考题
You have recently created an application, and want to capture all debugging text messages generated by it.You would like these debugging messages to display on the command line. The application that you created contains the following code:Debug.WriteLine (Start the processing);Console.WriteLine (Generated by Console.WriteLine);Debug.WriteLine (End the processing);You need to ensure that you are able to capture all debugging messages to the command line.What should you do?()A.B.C.D.
考题
A Windows Communication Foundation (WCF) service only accepts messages that are signed and encrypted. A client application is not receiving expected responses from the service. You need to enable logging to verify that the messages from the client are signed and encrypted. You also need to see what each message looks like before the message body is deserialized into a NET object. What should you do?()A.B.C.D.
考题
You are developing WPF application for managing student information... btnSort and a DataGrid control named dgStudents on the design surface of the MainWindow.xaml properties : FirstName and LastName. You create the following code segment in the constructor of...The DataGrid control displays the list of students unsorted.You need to ensure that the list of students is sorted by last name.Which code segment should you add to the click event handler of the Button control?()A.B.C.D.
考题
You are employed as the exchange administrator at Company.com.the Company.com network contains an exchange 2010 organization.you are responsible for managing an exchange server 2010 mailbox server named -ex01.You are in the process of implementing a policy that deletes e-mail messages automatically after 60 days.You receive an instruction from management to identify another location where users can store their messages after 60 days.However, administrators need to locate the e-mail messages in both locations when executing multi- mailbox searches. What should you do?()A、You should consider creating a Retention Policy.B、You should consider creating a.pst file for each user that is stored in a shared folder.C、You should consider creating a Personal Archive for each user.D、You should consider creating a journal rule.
考题
You design a Business Intelligence (BI) solution by using SQL Server 2008. You plan to design the report strategy for a new report project that will be used by a financial application. The application uses five calculations that are implemented in Microsoft .NET Framework 3.5 assemblies. The assemblies are written in the C# language and use the static methods. You need to ensure that the calculations can be used by the expressions in all reports. You also need to ensure consistency within the reports by using the least amount of development effort. What should you do?()A、 Add a reference to the assemblies in the Report Properties References tab. B、 Write the calculation logic used by the calculations by using T-SQL functions. C、 Write the code of the calculation logic into the Report Properties Custom Code tab.D、 Write the calculation logic in each report by using the mathematical functions available natively to SQL Server 2008 Reporting Services (SSRS).
考题
You need to design an access control strategy for the marketing application. You solution must minimize impact on server and network performance. What should you do?()A、Require client computers to connect to the marketing application by using a VPN connectionB、Use IPSec to encrypt communications between the servers in the New York and Atlanta officesC、Require the high security setting on Terminal Services connections to the marketing applicationD、Configure all marketing application Web pages to require SSL
考题
You need to design an e-mail access strategy for remote users. What should you do? () A、 Instruct remote users to connect to their e-mail by using RPCB、 Instruct remote users to connect to Outlook Web Access by using only HTTPSC、 Instruct remote users to connect to the company network by using PPTP connectionsD、 Instruct remote users to connectd to their e-mail by using RPC over HTTP Configure the HTTP servers to require encryption.
考题
You are debugging a Windows Communication Foundation (WCF) service. The service uses signed and encrypted messages.You need to configure logging so that you can read the contents of the messages. What should you do?()A、Set maxSizeMessagesToLog to 10B、Set logMessageAtServiceLevel to true.C、Set maxMessagesToLog to 10.D、Set logMessageAtTransportLevel to true.
考题
You need to design a strategy for managing the messages that are sent to the customer service mailboxes. What should you do?()A、Create a separate storage group and database to contain the customer service mailboxes. Enable circular logging for this storage groupB、Create a separate storage group and database to contain the customer service mailboxes. Set the deleted item retention period for this database to zeroC、Place the customer service mailboxes on a new mailbox store in the storage group that contains the main office user mailboxes. Enable circular logging for this storage groupD、Place the customer service mailboxes on a new mailbox store in the storage group that contains the branch office user mailboxes. Set the deleted item retention period for this database to zero
考题
You are developing a Windows Communication Foundation (WCF) service. You write a method named Submit that accepts messages of the type System.ServiceModel.Channels.Message. You need to process the body of the incoming messages multiple times in the method. Which two actions should you perform? (Each correct answer presents part of the solution. Choose two.)()A、Use the GetBody method of the Message class to read the content of the messages.B、Use the CreateBufferedCopy method of the Message class to load the messages into memory.C、Use the WriteBodyContents method of the BodyWriter class to make a copy of the messages.D、Use the CreateMessage method of the MessageBuffer class to make a copy of the messages.
考题
You have an Exchange Server 2010 organization.You discover that many large e-mail messages prevent average-size e-mail messages from being sent to the Internet.You need to delete the large messages from the Hub Transport servers. Which tool should you use?()A、Exchange Control Panel (ECP)B、message trackingC、Queue ViewerD、Windows Explorer
考题
Your company has a single Active Directory Domain Services (AD DS) domain with Windows Server 2008 R2 member servers and 1,000 Windows 7 client computers. You are designing the deployment of a custom application. You have the following requirements: The application must be available to only users who need it. Minimize network traffic during deployment. You need to design a deployment strategy that meets the requirements. Which deployment method should you use?()A、RemoteApp and Desktop ConnectionsB、software installation in Group PolicyC、Microsoft Application Virtualization (App-V)D、Microsoft System Center Configuration Manager 2007
考题
You need to recommend a strategy for managing Windows Firewall that meets the companys technical requirements. What should you include in the recommendation?()A、domain-based Group Policy objects (GPOs)B、local Group Policy objects (GPOs)C、Starter Group Policy objects (GPOs)D、System Starter Group Policy objects (GPOs)
考题
单选题You need to design an access control strategy for the Payment folder for the Sales Managers group. What should you do?()A
Use IPSec in transport modeB
Use Encrypting File System (EFS) over Web Distributed Authoring and Versioning (WebDAV)C
Use PEAP-EAP-TLSD
Use Encrypting File System (EFS) remote encryption
考题
单选题You are employed as the exchange administrator at Company.com.the Company.com network contains an exchange 2010 organization.you are responsible for managing an exchange server 2010 mailbox server named -ex01.You are in the process of implementing a policy that deletes e-mail messages automatically after 60 days.You receive an instruction from management to identify another location where users can store their messages after 60 days.However, administrators need to locate the e-mail messages in both locations when executing multi- mailbox searches. What should you do?()A
You should consider creating a Retention Policy.B
You should consider creating a.pst file for each user that is stored in a shared folder.C
You should consider creating a Personal Archive for each user.D
You should consider creating a journal rule.
考题
单选题Your company has client computers that run Windows XP Professional. You are planning to install Windows 7 Enterprise on the existing client computers. You have the following requirements: Migrate user data and operating system components. Encrypt and password-protect the migration store. You need to design a user state migration strategy that supports the requirements. What should you do?()A
Use a hard-link migration storeB
Use a compressed migration storeC
Perform an offline migration by using WindowsoldD
Perform an offline migration by using Windows PE
考题
单选题You need to design a strategy to meet the company’s requirements for e-mail. What should you do?()A
Configure and publish a certificate template that is suitable for S/MIME, Deploy a Group Policy object (GPO) so that a certificate that is based on this template is automatically issued to all domain usersB
Specify Group Policy objects (GPOs) and IPSec policies that require all client computers to use Kerberos authentication to connect to mail serversC
For each mail server, acquire an SSL server certificate from a commercial CA whose root certificate is already trustedD
Require IPSec encryption on all TCP connections that are used to send or receive e-mail messages
考题
多选题You need to design a strategy to increase security for the client computers in the finance department. Which two actions should you perform?()AEnable automatic certificate enrollmentBEnforce smart card logonsCEnable Encrypting File System (EFS) for offline filesDEnable a screen saver password
考题
单选题You need to recommend a Group Policy strategy for the Remote Desktop servers. What should you include in the recommendation?()A
block inheritanceB
loopback processingC
security filteringD
WMI filtering
考题
单选题Some users report they cannot receive messages from some external senders.You suspect that there is some anti-spam activity blocking those messages.You need to identify what is blocking the messages.You will activate and review the logs of one of the following:()A
Protocol loggingB
Connectivity logsC
Message trackingD
Pipeline tracing
考题
单选题You need to recommend a strategy for managing the domain controllers in the branch offices thatmeets the company security requirements.What should you include in the recommendation?()A
Configure Administration Role Separation.B
Add the BranchAdmins group to the Domains Admins group.C
Add the BranchAdmins group to the Server Operators group.D
Assign the permission for the domain controller computer objects to the BranchAdmins group.
考题
单选题Your company has a single Active Directory Domain Services (AD DS) domain and 1,000 client computers. You are planning to deploy Windows 7 Enterprise to the client computers. You need to design a zero-touch installation strategy.()A
unattended installationB
custom Windows 7 image on DVDC
Windows Deployment Services (WDS)D
Microsoft System Center Configuration Manager 2007 R2
考题
单选题You need to design the consolidation strategy for the Promotions and Partners databases. You want to choose a strategy that results in the best database performance while maintaining the permissions of end users in each database.What consolidation strategy should you choose?()A
Place each database in a separate instance running on SQL2.B
Place each database in a separate instance running on SQL3.C
Place both databases in a single instance running on SQL2.D
Place both databases in a single instance running on SQL3.
考题
单选题You are designing a strategy for migrating domain user accounts to the new Windows Server 2003 Active Directory environment. You want to identify the minimum number of trust relationships that need to be manually created to perform this operation. Which design should you use? ()A
one external trust relationshipB
two external trust relationshipsC
six external trust relationshipsD
twelve external trust relationshipsE
one two-way cross-forest trust relationship
考题
单选题You need to design a group membership strategy for the EditorialAdmins group. What should you do?()A
Move the EditorialAdmins group to the Servers OU in the editorial departmentB
Move the members of the EditorialAdmins group to the Editorial OUC
Move the members of the EditorialAdmins group to the New York OUD
Move the EditorialAdmins group to the New York OU
考题
单选题You need to block messages from senders that do not comply sender policy framework (SPF).What do you need to implement?()A
Receive connectorB
Sender ID FilteringC
Sender FilteringD
Send connector