网友您好, 请在下方输入框内输入要搜索的题目:

题目内容 (请给出正确答案)
多选题
You receive complaints from users regarding the high waiting time for their transactions. Oninvestigation, you find that some users are not committing their transactions though they are  notperforming any activity for a long time. As a result, SQL statements need to wait for row-level locks.  Which two actions could you take to prevent this locking problem in the future()
A

Decrease the IDLE_TIME resource limit in the profile assigned to the blocking users.

B

Use Database Resource Manager to automatically log out sessions that block others and are idle.

C

Set the limit in the profile of blocking users to control the number of blocks to be accessed in a session.

D

Decrease the maximum number of interested transaction list (ITL) slots for the segments on which the blocking user performs the transaction


参考答案

参考解析
解析: 暂无解析
更多 “多选题You receive complaints from users regarding the high waiting time for their transactions. Oninvestigation, you find that some users are not committing their transactions though they are  notperforming any activity for a long time. As a result, SQL statements need to wait for row-level locks.  Which two actions could you take to prevent this locking problem in the future()ADecrease the IDLE_TIME resource limit in the profile assigned to the blocking users.BUse Database Resource Manager to automatically log out sessions that block others and are idle.CSet the limit in the profile of blocking users to control the number of blocks to be accessed in a session.DDecrease the maximum number of interested transaction list (ITL) slots for the segments on which the blocking user performs the transaction” 相关考题
考题 You have a server that runs Windows Server 2003 Service Pack 2 (SP2).You enable Remote Desktop on the server and add 10 users to the Remote Desktop Users group.Users report that they occasionally receive an error message indicating that Terminal Server has reached the maximum number of connections.You need to ensure that all 10 users can establish Remote Desktop connections to the server concurrently.What should you do?()A. From Add or Remove Programs, add the Terminal Server component.B. From Add or Remove Programs, add the Connection Point Services component.C. From the Terminal Services Configuration console, modify the Maximum connections setting.D. From the Terminal Services Configuration console, modify the Restrict each user to one session setting.

考题 You have an Exchange Server 2010 organization named contoso.com that contains a mail-enabled group named Group1. Users from outside the organization report that e-mail messages sent to group1@contoso.com generate a non-delivery report (NDR).You need to ensure that users outside the organization can successfully send e-mail to group1 @ contoso.com. What should you modify?()A、the authentication settings for the Client Receive connectorB、the message delivery restrictions for Group1C、the moderation settings for Group1D、the remote IP address range for the Client Receive connector

考题 You have an Exchange Server 2010 organization.You acquire a new Internet domain name.Users report that they cannot receive e-mail sent to the new domain name.You verify that all users have the new domain name configured as an e-mail address suffix.You need to ensure that users can receive e-mail sent from the Internet to the new domain name. What should you create?()A、an Authoritative Accepted DomainB、an External Relay Accepted DomainC、a new Receive connectorD、a remote domain

考题 You work as the enterprise exchange administrator at Company.com.The Company.com network consists of a single Active Directory domain named Company.com.Company.com has an Exchange Server 2010 organization.Company.com contains an exchange server 2010 hub transport server named -ex20.you have received instructions from the cio to make sure that - ex20 can receive e-mail messages residing from their clients on the internet. What should you do?()A、you should consider enabling, anonymous users permission group for the client -ex20 receive connector.B、You should consider setting up a Receive connector and set the use to Client. Thereafter you should change the port for the connector.C、You should consider setting up a Receive connector and set the use to Custom. Thereafter you should change the remote IP addresses range for the connector.D、you should consider enabling, anonymous users permission group for the default -ex20 receive connector.

考题 You have an Exchange Server 2010 organization named contoso.com.All users configure internal and external Out Of Office messages.You need to ensure that internal Out Of Office messages are sent to senders from the fabrikam.com domain. What should you create and configure?()A、a new accepted domainB、a new Receive connectorC、a new remote domainD、a new Send connector

考题 You are employed as the Exchange administrator at Company.com.The Company.com network contains an Exchange Server 2010 Organization.The Active Directory forest of Company.com contains two sites named ExamWaysA and ExamWaysB.both sites contain 6 mailbox servers.examwaysa contains a mailbox server named -ex01 and examwaysb a mailbox server named ex02.Company.com has a public folder named testdata that is replicated to -ex01 and -ex02.during the course of the week you receive numerous complaints from users stating that they are unable to access the public folder when -ex01 is offline.you receive an instruction from management to resolve this issue as soon as possible.to ensure productivity you decide to make sure that all examways users are able to utilize testdata when -ex01 becomes offline.What should you do?()A、you should consider having -ex01 and -ex02 added to a database availability group (dag).B、you should consider having -ex01 added to the public folder referrals for examwaysb.C、you should consider having -ex02 added to the public folder referrals for examwaysa.D、you should consider having -ex01 and -ex02 added to a client access server array.

考题 You have an Exchange Server 2010 Service Pack 1 organization named contoso.com.All users have the  contoso.com e-mail address suffix. You discover that both anonymous and authenticated users can post content to a public folder named Folder1 by sending e-mail messages to folder1@contoso.com.You need to prevent all users from posting content to Folder1 by sending e-mail.What should you do?()A、From Outlook Web App (OWA), modify the properties of Folder1.B、From the Exchange Management Shell, modify the permissions of the default Receive connector.C、From the Public Folder Management Console, modify the properties of Folder1.D、From the Exchange Management Console, modify the properties of the Public Folder database.

考题 Your network contains a Web server named Server1 that runs Windows Server 2003 and Internet Information Server (IIS). Server1 has a server certificate from an Enterprise Certificate Authority (CA) installed. External users report that when they try to access the Web site from outside the corporate network by using a Web browser, they receive the following warning message: There is a problem with this Web sites security certificate. The security certificate presented by this Web site was not issued by a trusted certificate authority. You find that users onthe corporate network do not receive this error. You need to ensure that external users do not receive the warning message when connecting to Server1.   What should you do?()A、In IIS Manager, enable the Enable client certificate mapping option.B、In IIS Manager, replace the certificate with a certificate obtained from a public Certification Authority.C、In Local Security Policy, enable Domain Member: Require strong (Windows 2000 or later) session key.D、In Local Security Policy, enable Domain Member: Digitally encrypt or sign secure channel data (always).

考题 You have a print server that runs Windows Server 2003 Service Pack 2 (SP2). Users report that print jobs are not printing. Users also report that they do not receive any error messages. Younotice a large number of jobs in the print queue. You attempt to delete some jobs from the queue and notice that the jobs remain in the queue. You need to ensure that users can print successfully. What should you do? ()A、Restart the Print Spooler service.B、Pause the printer, and then restart the printer.C、Take ownership of the printer, and then delete the print jobs.D、Assign the Manage Documents permission to the users connected to the printer.

考题 You are employed as the exchange administrator at Company.com.the Company.com network contains an exchange server 2010 organization.Company.com has its headquarters in chicago where you are located.The organization contains a single server named -ex01.you receive numerous complaints from users stating that they receive a vast amount of spam messages.management wants you to decrease the amount of spam users in the organization receive. What should you do?()A、Your best option would be to have a Transport Protection Rule created.Thereafter a journal rule can be created.B、Your best option would be to run the Install-AntispamAgents.ps1 script.Thereafter the transport agents can be configured.C、Your best option would be to have a journal rule created.Thereafter an Outlook Protection Rule can be created.D、Your best option would be to run the AntispamCommon.ps1 script.Thereafter a Transport Protection Rule can be created.

考题 You work as a network exchange administrator at Company.com.the Company.com network currently consists of a single active directory forest containing a single domain named Company.com.the Company.com organization makes use of microsoft exchange server 2010 as their messaging  solution.Company.com has recently configured an exchange server named ex01 with a single mailbox database.Company.com is aware that the network users user microsoft office outlook and outlook web app.During your routine maintenance you discover that the network users are unable to restore e-mail messages from the Recover Deleted Items folder. During the course of the business week you receive instruction from Company.com to ensure that the network users are able to restore e-mail messages from the Recover Deleted Items folder. What should you do?()A、You should consider having a management role created and assigned to all users from the Exchange Management Shell.B、You should consider having a retention policy created and assigned to all users from the Exchange Management Shell.C、You should consider having the properties of the mailbox database modified from the Exchange Management Console (EMC).D、You should consider having the properties of the Mailbox server object modified from the Exchange Management Console (EMC).

考题 You work as a network Exchange administrator at Company.com.The Company.com network currently consists of a single Active Directory forest containing a single domain named Company.com.The Company.com organization makes use of Microsoft Exchange Server 2010 as their messaging solution.During the course of the week you receive an instruction from the CIO to stop internal users from sending e-mail messages containing the words "Classified Data" to users outside the organization. What should you do?()A、You should consider creating a message classification.B、You should consider creating a Transport rule.C、You should consider creating a Send connector.D、You should consider creating a managed folder mailbox policy.

考题 You have an Exchange Server 2010 organization named Contoso, Ltd.The organization contains an Edge Transport server.Users from a company named Fabrikam, Inc.send messages over the Internet by using the @fabrikam.com e-mail address suffix.You need to ensure that messages sent from Fabrikam users to Contoso users have the @contoso.com e-mail address suffix in the source address. What should you create?()A、a Receive connectorB、an accepted domainC、an address rewrite entryD、an e-mail address policy

考题 You work as a network Exchange administrator at Company.com.The Company.com network currently consists of a single Active Directory forest containing a single domain named Company.com.The Company.com organization makes use of Microsoft Exchange Server 2010 as their messaging solution.During the course of the business week you receive instruction from Company.com to ensure that the network users are able to open a resource mailbox. What should you do?()A、You should consider having a new Sharing policy crated from the Exchange Management Console (EMC).B、You should consider having the Resource Delegated parameter set for the resource mailbox from the Exchange Management Shell.C、You should consider having the password for the account associated to the resource mailbox reset from Active Directory Users And Computers console.You should then have the password provided to the network users .D、You should consider having the properties of the resource mailbox modified from Microsoft Office Outlook.

考题 You install an Exchange Server 2010 Hub Transport server named Hub1.You need to ensure that Hub1 can receive e-mail messages sent from Internet hosts.What should you do?()A、Enable the Anonymous users permission group for the Client Hub1 Receive connector.B、Enable the Anonymous users permission group for the Default Hub1 Receive connector.C、Create a Receive connector and set the intended use to Client.Modify the port for the connector.D、Create a Receive connector and set the intended use to Custom.Modify the remote IP addresses range for the connector.

考题 You have an Exchange organization named Contoso, Ltd.All servers in the organization have Exchange Server 2010 Service Pack 1 (SP1) installed.The organization contains an Edge Transport server.  Users from a company named Fabrikam, Inc.send e-mail messages over the Internet by using the fabnkam.come-mail address suffix. Contoso acquires Fabrikam. You need to ensure that messages sent from Fabrikam users to Contoso users have the contoso.com e-mail address suffix in their source address.  What should you create?()A、an accepted domainB、an address rewrite entryC、an e-mail address policyD、a Receive connector

考题 单选题You have an Exchange Server 2010 organization named Contoso, Ltd.The organization contains an Edge Transport server.Users from a company named Fabrikam, Inc.send messages over the Internet by using the @fabrikam.com e-mail address suffix.You need to ensure that messages sent from Fabrikam users to Contoso users have the @contoso.com e-mail address suffix in the source address. What should you create?()A a Receive connectorB an accepted domainC an address rewrite entryD an e-mail address policy

考题 单选题You work as the enterprise exchange administrator at Company.com.The Company.com network consists of a single Active Directory domain named Company.com.Company.com has an Exchange Server 2010 organization.Company.com contains an exchange server 2010 hub transport server named -ex20.you have received instructions from the cio to make sure that - ex20 can receive e-mail messages residing from their clients on the internet. What should you do?()A you should consider enabling, anonymous users permission group for the client -ex20 receive connector.B You should consider setting up a Receive connector and set the use to Client. Thereafter you should change the port for the connector.C You should consider setting up a Receive connector and set the use to Custom. Thereafter you should change the remote IP addresses range for the connector.D you should consider enabling, anonymous users permission group for the default -ex20 receive connector.

考题 单选题Company.com has employed you as their exchange administrator.The Company.com network contains an exchange server 2010 organization that hosts two exchange servers named -ex01 and -ex02.-ex01 and -ex02 is members of a database availability group.during the course of the day you decide to shut down -ex01.You then receive numerous complaints from users stating that they are unable to access their mailboxes.to ensure productivity you need to make sure that all examways users are able to connect to their mailboxes in the event of one mailbox server becoming inaccessible.What should you do?()A your best choice would be to have the hub transport server role removed from -ex01.B your best option would be to have the mailbox database copies added to -ex01 and -ex02.C Your best option would be to have the shadow redundancy settings configured.D Your best option would be to have Client Access server array created.

考题 单选题You are employed as the Exchange administrator at Company.com.The Company.com network contains an Exchange Server 2010 Organization.The Active Directory forest of Company.com contains two sites named ExamWaysA and ExamWaysB.both sites contain 6 mailbox servers.examwaysa contains a mailbox server named -ex01 and examwaysb a mailbox server named ex02.Company.com has a public folder named testdata that is replicated to -ex01 and -ex02.during the course of the week you receive numerous complaints from users stating that they are unable to access the public folder when -ex01 is offline.you receive an instruction from management to resolve this issue as soon as possible.to ensure productivity you decide to make sure that all examways users are able to utilize testdata when -ex01 becomes offline.What should you do?()A you should consider having -ex01 and -ex02 added to a database availability group (dag).B you should consider having -ex01 added to the public folder referrals for examwaysb.C you should consider having -ex02 added to the public folder referrals for examwaysa.D you should consider having -ex01 and -ex02 added to a client access server array.

考题 单选题You have a print server that runs Windows Server 2003 Service Pack 2 (SP2). Users report that print jobs are not printing. Users also report that they do not receive any error messages. You notice a large number of jobs in the print queue. You attempt to delete some jobs from the queue and notice that the jobs remain in the queue. You need to ensure that users can print successfully. What should you do? ()A Restart the Print Spooler service.B Pause the printer, and then restart the printer.C Take ownership of the printer, and then delete the print jobs.D Assign the Manage Documents permission to the users connected to the printer.

考题 单选题Some users report they cannot receive messages from some external senders.You suspect that there is some anti-spam activity blocking those messages.You need to identify what is blocking the messages.You will activate and review the logs of one of the following:()A Protocol loggingB Connectivity logsC Message trackingD Pipeline tracing

考题 单选题You are using Windows 2000 Professional on your desktop computer. You are working on the company’s financial report and you want other users on the network to able to modify your documents for the report. You want users to share the financial report folder on the network. Because the network contains confidential information you want to prevent users from the enabling off line access for the network share that contains the financial report. What should you do?()A Use Windows Explorer to receive the offline filesB Using the Windows Explorer, disable the cache for the reports on the network shareC Use the Windows NT explorer to grant the special access for the reports on the network  shareD Use the synchronization manager to configure synchronization not to occur when users are  connected to the LAN connection. 

考题 单选题You have an Exchange Server 2010 organization.You acquire a new Internet domain name.Users report that they cannot receive e-mail sent to the new domain name.You verify that all users have the new domain name configured as an e-mail address suffix.You need to ensure that users can receive e-mail sent from the Internet to the new domain name. What should you create?()A an Authoritative Accepted DomainB an External Relay Accepted DomainC a new Receive connectorD a remote domain

考题 多选题You receive complaints from users regarding the high waiting time for their transactions. Oninvestigation, you find that some users are not committing their transactions though they are  notperforming any activity for a long time. As a result, SQL statements need to wait for row-level locks.  Which two actions could you take to prevent this locking problem in the future()ADecrease the IDLE_TIME resource limit in the profile assigned to the blocking users.BUse Database Resource Manager to automatically log out sessions that block others and are idle.CSet the limit in the profile of blocking users to control the number of blocks to be accessed in a session.DDecrease the maximum number of interested transaction list (ITL) slots for the segments on which the blocking user performs the transaction

考题 单选题You administer a Windows 2000 Professional computer that is shared by multiple users. You receive a phone call from one of the users of the shared computer that tells you that the computer is reporting a kernel stop error. You notice that a user has tried to install video drivers that have caused the computer to become unstable. You want to ensure that users can install only the drivers that are approved by the manufacturer.  What should you do? ()A Configure File signature verification to block driver installation, and set driver signing as a system default.B Remove all users from the Power User group.C Create a Local Computer Policy to prevent users from installing drivers.D Create a Local Computer Policy to enable Windows File Protection.

考题 单选题Your network contains a Web server named Server1 that runs Windows Server 2003 and Internet Information Server (IIS). Server1 has a server certificate from an Enterprise Certificate Authority (CA) installed. External users report that when they try to access the Web site from outside the corporate network by using a Web browser, they receive the following warning message: There is a problem with this Web sites security certificate. The security certificate presented by this Web site was not issued by a trusted certificate authority. You find that users onthe corporate network do not receive this error. You need to ensure that external users do not receive the warning message when connecting to Server1.   What should you do?()A In IIS Manager, enable the Enable client certificate mapping option.B In IIS Manager, replace the certificate with a certificate obtained from a public Certification Authority.C In Local Security Policy, enable Domain Member: Require strong (Windows 2000 or later) session key.D In Local Security Policy, enable Domain Member: Digitally encrypt or sign secure channel data (always).

考题 单选题Which of the following is true about the Internet according to the passage?A Americans were more in contact before the advent of the Internet.B The Internet is weakening the tie of social networks.C If you use the internet, you are more likely to get help from network members.D Internet users are more likely to receive help from non-users.