-
You are an Enterprise Architect in a large IT organization. Your organization has deployed applications on a variety of containers such as WLS, WebSphere, and JBoss. Why would you consider consolidating on a single type of container (instead of mix) ? ()
A . Guarantee of higher application performance and reliability if the transactions are flowing between instances of the same container type.
B . Easier to build a Shared Services infrastructure that can provide best practices, tools and expertise around HA/Management.... with a single type of container than a mix of multiple types
C . You’ll save on hardware costs with a homogenous environment
D . It’s a necessary step in our move toward adopting SOA
-
You work as a database administrator for Certkiller .com. According to your backup strategy, you performed an incremental level 0 backup of your database. Which statement regarding this backup is true?()
A . The backup is similar to image copy.
B . The backup contains all used data blocks.
C . The backup contains only unused data blocks.
D . The backup contains all data blocks changed since the last incremental level 1 backup.
-
You are working as an administrator at TestKing, and you need to set the bandwidth of your routers serial port to 56K. Which of the following commands would you use?()
A . Bandwidth 56000
B . Bandwidth 56000000
C . Bandwidth 56
D . Bandwidth 56k
-
You work as a network technician. Your boss is interested in the QoS technology in the context ofvideo traffic. What can be said of application of this technology in this type of network?()
A . The access layer is the initial point at which traffic enters the network. Traffic is marked (orremarked) at Layers 2 and 3 by the access switch as it enters the network, or is "trusted" that it isentering the network with the appropriate tag
B . No traffic marking occurs at the core layer. Layer 2/3 QoS tags are trusted from distributionlayer switches and used to prioritize and queue the traffic as it traverses the core
C . Traffic inbound from the access layer to the distribution layer can be trusted or reset dependingupon the ability of the access layer switches. Priority access into the core is provided based onLayer 3 QoS tags
D . IP precedence, DSCP, QoS group, IP address, and ingress interface are Layer 2 characteristics that are set by the access layer as it passes traffic to the distribution layer. Thedistribution layer, once it has made a switching decision to the core layer, strips these off
E . MAC address, Multiprotocol Label Switching (MPLS); the ATM cell loss priority (CLP) bit, theFrame Relay discard eligible (DE) bit, and ingress interface are established by the voicesubmodule (distribution layer) as traffic passes to the core layer
F . The distribution layer inspects a frame to see if it has exceeded a predefined rate of trafficwithin a certain time frame, which is typically a fixed number internal to the switch. If a frame isdetermined to be in excess of the predefined rate limit, the CoS value can be marked up in a waythat results in the packet being dropped
-
You work as a network technician at Certkiller .com. Please study the exhibit carefully. The exhibit is an example of which technology being implemented?()https://assets.asklib.com/images/image2/2018073114112240664.jpg
A . Spanning-tree
B . 802.1Q
C . VLANs
D . PAT
E . QoS
-
A Windows Azure .NET 4 application is experiencing a runtime issue. One of the roles cycles through initializing, working, and stopping. You need to recommend an approach for identifying the problem. What should you recommend?()
A . Attach the remote debugger to the application.
B . Enable IntelliTrace and redeploy the application.
C . View the logs in the Windows Azure Diagnostic tables.
D . Use the Event Viewer to remotely connect to the role.
-
You are designing a plan to migrate an application to Windows Azure. The application generates log files in a proprietary format. You need to recommend an approach for retaining the existing log file format. What should you recommend?()
A . Configure Windows Azure Diagnostics to transfer event logs.
B . Configure Windows Azure Diagnostics to transfer directories.
C . Configure Windows AzureDiagnostics to transfer performance counters.
D . Configure Windows Azure Diagnostics to transfer basic Windows Azure logs.
-
You work as a network administrator in your company. Communication inside the company is ensured by network environments, such as GET VPN, Dynamic Multipoint VPN and Ethernet. Which PIN architecture is applicable in those environments?()
A . Campus
B . Teleworker
C . Branch
D . Data center
-
A Windows Azure application retrieves data from SQL Azure. You need to recommend an approach for improving application query performance. What should you recommend?()
A . Create a database view to retrieve the data.
B . Use a clustered index on the SQL Azure database tables.
C . Open a new database connection when an operation times out.
D . Create SQL Azure database table indexes basedon application querie
-
You work as a technician at TestKing. You are configuring a Cisco router. You want to configure the IP address on an interface.Which command should you use?()
A . router(config-if)#ip address 142.8.2.1 subnet mask 255.255.252.0
B . router(config-if)#142.8.2.1 0.0.3.255
C . router(config-if)#ip address 142.8.2.1 255.255.252.0
D . router(config-if)#142.8.2.1 subnet mask 255.255.252.0
E . router(config-if)#ip address 142.8.2.1 0.0.3.255
F . router(config-if)#ip address 142.8.2.1 subnet mask /22
-
You need to implement an authentication method on SQL4. The TravelOnline database will be accessed through a Web services application. You need to make the authentication method as secure as possible.What should you do?()
A . Create an HTTP endpoint with NTLM authentication, and create a service principal name (SPN).
B . Create an HTTP endpoint with digest authentication, and create a service principal name (SPN).
C . Create an HTTP endpoint with integrated authentication, and create a service principal name (SPN).
D . Create an HTTP endpoint with Kerberos authentication.
-
Your company uses Microsoft Application Virtualization (App-V). You maintain the sequencing for applications. You need to add a template to an existing sequenced application. What should you do?()
A . Edit the application, add the template, and then save the application with a new name.
B . Sequence the template as a new application to the original application installation folder.
C . Restore the sequencing computer and add the template to the original application installation folder.
D . Upgrade the existing sequencing package, add the template to the package, and then save the application.
-
You created a custom menu for the Order Entry application. The shipping administrator has requested an additional submenu containing four items to invoke various reports. Which command type must you use to identify the parent menu item as a submenu? ()
A . Menu
B . Plus
C . Macro
D . PL/SQL
-
You work as a network engineer, do you know an IPsec tunnel is negotiated within the protection of whichtype of tunnel?()
A . L2F tunnel
B . L2TP tunnel
C . GRE tunnel
D . ISAKMP tunnel
-
You are developing an ASP.NET application by using Visual Studio 2010. You need to interactively debug the entire application. Which two actions should you perform? ()
A . Set the Debug attribute of the compilation node of the web.config file to true.
B . Add a DebuggerDisplay attribute to the code-behind file of the page that you want to debug.
C . Select the ASP.NET debugger option in the project properties.
D . Define the DEBUG constant in the project settings.
-
You work as a database administrator for Certkiller .com. You received the following error while working on your database: ORA-01555: snapshot too old In which situation would you receive such an error?()
A . You performed rollback after commit.
B . If a log switch occurs in your database.
C . Thearchiverfails to generate an archived log file.
D . Instance recovery fails to find one of the redo log files.
E . A long-running query is unable to get read-consistent image.
F . If you perform manual undo management operations in auto mode.
-
Your company has an Active Directory Domain Services (AD DS) domain. You virtualize applications by using Microsoft Application Virtualization (App-V). You are creating an application virtualization package. Which should you use?()
A . Microsoft Application Virtualization Sequencer
B . Microsoft Application Virtualization Desktop Client
C . Microsoft System Center Application Virtualization Streaming Server
D . Microsoft System Center Application Virtualization Management Server
-
You are developing an application that will perform mathematical calculations.You need to ensure that the application is able to perform multiple calculations simultaneously. What should you do?()
A . Set the IdealProcessor property of the ProcessThread object.
B . Set the ProcessorAffinity property of the ProcessThread object.
C . For each calculation, call the QueueUserWorkItem method of the ThreadPool class.
D . Set the Process.GetCurrentProcess().BasePriority property to High.
-
You work as an application developer at Contoso.com. You use Microsoft .NET Framework 3.5 and Microsoft ADO.NET to develop an application. You want to make sure that the application is operative to any type of database. What should you do?()
A . Set the database driver name in the connection string of the application, and then the connection object as follows: DbConnection connection = new OdbcConnection(connectionString);
B . Create the connection object as follows: DbProviderFactory factoryDbProviderFactories.GetFactory(databaseProviderName); DbConnection connection =factory.CreateConnection();
C . Create the connection object as follows: DbProviderFactory factory = DbProviderFactories.GetFactory("System.Data.Odbc"); DbConnection connection = factory.CreateConnection();
D . Set the database driver name in the connection string of the application, and then the connection object as follows:DbConnection connection = new OleDbConnection(connectionString);
-
You work as a network technician at Company. Your boss, Mrs. , is interested in switch spoofing. She asks you how an attacker would collect information with VLAN hoping through switch spoofing. You should tell her that the attacking station... ()
A . ...uses VTP to collect VLAN information that is sent out and then tags itself with the domain information in order to capture the data.
B . ...will generate frames with two 802.1Q headers to cause the switch to forward the frames to a VLAN that would be inaccessible to the attacker through legitimate means.
C . ...uses DTP to negotiate trunking with a switch port and captures all traffic that is allowed on the trunk.
D . ...tags itself with all usable VLANs to capture data that is passed through the switch, regardless of the VLAN to which the data belongs.
E . None of the other alternatives apply
-
You work as the application developer at Hi-Tech.com. You create a new custom dictionary named MyDictionary. Choose the code segment which will ensure that MyDictionary is type safe?()
A . Class MyDictionary Implements Dictionary (Of String,String)
B . Class MyDictionary Inherits HashTable
C . Class MyDictionary Implements IDictionary
D . Class MyDictionary End Class Dim t as New Dictionary (Of String, String) Dim dict As MyDIctionary= CType (t,MyDictionary)
-
I (work)as an assistant manager for six years.
-
If you work from home, you’d better have a desalinated part as your office work place.
-
You are developing a Web application. The Web application restricts access to an administrative page. The Web application uses the following code segment to protect the page.If Page.User.Identity.Name "CONTOSO\Administrator" Then Response.Redirect("login.aspx")End IfYou are logged on as Administrator. When you display the page, you are redirected to Login.aspx. You discover that the User.Identity.Name property is not being correctly populated. You need to ensure that you can access the page when you are logged on as Administrator. Which two actions should you perform? ()
A. In the Web.config file, enable impersonation.
B. In IIS, enable anonymous access.
C. In IIS, disable anonymous access.
D. In the Web.config file, set the authentication mode to Windows.