-
You work as a database administrator for Certkiller .com. You enabled tracing while creating a listener to your database. What additional information is available to you when you enable tracing?()
A . Information about each Oracle Net connection.
B . Information about each entry in theLinstener.orafile
C . Information about the changed done in the database
D . Information about the different listeners in your system
E . Information about all thenondatabasefiles required to operate the database
-
You are developing a Windows Communication Foundation (WCF) service. You need to enable security auditing for all events. What should you do?()
A . Set the serviceAuthorizationAuditLevel setting to Success and the messageAuthenticationAuditLevel setting to Success.
B . Set the messageAuthenticationAuditLevel setting to Success and the auditLogLocation setting to Application.
C . Set the serviceAuthorizationAuditLevel setting to SuccessAndFailure and the messageAuthenticationAuditLevel setting to SuccessAndFailure.
D . Set the messageAuthenticationAuditLevel setting to SuccessAndFailure and the auditLogLocation setting to Security.
-
When checking a mooring line,you should().
A . ensure the bight is not fouled between the ship and the dock by taking up slack
B . pay out slack smartly and keep free for running
C . secure more turns to hold the line against any strain,then clear the area
D . surge the line so that it maintains a strain without parting
-
You need to enable hibernation support for a computer that runs Windows XP Professional. What should you do?()
A . From Control Panel, configure the Power Options.
B . From the System properties, configure the Data Execution Prevention settings.
C . From the Services console, set the Startup type for the Human Interface Devices service to Automatic.
D . From the Services console, set the Startup type for the Uninterruptable Power Supply service to Automatic.&e
-
When securing an AC generator, you should FIRST ().
A . open the generator circuit breaker
B . switch the voltage regulator to “manual”
C . decrease the field excitation to minimum
D . reduce the load on the unit
-
You need to configure ISA3 in Seattle to enable communication with the network in New York.What should you do?()
A . Open the ports for DNS, HTTP, HTTPS, Kerberos, RADIUS, LDAP, RPC endpoint mapper and client, and Server Message Block (SMB) over IP
B . Enable the Routing and Remote Access Basic Firewall. Open the ports for DNS, Kerberos, LDAP, Exchange RPCs, RADIUS, L2TP, and Internet Key Exchange (IKE)
C . Create a PPTP tunnel from ISA3 to the New York network
D . Create an L2TP/IPSec tunnel from ISA3 to the New York network
-
You are designing a strategy to enable the ATC application to successfully resolve computer names. Which name resolution method should you use?()
A . DNS
B . WINS
C . Hosts file
D . Lmhosts file
-
When you enable port security on an interface that is also configured with a voice VLAN, what is the maximum number of secure MAC addresses that should be set on the port?()
A . No more than one secure MAC address should be set.
B . The default will be set.
C . The IP phone should use a dedicated port, therefore only one MAC address is needed per port.
D . No value is needed if the switchport priority extend command is configured.
E . No more than two secure MAC addresses should be set.
-
You need to design a method to enable remote encryption on Server5. What should you do?()
A . Configure the editor’s user account properties to enable Store password using reversible encryption
B . Configure the editor’s user account properties to enable Use DES encryption for this account
C . Configure the Local Security Policy on Server to enable the System cryptography: Use FIPS compliant algorithms for encryption, hashing, and signing security policy
D . Configure the Server5 computer account properties to enable Trust computer for delegatio
-
Which feature is enabled when you start a WebLogic server with the ¨CDserverType=wlx option?()
A . JDBC
B . JCA
C . JMS
D . EJB
E . Java EE
-
You are designing a strategy to enable the ATC application to successfully resolve computer names. Which name resolution method should you use?()
A . DNS
B . WINS
C . Hosts file
D . Lmhosts file
-
When should you create a role? ()
A . To simplify the process of creating new users using the CREATE USER xxx IDENTIFIED by yyy statement.
B . To grant a group of related privileges to a user.
C . When the number of people using the database is very high.
D . To simplify the process of granting and revoking privileges.
E . To simplify profile maintenance for a user who is constantly traveling.
-
You modify an existing Microsoft ASP.NET application by using the Microsoft .NET Framework version 3.5. You add a theme to the ASP.NET application. You need to apply the theme to override any settings of individual controls. What should you do?()
A . In the Web.config file of the application,set the Theme attribute of the pages element to the name of the theme.
B . In the Web.config file of the application,set the StyleSheetThemeattribute of the pages element to the name of the theme.
C . Add a master page to the application. In the @Master directive,set the Theme attribute to the name of the theme.
D . Add a master page to the application. In the @Master directive,set the StyleSheetTheme attribute to the name of the theme.
-
When should you use distress flares and rockets?()
A . Only when there is a chance of their being seen by rescue vessels
B . At half-hour intervals
C . At one-hour intervals
D . Immediately upon abandoning the vessel
-
You work as a database administrator for Supportcenter.cn. You enabled tracing while creating a listener to your database. What additional information is available to you when you enable tracing?()
A . Information about each Oracle Net connection.
B . Information about each entry in theLinstener.orafile
C . Information about the changed done in the database
D . Information about the different listeners in your system
E . Information about all thenondatabasefiles required to operate the database
-
When accepting engine room spares, you should()
A . send a requisition list to the supplier
B . check that whether the items ordered have been already delivered
C . make the chief engineer on sport
D . follow a preset procedure
-
You need to ensure that when you insert a blank DVD into the DVD drive, Windows Explorer opensautomatically and enables you to select files to burn to DVD. What should you do?()
A . From Default Programs, modify the AutoPlay settings.
B . From Default Programs, modify the default program settings.
C . From Device Manager, modify the properties of the DVD drive.
D . From System Configuration Utility, modify the Startup settings.
-
What action should you execute if you wanted to enable VTP pruning on your entire management domain?()
A . Enable VTP pruning on any client switch in the management domain.
B . Enable VTP pruning on any switch in the management domain.
C . Enable VTP pruning on every switch in the management domain.
D . Enable VTP pruning on a VTP server in the management domain.
E . Disable VTP pruning on a VTP server in the management domain.
-
When you write a letter of congratulations, you should( )?
A、choose the right form and tone for your letter
B、stay focused on the theme of congratulation
C、be personal and genuine
D、Avoid bragging and boasting
-
You should accept a project when the:
-
When a customer is complaining to you ,you should_____.
A. listen carefully and make notes
B. make personal comments
-
You are creating an ASP.NET web application that hosts several Windows Communication Foundation (WCF) services.The services have ASP.NET Compatibility Mode enabled. Users authenticate with the Web application by using a cookie-based ASP.NET Forms Authentication model.You add a service file named Authentication.svc that contains the following code segment:<%@ ServiceHost Service="System.Web.ApplicationServices.AuthenticationService"Factory="System.Web.ApplicationServices.ApplicationServicesHostFactory" %>You need to ensure that users can access the WCF services without having to re-authenticate.Which two configuration settings should you add? (Each is part of a complete solution. Choose two.)()
A. In the system web. Extensions scripting/webServices/authenticationService element, set the enabled attribute to true.
B. In the system web. Extensions scripting/webServices/profileService element, set the enabled attribute to true.
C. Add a service endpoint with basicHttpBinding for the contract System.Web.ApplicationServices.AuthenticationService.
D. Add a custom service behavior named AuthenticationService Type Behaviors with a service AuthenticationManager element that has service AuthenticationManagerType set to System.Web.Security.SQL Membership Provider
-
You use Microsoft Visual Studio 2010 and Microsoft .NET Framework 4 to create a Windows Presentation Foundation (WPF) application.You plan to use a PresentationTraceSources object when the application is executed by users.When the application is executed in a test environment, all debug information is successfully captured.You need to be able to capture debug information when the application is deployed.What should you do?()
A.Enable WPF tracing in the registry.Restart the application.
B.Enable tracing by modifying local Group Policy.Restart the application.
C.Open the XML configuration file for your application on the user‘s computer.Set tracing to a verbose level.Restart the application.
D.Open the XML configuration file for your application on the user‘s computer.Add a trace listener.Restart the application.
-
You use Microsoft .NET Framework 4 to create a Windows Forms application.You plan to use a Windows Presentation Foundation (WPF) control of the UserControl1 type hosted in anElementHost control named elementHost1.You write the following code segment. (Line numbers are included for reference only.)You need to ensure that the application changes the background color of the hosted control when the background color of the form changes.Which code segment should you insert at line 05?()
<img src='https://img2.soutiyun.com/shangxueba/ask/17130001-17133000/17130030/2d777510fe2f3c75e68a192da66f7ac0.jpg' />
A.elementHost1.PropertyMap.Remove("BackColor");elementHost1.PropertyMap.Add("BackColor", new PropertyTranslator(OnBackColorChange));
B.elementHost1.PropertyMap.Remove("Background"); elementHost1.PropertyMap.Add("Background", new PropertyTranslator(OnBackColorChange));
C.elementHost1.PropertyMap.Add("BackColor", new PropertyTranslator(OnBackColorChange)); elementHost1.PropertyMap.Apply("BackColor");
D.elementHost1.PropertyMap.Add("Background", new PropertyTranslator(OnBackColorChange)); elementHost1.PropertyMap.Apply("Background");