_CHECKSUM parameter to TYPICAL. 
    D. Set the DB_LOST_WRITE_PROTECT parameter to TYPICAL. 
    Answer: B 
    View Code

    53、

    53.You want to use RMAN to create compressed backups.
    Which statement is true about the compression algorithms that RMAN can use?
    A. The BZIP2 compression algorithm consumes more CPU resources than the ZLIB compression algorithm.
    B. The ZLIB compression algorithm consumes more CPU resources than the BZIP2 compression algorithm.
    C. The ZLIB compression algorithm provides maximum compression and produces smaller backups than the BZIP2 compression algorithm.
    D. Only the BZIP2 compression algorithm can be used to make compressed backups to disk.
    Answer: A
    View Code

    54、

    54.Evaluate the following function code:
    CREATE FUNCTION get_dept_avg(dept_id NUMBER) RETURN NUMBER RESULT_CACHE
    RELIES_ON
    (EMPLOYEES) IS avgsal NUMBER(6);
    BEGIN
    SELECT AVG(SALARY)INTO avgsal
    FROM EMPLOYEES
    WHERE DEPARTMENT_ID = dept_id;
    RETURN avgsal;
    END get_dept_avg;
    Which statement is true regarding the above function?
    A. The cached result becomes invalid when any structural change is done to the EMPLOYEES table.
    B. If the function execution results in an unhandled exception, the exception result is also stored in the cache.
    C. Each time the function is invoked in a different session, the current result in the result cache gets overwritten.
    D. If the function is invoked with a different parameter value, the existing result in the result cache gets overwritten by the latest value.
    Answer: A
    View Code

    55、

    55.Following is the list of locations in random order where oranfstab can be placed.
    1./etc/mtab
    2.$ORACLE_HOME/dbs/oranfstab
    3./etc/oranfstab
    What is the sequence in which Direct NFS will search the locations?
    A. 1, 2, 3
    B. 3, 2, 1
    C. 2, 3, 1
    D. 1, 3, 2
    Answer: C
    View Code
  • 相关阅读:
    [CSAPP笔记][第九章虚拟存储器][吐血1500行]
    [CSAPP笔记][第六章存储器层次结构]
    [CSAPP笔记][第八章异常控制流][呕心沥血千行笔记]
    好吧,刚把CSDN搬家到博客园。。记录一发
    [CSAPP笔记][第二章信息的表示和处理]
    综合练习:词频统计
    组合数据类型综合练习:英文词频统计
    熟悉常用的Linux操作
    1.大数据概述
    语义分析
  • 原文地址:https://www.cnblogs.com/huanhuanang/p/5387362.html
Copyright © 2020-2023  润新知