多项选择题
Identity two advantages of using a recovery catalog in-load of the control File of the target database Recovery Manager (RMAN).()
A. You can use RMAN stored scripts.
B. Recovery is faster if data is stored in catalog in addition to the control file.
C. You can store backup Information of all registered databases in one place.
D. Database backups are automatically deleted when they are older than the specified time period.
相关考题
-
单项选择题
A database is running In ARCHIVBXXMS mode. It has two online redo log groups and each group has one member. A LGWR Input/output (I/O) fells due to permanent media failure that has resulted In the loss of redo log file and the LWGR terminates causing the instance to crash. The steps to recover from the loss of a current redo log group member in the random order are as follow. 1) Restore the corrupted redo log group. 2) Restore from a whole database backup. 3) Perform incomplete recovery. 4) Relocate by renaming the member of the damaged online redo log group to a new location. 5) Open the database with the RESETLOGS option. 6) Restart the database instance. 7) Issue a checkpoint and clear the log. Identify the option with the correct sequential steps to accomplish the task efficiently().
A. 1,3,4,and 5
B. 7,3,4. and 5
C. 2,3,4,and 5
D. 7,4,3,and 5
E. Only 6 is required -
单项选择题
Note the output of the following query; SQL> SELECT flashback_archieve_name, status FROM dba_flashback_archieve; FLASHBACK_ARCHIEVE_NAME STATUS FLA1 You executed the following command to enable Flashback Data Archive on the EXCHANGB_PATE table: ALTER TABLE exchange_rate FLASHBACK ARCHIEVE; What is the outcome of this command?()
A. The table uses the default Flashback Data Archive.
B. The Flashback Data Archive Is created In the SYSAUX tablespace.
C. The Flashback Data Archive is created in the same tablespace where the tables are stored.
D. The command generates an error because no flashback Data Archive name is specified and there is no default Flashback Data Achieve. -
单项选择题
Whichofthefollowingmethodscanbeusedtodetectblockcorruption?()
A. ANALYZE operations
B. dbv
C. SQL queries that access the potentially corrupt block
D. RMAN
E. All of the above
