A.IGNORE=Y
B.DIRECT=Y
C.CONSISTENT=Y
D.BUFFER=Y
您可能感兴趣的试卷
你可能感兴趣的试题
A.EXECUTE_CATALOG_ROLE
B.CONNECT
C.RESOURCE
D.RECOVERY_CATALOG_OWNER
E.RECOVERY_CATALOG_USER
A.Data files
B.Control files
C.Archived log files
D.Files storing RMAN scripts
A.OPEN
B.MOUNT
C.NOMOUNT
D.CLOSE
Using the command shown here, what time format must you specify to recover the database until a point-in-time?()
SQL> RECOVER DATABASE UNTIL TIME ’<time format>’;
A.YYYY-DD-MM:HH24:SS:MI
B.YYYY-DD-MM:HH24:SS:MM
C.YYYY-MM-DD:HH24:MI:SS
D.YYYY-DD-MM:SS:MI:HH24
A.It improves usability by enabling you to reuse the scripts to perform recovery operations.
B.It detects block corruption while restoration and recovery operations.
C.It enables you to perform block media recovery.
D.It is capable to recover through unrecoverable operations, with only full database backups.
A.SET AUTORECOVERY ON
B.SET RECOVERY ON
C.SET AUTO ON
D.You cannot enable automatic media recovery.
A.NORMAL
B.TRANSACTIONAL
C.ABORT
D.IMMEDIATE
E.INCONSISTENT
A.RESTORE
B.RECOVER
C.REPORT
D.BACKUP
A.1
B.5
C.10
D.15
E.Depends on system memory resources
A.CKPT
B.SMON
C.LGWR
D.DBWn
E.ARCn
最新试题
If you CROSSCHECK the backup piece that was previously marked as EXPIRED but is now available, what would the status of this backup piece be in the RMAN repository?()
Which Oracle background process is responsible for providing information about the instance name associated with the service handlers and services to the listener?()
Which of the following parameters would you use to record the errors that might be generated during the import operation?()
Which of the following steps is incorrect in the following sequence of enabling the ARCHIVELOG mode of a database?()
Which server stack communication layer corresponds to the client application layer in a distributed environment?()
The database is being restored from a closed backup. The data files, control files, password file, and parameter file are available, but the online redo logs are not. Because the online redo logs are not available, you must simulate recovery and alter the database open with the reset logs option so the online redo logs are created while the database opens. Which type of recover is used in this situation?()
Which of the following options would you choose to implement controlled access using remote authentication for your networks?()
RMAN enables you to open the target database when it is already mounted. Which command must you execute at the RMAN prompt to open the database?()
Which parameter allows SQL*Loader to load data into a table with the indexes in the unusable state, prior to the load operation?()
Where can you obtain information about full database backup set created using RMAN, if the control file was used as the repository?()