考题
In your database, you want to ensure that idle sessions that are blocking active are automatically terminated after a specified period of time.How would you accomplish this?()
A. Setting a metric thresholdB. Implementing Database Resource ManagerC. Enabling resumable timeout for user sessionsD. Decreasing the value of the IDLE_TIME resource limit in the default profile
考题
You work as the enterprise exchange administrator at Xxx .The Xxx network is running in a Microsoft Exchange Server 2010 environment.The Xxx network has two Mailbox servers named XXX-EX01 and XXX-EX02.You are busy implementing a database availability group (DAG). What actions must you take to guarantee mailbox databases replications on XXX-EX01 and XXXEX02?()A、You must implement a custom Send connectorB、You must install the Active Directory Connector (ADC)C、You must change the Database pathsD、You must change the membership list of the DAG
考题
You are implementing an ASP.NET Web page. The page includes several controls, but only a GridView requires view state. You set the GridView… You need to ensure that the page will omit unneeded view state. Wich @ Page directive should you use?()A、% Page EnableViewState=”true” ViewStateMode=”Enabled” _ %B、% Page EnableViewState=”true” ViewStateMode=”Disabled” _ %C、% Page EnableViewState=”false” ViewStateMode=”Disabled” _ %D、% Page EnableViewState=”false” ViewStateMode=”Enabled” _ %
考题
You are the enterprise administrator for an Exchange Server 2010 organization. All users run Microsoft Office Outlook 2010. You are designing a sharing solution for your organization and a partner organization. The partner organization also uses Exchange Server 2010. You need to recommend a strategy for sharing information with the partner organization to meet thefollowing requirements: .Provide cross-organizational access to user contacts .Provide cross-organizational access to free/busy information What should you recommend?()A、Creating cross-forest trustsB、Implementing Federated SharingC、Implementing Microsoft Identify Lifecycle Manager (ILM) 2007D、Running the Microsoft Exchange Inter-Organization Replication tool
考题
The Company LAN is becoming saturated with broadcasts and multicast traffic. What could you do to help a network with many multicasts and broadcasts?()A、Creating smaller broadcast domains by implementing VLANs.B、Separate nodes into different hubs.C、Creating larger broadcast domains by implementing VLANs.D、Separate nodes into different switches.E、All of the above.
考题
You are charged with implementing a secure wireless installation which will provide Internet accessto client devices but will not allow communications between wireless clients. In addition to implementing PSPF or peer-to-peer blocking on the wireless side. Which of the following actions should you perform on the wired infrastructure?()A、Implement a Cisco Secure IPS sensor.B、Implement 802.1X on the switch ports.C、Take no action, you have achieved your goal.D、Implement a protected port on the access switches.
考题
You are implementing a new frame relay network to provide connectivity between you offices. To do this, you set up the frame relay network using point-to-point subinterfaces.Which of the following does NOT need to be configured?()A、The Frame Relay encapsulation on the physical interface.B、The local DLCI on each subinterface.C、An IP address on the physical interface.D、The subinterface type as point-to-point.
考题
How can you create a listener class that receives events when the mouse is moved?() A、 By extending MouseListener.B、 By implementing MouseListener.C、 By extending MouseMotionListener.D、 By implementing MouseMotionListener.E、 Either by extending MouseMotionListener or extending MouseListener.F、 Either by implementing MouseMotion Listener or implementing MouseListener.
考题
You are implementing an ASP.NET MVC 2 Web application that allows users to view and edit data. You need to ensure that only logged-in users can access the Edit action of the controller. What are two possible attributes that you can add to the Edit action to achieve this goal? ()A、[Authorize(Users = "")]B、[Authorize(Roles = "")]C、[Authorize(Users = "*")]D、[Authorize(Roles = "*")]
考题
You are implementing a Web page that displays text that was typed by a user. You need to display the user input in the Web page so that a cross-site scripting attack will be prevented. What should you do?()A、Call document.write.B、Call Response.Write.C、Call HttpUtility.UrlEncode.D、Call HttpUtility.HtmlEncode.
考题
You are the enterprise administrator for an Exchange Server 2010 organization. All users run Microsoft Office Outlook 2010. You are designing a sharing solution for your organization and a partner organization. The partner organization also uses Exchange Server 2010. You need to recommend a strategy for sharing information with the partner organization to meet thefollowing requirements: .Provide cross-organizational access to user contacts .Provide cross-organizational access to free/busy information What should you recommend?()A、Creating cross-forest trustsB、Implementing Federated SharingC、Implementing Microsoft Identify Lifecycle Manager (ILM) 2007D、Running the Microsoft Exchange Inter-Organization Replication tool
考题
You need to recommend changes to the DFS infrastructure that meet the company’s techical requirements. What should you recommend implementing in each branch office?()A、a DFS namespace serverB、a DFS replicaC、a standalone DFS namespaceD、BranchCache in Distributed Cache modeE、BranchCache in Hosted Cache mode
考题
You work as a system administrator at Certkiller.com. You are in the process of creating anASP.NET application using Microsoft .NET Framework v3.5. You receive an instruction from management to create a custom-templated server control. Toensure productivity you need to make sure that the child controls of the newly created servercontrol are identified within the hierarchy of the page. You thus need to identify the interface thatwill accomplish this. What should you do?()A、You should consider implementing the IRequiresSessionState interface.B、You should consider implementing the ITemplatable interface.C、You should consider implementing the IPostBackDataHandler interface.D、You should consider implementing the INamingContainer interface
考题
Which of the following lists of items all require an HMC to function with POWER5?()A、Running AIX 5.3 Implementing HACMP Implementing Static LPARB、Implementing Advanced POWER Virtualization Running Linux Attaching RIO drawersC、Implementing VIO Server Implementing Dynamic LPAR Running with SMT turned "On"D、Running AIX and Linux on the same system Implementing CoD Implementing Micro-Partitioning
考题
You work as the IT professional in an international company which is named wiikigo. You are experienced in implementing and administering a network operating system. You are specialized in configuring IP addressing and services. Configuring name resolution and network access and so on.Your company is desigiing its network. The network will use an IPv6 prefix of 2001:DB8: BBCC:0000::/53. You have to identify an IPv6 addressing scheme that will support 2000 subnets. Which network mask should you use?()A、You should use /63.B、You should use /64.C、You should use /61.D、You should use /62.
考题
单选题You work as a system administrator at Certkiller.com. You are in the process of creating anASP.NET application using Microsoft .NET Framework v3.5. You receive an instruction from management to create a custom-templated server control. Toensure productivity you need to make sure that the child controls of the newly created servercontrol are identified within the hierarchy of the page. You thus need to identify the interface thatwill accomplish this. What should you do?()A
You should consider implementing the IRequiresSessionState interface.B
You should consider implementing the ITemplatable interface.C
You should consider implementing the IPostBackDataHandler interface.D
You should consider implementing the INamingContainer interface
考题
单选题You are implementing a new frame relay network to provide connectivity between you offices. To do this, you set up the frame relay network using point-to-point subinterfaces.Which of the following does NOT need to be configured?()A
The Frame Relay encapsulation on the physical interface.B
The local DLCI on each subinterface.C
An IP address on the physical interface.D
The subinterface type as point-to-point.
考题
多选题You need to recommend changes to the DFS infrastructure that meet the company’s techical requirements. What should you recommend implementing in each branch office?()Aa DFS namespace serverBa DFS replicaCa standalone DFS namespaceDBranchCache in Distributed Cache modeEBranchCache in Hosted Cache mode
考题
多选题You are implementing an ASP.NET MVC 2 Web application that allows users to view and edit data. You need to ensure that only logged-in users can access the Edit action of the controller. What are two possible attributes that you can add to the Edit action to achieve this goal? ()A[Authorize(Users = )]B[Authorize(Roles = )]C[Authorize(Users = *)]D[Authorize(Roles = *)]
考题
单选题You are implementing an ASP.NET Web page. The page includes several controls, but only a GridView requires view state. You set the GridView… You need to ensure that the page will omit unneeded view state. Wich @ Page directive should you use?()A
% Page EnableViewState=”true” ViewStateMode=”Enabled” _ %B
% Page EnableViewState=”true” ViewStateMode=”Disabled” _ %C
% Page EnableViewState=”false” ViewStateMode=”Disabled” _ %D
% Page EnableViewState=”false” ViewStateMode=”Enabled” _ %
考题
单选题You are implementing an ASP.NET application. The application includes a Person class with property Age. You add a page in which you get a list of Person objects and display the objects in a GridView control. You need to add code so that the GridView row is highlighted in red if the age of the person is less than 18. Which GridView event should you handle?()A
RowDataBoundB
RowCommandC
RowUpdatedD
RowEditing
考题
单选题The Company LAN is becoming saturated with broadcasts and multicast traffic. What could you do to help a network with many multicasts and broadcasts?()A
Creating smaller broadcast domains by implementing VLANs.B
Separate nodes into different hubs.C
Creating larger broadcast domains by implementing VLANs.D
Separate nodes into different switches.E
All of the above.
考题
单选题How can you create a listener class that receives events when the mouse is moved?()A
By extending MouseListener.B
By implementing MouseListener.C
By extending MouseMotionListener.D
By implementing MouseMotionListener.E
Either by extending MouseMotionListener or extending MouseListener.F
Either by implementing MouseMotion Listener or implementing MouseListener.
考题
单选题You are implementing a very simple TCP/IP network. It rarely changes and you would like to use Oracle Connection Manager to filter client requests. Which naming method can you use?()A
Only hostB
Only localC
Either host or localD
Both host and local
考题
单选题You are designing a DNS implementing strategy to meet the business and technical requirement. Which type of zone should you use?()A
Sub ZonesB
Standard Primary ZonesC
Secondary ZonesD
Active DirectoryIntegrated Zones
考题
单选题You are designing a DNS implementing strategy to meet the business and technical requirement. Which type of zone should you use?()A
Sub ZonesB
Standard Primary ZonesC
Secondary ZonesD
Active DirectoryIntegrated Zones
考题
单选题You are developing a Windows Presentation Foundation (WPF) application. You are implementing a test strategy for the application. You need to ensure that the test class can repeat user input. From which base class should the test class inherit?()A
AutomationElementIdentifierB
AutomationPeerC
KeyboardD
UICues
考题
单选题You need to recommend an IP addressing strategy for the client computers in the new sales office. What should you recommend implementing in the new sales office?()A
DHCP server rolesB
the DirectAccess featureC
the Network Policy Server (NPS) role serviceD
the Remote Access Service role service