考题
You are writing a method to compress an array of bytes.The array is passed to the method in a parameter named document.You need to compress the incoming array of bytes and return the result as an array of bytes.Which code segment should you use?()A.B.C.D.
考题
You are creating a Windows Communication Foundation (WCF) service that implements operations in a RESTful manner. You need to add a delete operation. You implement the delete method as follows:void DeleteItems(string id);You need to configure WCF to call this method when the client calls the service with the HTTP DELETE operation. What should you do?()A. Add the WebInvoke(UriTemplate=/Items/{id}, Method=DELETE) attribute to the operationB. Add the HttpDelete atribute to the operationC. Replace the string parameter with a RemovedActivityAction parameterD. Replace the return type with RemovedActivityAction.
考题
You have a computer that runs Windows Vista.You need to ensure that all local administrators can install applications without being prompted for approval.What should you do?()
A.AB.BC.CD.D
考题
Your company has a single Active Directory Domain Services (AD DS) domain and 1,000 Windows Vista computers. You are planning to deploy Windows 7 and a custom application. You have the following requirements: The application must be available to only a specific group of users. You must be able to monitor application usage. You need to design a deployment method for the custom application that meets the requirements. Which deployment method should you use in your design?()A、software installation in Group PolicyB、startup scripts in Group PolicyC、Microsoft Application Virtualization (App-V)D、baseline Windows 7 image that includes the custom application
考题
The company wants to evaluate making all business office users administrators on their client computers. You need to design a method to ensure that this change can be made in a manner that meets business and security requirements. What should you do?()A、On all domain controllers, implement registry access auditing for all registry keys that are considered sensitive by the company’s written security policyB、On all client computers, implement logon auditing for all user account logonsC、On all client computers, configure registry access auditing for all registry keys that are considered sensitive by the company’s written security policyD、On all domain controllers, implement logon auditing for all user account logons
考题
You are developing an application that uses role-based security. The prinicipal policy of the application domain is configured during startup with the following code:AppDomain.CurrentDomain.SetPrincipalPolicy(PrincipalPolicy.WindowsPrincipal); You need to restrict access to one of the methods in your application so that only members of the local Administrators group can call the method. Which attribute should you place on the method?()A、 [PrincipalPermission (SecurityAction.Demand, Name = @"BUILTIN/Administrators")]B、 [PrincipalPermission (SecurityAction.Demand, Role = @"BUILTIN/Administrators")]C、 [PrincipalPermission (SecurityAction.Assert, Name = @"BUILTIN/Administrators")]D、 [PrincipalPermission (SecurityAction.Assert, Role = @"BUILTIN/Administrators")]
考题
You need to design a method to standardize and deploy a baseline security configuration for servers. You solution must meet business requirements. What should you do?()A、Create a script that installs the Hisecdc.inf security templateB、Use a GPO to distribute and apply the Hisec.inf security templateC、Use the System Policy Editor to configure each server’s security settingsD、Use a GPO to distribute and apply a custom security template
考题
You need to design a method to log changes that are made to servers and domain controllers. You also need to track when administrators modify local security account manager objects on servers. What should you do?()A、Enable failure audit for privilege user and object access on all servers and domain controllersB、Enable success audit for policy change and account management on all servers and domain controllersC、Enable success audit for process tracking and logon events on all servers and domain controllersD、Enable failure audit for system events and directory service access on all servers and domain controllers
考题
You need to design a method to address the chief information officer’s security concerns. What should you do?()A、Configure Windows Management Instrumentation (WMI) filtering options in the Default Domain Policy GPOB、Use the gpresult commandC、Use Mbsacli.exeD、Configure software restriction policy options in the Default Domain Policy GPO
考题
You are developing a custom-collection class.You need to create a method in your class. You need to ensure that the method you create in your class returns a type that is compatible with the Foreach statement. Which criterion should the method meet?()A、The method must return a type of either IEnumerator or IEnumerable.B、The method must return a type of IComparable.C、The method must explicitly contain a collection.D、The method must be the only iterator in the class.
考题
You are planning to deploy Windows 7 to all client computers in your network. You need to ensure that domain administrators can manage domain Group Policy objects (GPOs) from their Windows 7 computers. What should you provide to the domain administrators?()A、Administration Tools PackB、GPOAccelerator ToolC、Local Group Policy EditorD、Remote Server Administration Tools
考题
You need to design a remote administration solution for servers on the internal network. Your solution must meet business and security requirements. What should you do?()A、Permit administrators to use an HTTP interface to manage servers remotelyB、Permit only administrators to connect to the servers’ Telnet serviceC、Permit administrators to manage the servers by using Microsoft NetMeetingD、Require administrators to use Remote Desktop for Administration connections to manage the servers
考题
You are developing an ASP.NET Web page that will display the median value from a sequence of integer values. You need to create an extension method to compute the median value. Which interface should you add the extension method to?()A、 IComparerTB、 IEnumerableTC、 IEnumeratorT D、 IEqualityComparerT
考题
You create an intranet Web site for management of project documents. You need to enable all users to browse documents on the site. Only members of the administrators group must be able to upload files. Which code segment of the Web.config file should you use? ()A、allow verbs="GET" users="*" /deny verbs="POST" users="*" /allow verbs="POST" roles="Administrators" /B、allow role s="Administrators" /deny users="*" /C、allow u sers="Administrators" /allow users="*" /D、allow v erbs = "POST" roles="Administrators" /deny verbs="POST" users="*" /allow verbs="GET" users="*" /
考题
You are the network administrator for TestKing. The network consists of a single Active Directory domain named testking.com. All domain controller run Windows Server 2003. employes three database administrators who administer seven databases servers that run Windows Server 2003. The database administrators occasionally restore a database server after a disaster. To restore a server, database administrators need the rights required to perform the following tasks: 1. Back up files and folders 2. Restore files and folders. 3. Restore the System State data. You need to assign the database administrators the rights that they require to perform the specified tasks. For security reasons, you must not assign the administrators more rights than they require to perform the tasks. What should you do?()A、Add the database administrators' user accounts to the Administrators group on each of the database servers.B、Add the database administrators' user accounts to the Power Users group on each of the database servers.C、Add the database administrators' user accounts to the Backup Operators group on each of the database servers.D、Add the database administrators' user accounts to the Backup Operators group on one of the domain controllers.E、Add the database administrators' user accounts to the Server Operators group on one of the domain controllers.
考题
单选题You develop a service application named PollingService that periodically calls long-running procedures.These procedures are called from the DoWork method.You use the following service application code: When you attempt to start the service, you receive the following error message: Could not start the PollingService service on the local computer.Error 1053: The service did not respond to the start or control request in a timely fashion. You need to modify the service application code so that the service starts properly.What should you do?()A
Move the loop code into the constructor of the service class from the OnStart method.B
Drag a timer component onto the design surface of the service. Move the calls to the long-running procedure from the OnStart method into the Tick event procedure of the timer, set the Enabled property of the timer to True, and call the Start method of the timer in the OnStart method.C
Add a class-level System.Timers.Timer variable to the service class code. Move the call to the DoWork method into the Elapsed event procedure of the timer, set the Enabled property of the timer to True, and call the Start method of the timer in the OnStart method.D
Move the loop code from the OnStart method into the DoWork method.
考题
单选题You need to design a method to encrypt confidential data. Your solution must address the concerns of the chief information officer. What should you do?()A
Encrypt customer information when it is stored and when it is being transmittedB
Require encrypted connections to the public Web site, which is hosted on the Web server on the perimeter networkC
Encrypt all marketing information on file servers and client computersD
Require encrypted connections to all file servers
考题
单选题You are developing a Windows Presentation Foundation (WPF) application.You need to display HTML content from a Web page on the WPF form. What should you do?()A
Add a FlowDocumentReader control to the design surface. Then create a FlowDocument control.B
Add a DocumentViewer control to the design surface. Then create a FixedDocument control.C
Add a WebBrowser control to the design surface. Then use the Navigate method to navigate the URI object.D
Add a ContentControl control to the design surface. Then reference a WebClient object to return an HTML string.
考题
单选题You are creating an ASP.NET Web site. The site is configured to use Membership and Role management providers. You need to check whether the currently logged-on user is a member of a role namedAdministrators. Which code segment should you use?()A
bool isMember = Roles.GetUsersInRole(Administrators).Any()B
bool isMember = Membership.ValidateUser(User.Identity.Name, Administrators)C
bool isMember = Roles.GetRolesForUser(Administrators).Any()D
bool isMember = User.IsInRole(Administrators)
考题
单选题You are planning to upgrade Internet Explorer. You have the following requirements: Create a report that identifies which computers are successfully upgraded. Do not install additional software on the client computers. You need to design a deployment method that meets the requirements. What should you do?()A
Use Internet Explorer Administration Kit (IEAK) and Group Policy.B
Use Microsoft System Center Configuration Manager.C
Use Windows Server Update Services (WSUS).D
Use Microsoft System Center Essentials.
考题
单选题In your web application,you need to execute a block of code whenever the session object is first created. Which design will accomplish this goal?()A
Create an HttpSessionListener class and implement the sessionInitialized method with that block ofcode.B
Create an HttpSessionActivationListener class and implement the sessionCreated method with thatblock of code.C
Create a Filter class, call the getSession(false) method, and if the result was null, then execute that block of code.D
Create an HttpSessionListener class and implement the sessionCreated method with that block of code.
考题
单选题You are creating a Windows Communication Foundation (WCF) service that implements operations in a RESTful manner.You need to add a delete operation. You implement the delete method as follows. string void DeleteItems(string id);You need to configure WCF to call this method when the client calls the service with the HTTP DELETE operation. What should you do?()A
Add the WebInvoke(UriTemplate = /Items/{id},Method=DELETE) attribute to the operation.B
Add the HttpDelete attribute to the operation.C
Replace the string parameter with a RemovedActivityAction parameter.D
Replace the return type with RemovedActivityAction.
考题
单选题You are creating a Windows Communication Foundation (WCF) service that implements operations in a RESTful manner. You need to add a delete operation. You implement the delete method as follows:void DeleteItems(string id);You need to configure WCF to call this method when the client calls the service with the HTTP DELETE operation. What should you do?()A
Add the WebInvoke(UriTemplate=/Items/{id}, Method=DELETE) attribute to the operationB
Add the HttpDelete atribute to the operationC
Replace the string parameter with a RemovedActivityAction parameterD
Replace the return type with RemovedActivityAction.
考题
单选题The company wants to evaluate making all business office users administrators on their client computers. You need to design a method to ensure that this change can be made in a manner that meets business and security requirements. What should you do?()A
On all domain controllers, implement registry access auditing for all registry keys that are considered sensitive by the company’s written security policyB
On all client computers, implement logon auditing for all user account logonsC
On all client computers, configure registry access auditing for all registry keys that are considered sensitive by the company’s written security policyD
On all domain controllers, implement logon auditing for all user account logons
考题
单选题You need to recommend a NAP enforcement method that meets the companyˉs security requirements. Which method should you recommend?()A
802.1XB
DHCPC
IPSecD
VPN
考题
单选题You are developing a custom-collection class.You need to create a method in your class. You need to ensure that the method you create in your class returns a type that is compatible with the Foreach statement. Which criterion should the method meet?()A
The method must return a type of either IEnumerator or IEnumerable.B
The method must return a type of IComparable.C
The method must explicitly contain a collection.D
The method must be the only iterator in the class.
考题
单选题Your company has client computers that run Windows XP Professional. You are planning to install Windows 7 Enterprise on the existing client computers. You need to design a user state migration strategy that minimizes network bandwidth and server use when user data is being migrated. What should you do?()A
Use the Refresh Computer method and a hard-link migration store.B
Use the Refresh Computer method and a compressed migration store.C
Use the Replace Computer method and a hard-link migration store.D
Use the Replace Computer method and a compressed migration store.