-
You are designing the loan application process for the customer terminals. You need to design a Transact-SQL stored procedure that fulfills the business and technical requirements. Which type of Transact-SQL stored procedure should you use?()
A . one that uses an internal SQL Server Web service endpoint
B . one that runs a SQL Server Integration Services (SSIS) package
C . one that uses Service Broker
D . one that runs a user-defined functio
-
What three tasks are required to add a CRS application?()
A . create a trigger
B . create an application
C . restart the CRS engine
D . upload script to repository
E . configure default session timeout&e
-
You are creating a Windows Forms Application by using the .NET Framework 3.5.Your applciation will be used by a government depertment.You need to ensure that the application meets "accessibilty" requirements.Which three actions should you perform?()
A . Expose keyboard focus visually and programmatically.
B . Use the NeutralResourceLanguageAttribute attribute in the assembly.
C . Provide documented keyboard access to all application features.
D . Set all the colors to primary colors when the high contrast mode is on.
E . Display all user interface elements by using the system color scheme when high contrast mode is off.
F . Either display all visual cues or create sound effects for any information.
-
You are developing a Hotel Booking application for a travel company. The users request a wizard-style interface for this application. How could you satisfy this requirement?()
A . Reference the Object Iron packages in your form module.
B . Write an HTML interface, and invoke it from your form module.
C . Include the Wizard class reusable component in your application.
D . Build a customized wizard using tab canvases and a horizontal toolbar canvas.
-
You are designing a strategy to meet the security and financial requirements related to the Manifest application. What should you do? ()
A . Configure a VPN server in Sydney.
B . Configure a VPN server in each branch office.
C . Configure a dial-up server in Sydney
D . Configure a dial-up server in each branch office.
-
An application accesses a small lookup table frequently. You notice that the required data blocks are getting aged out of the default buffer cache. How would you guarantee that the blocks for the table never age out?()
A . Configure the KEEP buffer pool and alter the table with the corresponding storage clause.
B . Increase the database buffer cache size.
C . Configure the RECYCLE buffer pool and alter the table with the corresponding storage clause.
D . Configure Automata Shared Memory Management.
E . Configure Automatic Memory Management
-
A brand new network application is required for the Acme Company, and they are considering the use of a connectionless service. What are the characteristics of a connectionless service?()
A . It uses a Reliable transport mechanism.
B . It uses a Non-reliable transport mechanism
C . It is less bandwidth-intensive than connection oriented services
D . it uses handshaking
-
Your web application requires the ability to load and remove web files dynamically to the web container’s filesystem. Which two HTTP methods are used to perform these actions?()
A . PUT
B . POST
C . SEND
D . DELETE
E . REMOVE
-
You are designing a Windows Azure web application that does not use ASP.NET. The application requires a standalone Win32 interpreter. You need to recommend an approach for allowing access to the interpreter. What should you recommend?()
A . Use a web role. Configure the interpreter as an ISAPI filter.
B . Use a web role. Configure a FastCGI handler for the interpreter and set the path to the interpreter.
C . Use a worker role with an internal endpoint. Enable native code execution.
D . Use a worker role with an external endpoint. Configure a FastCGI handler for the interpreter and set the path to the root.
-
You are designing a Hyper-V solution. You plan to virtualize an application server. The application server requires failover clustering that uses shared storage. You need to choose the correct storage solution. What should you choose?()
A . two child partitions with VHDs stored on an iSCSI SAN
B . two child partitions with volumes mounted from an iSCSI SAN
C . two host servers with iSCSI-attached storage enabled for Cluster Shared Volumes (CSVs)
D . two host servers with Fibre ChannelCattached storage enabled for Cluster Shared Volumes (CSVs)
-
Companycom has a requirement to consolidate six web application servers. There is unused capacity of 2 CPUs on their new p5 570. Which operating systems and or features are required?()
A . APV, AIX5.2ML4
B . AIX5.3 or i5/OS
C . APV, i5/OS, AIX5.3
D . APV, AIX5.3 or SuSE9
-
Application for a waiver of any requirements of the regulations for oil transfer operations must be submitted to the().
A . District Commander
B . Commandant
C . Captain of the Port
D . nearest Coast Guard office
-
You are planning an upgrade strategy for a Windows Azure application. You need to identify changes that will require application downtime. Which change will always require downtime?()
A . Changing the virtual machine size
B . Adding an HTTPS endpoint to a web role
C . Changing the value of a configuration setting
D . Upgrading the hosted service by deploying a new package
-
You plan to deploy an application by using Microsoft Application Virtualization (App-V) in standalone mode. You need to recommend which App-V components are required for the planned deployment. Which components should you recommend?()
A . the App-V Client
B . the App-V Management Server
C . the App-V Sequencer
D . the App-V Management Console
E . the App-V Streaming Server
-
You are designing a Hyper-V solution. You plan to virtualize an application server. The application server requires failover clustering that uses shared storage. You need to choose the correct storage solution. What should you choose?()
A . Two child partitions with volumes mounted from an iSCSI SAN
B . Two host servers with Fibre Channel-attached storage enabled for Cluster Shared Volumes (CSVs)
C . Two host servers with iSCSI-attached storage enabled for Cluster Shared Volumes (CSVs)
D . Two child partitions with VHDs stored on an iSCSI SAN
-
You work as an application developer at Certkiller .com. You are required to retrieve and display the names of all processes that are currently running in memory. What should you do?()https://assets.asklib.com/images/image2/2018072616393769295.jpg
A . A
B . B
C . C
D . D
-
Which two elements of the Java Enterprise Application Archive are required?()
A . EJB Archive
B . Deployment Descriptor
C . META-INF sub directory
D . Resource Adapter archive
E . Java library
-
Which activity supports the data integrity requirements of an application?()
A . Using HTTPS as a protocol
B . Using an LDAP security realm
C . Using HTTP Basic authentication
D . Using forms-based authenticatio
-
Some job applicants are required to give honesty tests to determine how trustworthy they are. This is an example of a(n) _____ test.
-
Your network consists of one Active Directory forest that contains two domains namedDomain1.contoso.com and Domain2.contoso.com. The functional level of the forest is Windows Server 2003.The domains contain the global security groups shown in the following table.Each domain has three servers. Each server has a group named Sales-Applications-Local. TheSales-Applications-Local groups are used to grant permissions to resources on the servers.You need to implement a solution to meet the following requirements:Allow Sales department employees from any domain to access the Sales department resources in any domain.Minimize administrative effort when membership of the Sales department changes, additional domains are added,or additional servers are added.What should you do? ()
<img src='https://img2.soutiyun.com/shangxueba/ask/17130001-17133000/17130429/bf8057609f4797423559244897ea263f.jpg' />
A. ·On each of the servers, add Domain1-Sales-Global and Domain2-Sales-Global to Sales-Applications-Local. ·In Domain1, create a universal security group named Sales-Department-Universal. ·Add Domain1-Sales-Global and Domain2-Sales-Global to Sales-Department-Universal.
B. ·On each of the servers, add Sales-Department-Universal group to Sales-Applications-Local. ·In each domain, create a domain local security group named Sales-Applications-Domain-Local. ·In each domain, add Domain1-Sales-Global and Domain2-Sales-Global to Sales-Applications-Domain-Local.
C. ·On each of the servers, assign permissions to Sales-Applications-Domain-Local from the local domain. ·Create two universal security groups named Domain1\Sales-Department-Universal andDomain2\Sales-Department-Universal. ·Add Domain1\Domain1-Sales-Global to Domain1\Sales-Department-Universal. ·Add Domain2\Domain2-Sales-Global to Domain2\Sales-Department-Universal.
D. ·On each of the servers, add Domain1\Sales-Department-Universal and Domain2\Sales-Department-Universal to Sales-Applications-Local.
-
The applicants are required to have CET-6 certificate.
-
According to the job advertisement, all applicants are required to______their education, work experience and their areas of certification on their resume.
A.rectify
B.specify
C.glorify
D.testify
-
The analysts make a requirement list of a application in a difficult way.()
是
否
-
You are the network administrator for The network consists of a single Active Directory domain named All servers run Windows Server 2003.The network contains a Web server that runs IIS 6.0 and hosts a secure intranet site. All users are required to connect to the intranet site by authenticating and using HTTPS. However, because an automated Web application must connect to the Web site by using HTTP, you cannot configure the intranet site to require HTTPS.You need to collect information about which users are connecting to the Web site by using HTTPS.What should you do?()
A. Check the application log on the Web server.
B. Use Network Monitor to capture network traffic on the Web server.
C. Review the log files created by IIS on the Web server.
D. Configure a performance log to capture all Web service counters. Review the performance log data.