-
You are the network administrator at TestKing. You need to perform password recovery on Router TK1. What must you modify in the password recovery process?()
A . Configuration register
B . NVRAM
C . Boot flash
D . CMOS
E . Flash
-
You want users to log on to Active Directory by using a new Principal Name (UPN). You need to modify the UPN suffix for all user accounts. Which tool should you use()
A . Dsmod
B . Netdom
C . Redirusr
D . Active Directory Domains and Trust
-
You have a customized image of Windows 7 Professional. You mount the image and modify the contents ofthe image. You need to restore the image to its original state. Which tool should you use?()
A . Dism.exe.
B . Ocsetup.exe.
C . Pkgmgr.exe.
D . Sysprep.exe.
-
You are implementing an ASP. NET MVC 2 Web application. You add a controller named Company Controller. You need to modify the application to handle the URL path /company/info. Which two actions should you perform?()
A . Add the following method to the CompanyController class. Function Info() As ActionResult Return View() End Function
B . Add the following method to the CompanyController class. Function Company_Info() As ActionResult Return View() End Function
C . Right-click the Views folder, and select View from the Add submenu to create the view for the action.
D . Right-click inside the action method in the CompanyController class, and select Add View to create a view for the actio
-
You need to modify the STUDENTS table to add a primary key on the STUDENT_ID column. The table is currently empty.Which statement accomplishes this task?()
A . ALTER TABLE students ADD PRIMARY KEY student_id;
B . ALTER TABLE students ADD CONSTRAINT PRIMARY KEY (student _ id);
C . ALTER TABLE students ADD CONSTRAINT stud _ id _pk PRIMARY KEY (student _ id);
D . ALTER TABLE students MODIFY CONSTRAINT stud _ id _pk PRIMARY KEY (student _ id)
-
Your network contains an Active Directory forest. The forest schema contains a custom attribute for user objects. You need to modify the custom attribute value of 500 user accounts. Which tool should you use()
A . Csvde
B . Dsmod
C . Dsrm
D . Ldifde
-
You need to give the MANAGER role the ability to select from, insert into, and modify existing rows in the STUDENT_GRADES table. Anyone given this MANAGER role should be able to pass those privileges on to others. Which statement accomplishes this? ()
A . GRANT select, insert, update ON student_grades TO manager
B . GRANT select, insert, update ON student_grades TO ROLE manager
C . GRANT select, insert, modify ON student_grades TO manager WITH GRANT OPTION;
D . GRANT select, insert, update ON student_grades TO manager WITH GRANT OPTION;
E . GRANT select, insert, update ON student_grades TO ROLE manager WITH GRANT OPTION;
F . GRANT select, insert, modify ON student_grades TO ROLE manager WITH GRANT OPTION
-
Your application uses two threads, named threadOne and threadTwo. You need to modify the code to prevent the execution of threadOne until threadTwo completes execution. What should you do?()
A . Configure threadOne to run at a lower priority.
B . Configure threadTwo to run at a higher priority.
C . Use a WaitCallback delegate to synchronize the threads.
D . Call the Sleep method of threadOne.
E . Call the SpinLock method of threadOne.
-
You need to design a method to modify the current e-mail ordering system. Which will be used until Fourth Coffee deploys the Web-based ordering application. Your solution must address business concerns and improve security. What should you do?()
A . Configure the mail server to disallow SMTP relaying
B . Instruct customers to obtain digital certificates from a trusted commercial authority (CA), and digitally sign all order e-mail messages. Reject unsigned order e-mail messages
C . Provide customers with a public encryption key, and instruct them to encrypt all order e-mail messages. Reject unencrypted e-mail messages
D . Implement an e-mail filtering solution, and add customer e-mail addresses to the list of allowed addresses. Reject e-mail messages from other addresse
-
You install a local printer on a computer. You share the printer. You need to ensure that only members of alocal group named Group1 can print documents on the printer. Which settings should you modify on theprinter?()
A . Printing preferences
B . Priority
C . Security
D . Share
-
You are the DBA for an academic database. You need to create a role that allows a group of users to modify existing rows in the STUDENT_GRADES table. Which set of statements accomplishes this? ()
A . CREATE ROLL registrar; GRANT MODIFY ON student_grant TO registrar; GRANT registrar to user 1, user2, user3
B . CREATE NEW ROLE registrar; GRANT ALL ON student_grant TO registrar; GRANT registrar to user 1, user2, user3
C . CREATE ROLL registrar; GRANT UPDATE ON student_grant TO registrar; GRANT ROLE to user1, user2, user3
D . CREATE ROLL registrar; GRANT UPDATE ON student_grant TO registrar; GRANT registrar to user 1, user2, user3;
E . CREATE registrar; GRANT CHANGE ON student_grant TO registrar; GRANT registrar
-
You are designing a Windows 7 deployment image. You plan to partition the hard disk of each client computer during deployment. You need to modify the unattended answer file by using a text editor. Where should you add the disk information?()
A . to the Specialize configuration pass
B . to the Generalize configuration pass
C . to the WindowsPE configuration pass
D . to the AuditSystem configuration pa
-
You have an Exchange Server 2010 organization.You need to modify the permissions of a public folder.Which tool should you use?()
A . Exchange Control Panel (ECP)
B . Exchange Management Console (EMC)
C . Microsoft Office Outlook
D . Public Folder Management Console
-
You have a computer that runs Windows 7. You need to provide standard users the ability to update thedrivers for display adapters. What should you modify from the Local Group Policy?()
A . device installation settings for the computer.
B . display settings for the user.
C . driver installation settings for the computer.
D . driver installation settings for the user.
-
You modify an existing Microsoft ASP.NET application by using the Microsoft .NET Framework version 3.5. You add a theme to the ASP.NET application. You need to apply the theme to override any settings of individual controls. What should you do?()
A . In the Web.config file of the application,set the Theme attribute of the pages element to the name of the theme.
B . In the Web.config file of the application,set the StyleSheetThemeattribute of the pages element to the name of the theme.
C . Add a master page to the application. In the @Master directive,set the Theme attribute to the name of the theme.
D . Add a master page to the application. In the @Master directive,set the StyleSheetTheme attribute to the name of the theme.
-
You have an Exchange Server 2010 organization.Your network contains internal DNS servers.You need to ensure that the Hub Transport servers use external DNS servers when they resolve Internet names. What should you modify?()
A . the message delivery properties of the Hub Transport global settings
B . the properties of the default remote domain
C . the properties of the Hub Transport server object
D . the properties of a Send connector
-
Your company has a single Active Directory directory service forest with three domains. You plan to modify the Active Directory schema. You need to identify the schema master for the forest. What should you do?()
A . Run the regsvr32 schmmgmt.dll command. Use the Active Directory Domains and Trusts snap-in.
B . Run the regsvr32 schmmgmt.dll command. Use the Active Directory Users and Computers snap-in.
C . Use the Dsget command-line tool.
D . Use the Dsquery command-line tool.
-
Your network contains an Active Directory forest. The forest schema contains a custom attribute for user objects. You need to modify the custom attribute value of 500 user accounts. Which tool should you use()
A . Csvde
B . Dsmod
C . Dsrm
D . Ldifde
-
You want users to log on to Active Directory by using a new User Principal Name (UPN). You need to modify the UPN suffix for all user accounts. Which tool should you use()
A . Dsmod
B . Netdom
C . Redirusr
D . Active Directory Domains and Trust
-
You want users to log on to Active Directory by using a new User Principal Name (UPN). You need to modify the UPN suffix for all user accounts. Which tool should you use()
A . Dsmod
B . Netdom
C . Redirusr
D . Active Directory Domains and Trust
-
Your application uses two threads, named threadOne and threadTwo.You need to modify the code to prevent the execution of threadOne until threadTwo completes execution. What should you do?()
A . Configure threadOne to run at a lower priority.
B . Configure threadTwo to run at a higher priority.
C . Use a WaitCallback delegate to synchronize the threads.
D . Call the Sleep method of threadOne.
E . Call the SpinLock method of threadOne.
-
You have an Exchange Server 2003 organization. You install a new Exchange Server 2010 server in the organization. You need to ensure that you can modify the default e-mail address policy by using the Exchange Management Console (EMC) What should you do?()
A . Run the Set-EmailAddressPolicy cmdlet.
B . Run the Update-EmailAddressPolicy cmdlet.
C . From the Exchange System Manager, modify the properties of the default recipient policy.
D . From the EMc, select the E-mail Address Policies tab, right-click Default Policy, and then click apply.
-
You need to modify the STUDENTS table to add a primary key on the STUDENT_ID column. The table is currently empty. Which statement accomplishes this task?()
A . ALTER TABLE students ADD PRIMARY KEY _ id;
B . ALTER TABLE students ADD CONSTRAINT PRIMARY KEY (student_id);
C . ALTER TABLE students ADD CONSTRAINT stud_id_pk PRIMARY KEY student_id;
D . ALTER TABLE students ADD CONSTRAINT stud_id_pk PRIMARY KEY (student_id);
E . ALTER TABLE students MODIFY CONSTRAINT stud_id_pk PRIMARY KEY (student_id)