首页/ 题库 / [单选题]

You work&en的答案

You work in a company which is named Wiikigo Corp. The company uses SQL Server 2008. You are the administrator of the company database. Now you are in charge of a SQL Server 2008 instance. There is a database named DB1 in the instance. In the database, a small percentage of data is modified everyday. Ever day in the morning, you have to create a read-only copy of the database for reporting purposes and make sure that you use as little disk space as possible. 
In the options below, which strategy should you use?()  

单选题
2021-12-30 14:34
A、You should use database snapshots 
B、You should use database backup and restore 
C、You should use database backup and restore along with compression 
D、You should use schema-bound views in a read-only database. The database resides on the same instance.
查看答案

正确答案
A

试题解析

感兴趣题目

You need to recommend a monitoring solution for App1 that meets the museum’s technical requirements.  
What should you include in the recommendation?()

You need to recommend a management solution for the corporate Web sites that meets the museum’s security policy   
What should you include in the recommendation?()

Exhibit:

You work as a network administrator at. You study the exhibit carefully. In the wireless LAN all devices are configured with static WEP keys.
 What will happen if the access point receives packets sent by the wireless client adapter that are not encrypted with the appropriate key?()

Exhibit: 

You work as a network technician at. Study the exhibit carefully. You are required configure the static WEP keys on the wireless client adapter using the Cisco ADU (Aironet Desktop Utility). 
What should you have in mind when doing this?()

Exhibit, error
You work as a database administrator for Supportcenter.cn. When you try to connect to the database, you get an error (See exhibit). What could be the possible reason for getting such an error?()

You create an ASP.NET server control in the SampleControl namespace. The control uses a JavaScript file names Refresh.js to implement AJAX functionality.You need to ensre that the JavaScript file is included in the assembly. 
Which two actions should you perform?()

You work as a Web Developer at Certkiller.com. You are in the process of creating a Webapplication using Microsoft ASP.NET 3.5. 
You host the Web application in Microsoft Internet Information Services (IIS) 6.0. You browse theapplication and receive the following error message: 
Server Application Unavailable 
The web application you are attempting to access on this web server is currently unavailable.Please hit the "Refresh" button in your web browser to retry your request. 
You view the Application event log and discover the following message: 
It is not possible to run two different versions of ASP.NET in the same IIS process. Please use theIIS Administration Tool to reconfigure your server to run the application in a separate process. 
To ensure productivity you need to solve this problem as quick as possible. 
What should you do?()

You are designing a top-level OU structure to meet the business and technical requirements. 
Which top-evel OU or OUs should you use? ()

You have a computer that runs Windows 7. The computer is in a workgroup. You need to ensure that youcan decrypt Encrypting File System (EFS) files on the computer if you forget your password. 
What are two possible ways to achieve this goal?()

You are employed as the Exchange administrator at Company.com.You are in the process of 
installing a new Exchange Server 2010 Organization.After the installation you send a text message to an external client and receive the subsequent non-delivery report (NDR): "Delivery has failed to these recipients or groups: [email protected] ([email protected]).The recipient’s e-mail system isn’t accepting messages now.Please try resending this message later or contact the recipient directly." You attempt to e-mail the user from an external e-mail system with great success.To ensure productivity you need to make sure e-mails can be sent to external clients from within the organization.
What should you do?()

You work in a company which uses SQL Server 2008. You are the administrator of the company database. Now you are in charge of a SQL Server 2008 instance. The instance has databases for a finance application and a manufacturing application. You want to put some limitation on the maximum CPU query time allowed by the applications, so you configure the Resource Governor to achieve this. But you notice that certain reports do not execute successfully any longer on the manufacturing application. You have to allow the manufacturing application to consume more CPU time, so you have to change the Resource Governor configuration. 
Which Resource Governor component should you configure?()  

Your portable computer is in sleep mode. When you resume work on the portable computer, you are not prompted for a password. 
You need to ensure that you are prompted for a password each time the portable computer recovers from sleep mode.
 What should you do?()

相关题目

All client computers in your network run Windows 7 Enterprise.   
You need to prevent all standard user accounts from running programs that are signed by a specific publisher.  
What should you do?()

You need to recommend a backup strategy for the servers in the San Francisco office. The strategy must meet the company's technical requirements   
What should you include in the recommendation?()

You have a computer that runs Windows 7. Your computer s disk configuration is shown in the exhibit.(Click the Exhibit button.) You need to ensure that you can create a striped volume on the computer. 
What should you do?()

You are working on a very large database. You had performed a binary backup of the control file a month ago. After this you added a few tablespaces, and dropped a couple of tablespaces. This morning, due to hardware failure, you lost all your control files. 
How would you recover the database from this situation?()

You work in a company which is named Wiikigo Corp. The company uses SQL Server 2008. You are the administrator of the company database. Now you are in charge of a SQL Server 2008 instance. There is a database named DB1 in the instance. In the database, a small percentage of data is modified everyday. Ever day in the morning, you have to create a read-only copy of the database for reporting purposes and make sure that you use as little disk space as possible. 
In the options below, which strategy should you use?()  

You work in a company which is named Wiikigo Corp. The company uses SQL Server 2008. You are the administrator of the company database. Now you are in charge of a SQL Server 2008 instance. There is a text file which is named SQL01.log on the E: drive. A SQL Server Agent job executes every 2 minutes and logs information to the text file. You get a report from users saying that the sever doesn't make response. As the technical support, you check and find that the SQL Server Agent service does not run and the SQL Server Agent job no longer functions. You have to identify the reason why the SQL Server Agent service is unresponsive. 
In the options below, which log should you check? () 

A highly available WebLogic cluster in UNIX is configured for automatic server migration. Node Managed is configured on both machines to start managed servers.
How should you simulate a managed server failure to test whether automatic server migration is working?()

You are the administrator of Red Lington Enterprises. You want to upgrade 125 computers from Windows NT Workstation 4.0 to Windows 2000 Professional. You create an unattend.txt file by using the setup manager. 
You copy the file to a floppy disk. You then start the installation on a computer in the test lab using the Windows 2000 Professional CD-ROM.  After the computer starts you insert the floppy disk. Even though you set the user interaction level to full-unattended mode you are prompted for all the configuration parameters. You want to ensure that the unattended installation does not prompt you for input. 
What should you do? ()



You work as a network engineer for . You study the exhibit carefully. Three switches are configured for HSRP. Switch1 remains in the HSRP listen state. 
What is the most likely cause of this status?()

In your production database, data manipulation language (DML) operations are executed on the SALES table.You have noticed some dubious values in the SALES table during the last few days. You are able to track
users, actions taken, and the time of the action for this particular period but the changes in data are not tracked.You decide to keep track of both the old data and new data in the table along with the user information. 
Whataction would you take to achieve this task()

User SCOTT executes the following command on the EMP table but has not issued COMMIT, ROLLBACK,or any data definition language (DDL) command: 
SQL> SELECT job FROM emp 
2  WHERE job=’CLERK’ FOR UPDATE OF empno; 
SCOTT has opened another session to work with the database. Which three operations would wait when issued in SCOTT’s second session?()

User SCOTT executes the following command on the EMP table but has not issued COMMIT, ROLLBACK, or any data definition language (DDL) command: SQL> SELECT ename FROM emp 
2 WHERE job=’CLERK’ FOR UPDATE OF empno; 
SCOTT has opened another session to work with the database instance. 
Which three operations wouldwait when issued in SCOTT’s second session()

In which two scenarios should you issue the following command?()
FLASHBACK TABLE SCOTT.EMP TO TIMESTAMP SYSTIMESTAP- INTERVAL ’15’ MINUTE;

You are working as a DBA on the decision support system. There is a business requirement to track and store all transactions for at least three years for a few tables in the database. Automatic undo management is enabled in the database. 
Which configuration should you use to accomplish this task?()

Your boss, Miss ,is interested in CEF.
 What should you tell her? ()

You work as a network technician at. Your boss, Mrs. , is interested in the Spanning Tree Protocol timers. 
What can you tell her regarding the default STP timers? ()

You work as a network technician at Company. Your boss, Mrs., is interested in  LWAPP (Lightweight Access Point Protocol). 
What should you tell her regarding this technology?  ()

You work as a network technician at Company. Your boss, Mrs., is interested in  the Cisco Compatible Extensions program.
 What are three features of this program? ()

You need to recommend a backup solution for the VMs that meets the museum's technical requirements.  
What should you include in the recommendation?()

You need to recommend a solution for controlling access to the Internet.The solution must meet the museum’s security polic.
What should you include in the recommendation?()

广告位招租WX:84302438

免费的网站请分享给朋友吧