Two data files have been deleted at the operating system lev

题目
单选题
Two data files have been deleted at the operating system level by accident. Your database is running in ARCHIVELOG mode and online backups are taken nightly. One of the data files that has been deleted belongs to the USERS tablespace on the other belongs to the SYSTEM tablespace. How can you recover from this situation?()
A

Shut down the database, restore the two data files and then start up the database. 

B

Take the system and users tablespace offline, restore the two data files, recover the two datafiles, and then bring the SYSTEM and USERS tablespaces online. 

C

Shut down the database, restore the two data files, start up the database in MOUNT mode, recover the two data files, and then alter the database open. 

D

Take the SYSTEM and USERS tablespaces offline, recover the two datafiles and then bring the SYSTEM and USERS tablespaces online.

如果没有搜索结果或未解决您的问题,请直接 联系老师 获取答案。
相似问题和答案

第1题:

After factory-defaults have been loaded, which two syslog files will be present in the configuration?()

  • A、system and chassisd
  • B、syslog-messages and NVRAM
  • C、messages and interactive-commands
  • D、authorization and events

正确答案:C

第2题:

A corrupted file system is now repaired and back in use. Some, but not all of the files within the file  systems have been deleted. The only backup of this file system is a month-old tar archive. This archive will need to be restored as root.  Which two statements correctly describe the effects of the restore operation?()

  • A、 Files found in the file system that are also on tape will NOT be overwritten.
  • B、 The missing files, present on the backup tape, are restored to the file system with the data as it was when the backup was taken.
  • C、 The access times are preserved by tar and will reflect the time when a user last accessed the data.
  • D、 The modification time on the files restored by tar will be preserved and will reflect the time the file was last modified before the backup, NOT the time of the restore operation.

正确答案:B,D

第3题:

You executed this command to create a password file:$ orapwd file = orapworcl entries = 10 ignorecase = NWhich two statements are true about the password file?()

A. It will permit the use of uppercase passwords for database users who have been granted the SYSOPER role.

B. It contains username and passwords of database users who are members of the OSOPER operating system group.

C. It contains usernames and passwords of database users who are members of the OSDBA operating system group.

D. It will permit the use of lowercase passwords for database users who have granted the SYSDBA role.

E. It will not permit the use of mixed case passwords for the database users who have been granted the SYSDBA role.


参考答案:A, D

第4题:

You work as a database administrator for Supportcenter.cn. You are using Recovery Manager (RMAN) for backup and recovery of your database. You executed the delete command in RMAN to delete a backup of a tablespace. Which statement is true in this scenario?()

  • A、The backup status will be marked expired in RMAN recovery catalog.
  • B、The backup status will be marked deleted in RMAN recovery catalog after you execute the crosscheck command.
  • C、The backup will be deleted physically from the OS (Operating system)and the backup information is removed from the recovery catalogl
  • D、The backup status will be marked deleted and you must delete the backup file manually from the OS (Operating system).
  • E、The backup status will be marked deleted and you must delete the backup file manually from the OS (Operating system), if you are not using Oracle Managed Files (OMF).

正确答案:C

第5题:

You have enabled backup optimization for the RMAN environment.Identify two criteria on which RMAN will skip the file, if it has already been backed up.()

  • A、The data file backup is done with multiple channels
  • B、The data files is in the read-write mode after being backed up in the read only mode
  • C、The backup was taken after the data files was taken offline-normal or is in the read only mode
  • D、The data file backup complies with the back retention policy and the backup duplexing feature

正确答案:C,D

第6题:

Which two statements correctly describe the relation between a data file and the logical databasestructures()

  • A、An extent cannot spread across data files.
  • B、A segment cannot spread across data files.
  • C、A data file can belong to only one tablespace.
  • D、A data file can have only one segment created in it.
  • E、A data block can spread across multiple data files as it can consist of multiple operating system (OS) blocks.

正确答案:A,C

第7题:

You have enabled backup optimization for the RMAN environment. Identify two criteria on which RMAN will skip the file, if it has already been backed up.() (Choose two.)

  • A、The data file backup is done with multiple channels
  • B、The data files is in the read-write mode after being backed up in the read only mode
  • C、The backup was taken after the data files was taken offline-normal or is in the read only mode
  • D、The data file backup complies with the back retention policy and the backup duplexing feature

正确答案:C,D

第8题:

After factory-defaults have been loaded, which two syslog files will be present in the configuration?()

A.system and chassisd

B.syslog-messages and NVRAM

C.messages and interactive-commands

D.authorization and events


参考答案:C

第9题:

The backup retention policy is configured as RECOVERY WINDOW 2. You executed the following command in Recovery Manager (RMAN) against your database: RMAN> REPORT OBSOLETE; What would you see in the output?()

  • A、 a list of all those files that have been deleted in the last two days
  • B、 a list of all those files that have been recovered within the last two days
  • C、 a list of all the expired backups and copies
  • D、 a list of backups and copies that are outside the range covered by the current retention policy

正确答案:D

第10题:

The loss of which two types of files may require a recovery with the RESETLOGS option?()

  • A、 control files
  • B、 password file
  • C、 archived log files
  • D、 system-critical data files for which all the redo entries are present
  • E、 non-system-critical data files for which all the redo entries are present

正确答案:A,C

更多相关问题