网友您好, 请在下方输入框内输入要搜索的题目:
题目内容
(请给出正确答案)
单选题
You want to create a role to meet these requirements: 1:The role is to be protected from unauthorized usage. 2:The password of the role is not to be embedded in the application source code or stored in a table. Which method would you use to restrict enabling of such roles()
A
Create the role with global authentication.
B
Create the role with external authentication.
C
Create the role as a secure application role.
D
Create the role as a password-protected role.
E
Create a role and use Fine-Grained Access Control (FGAC) to secure the role.
参考答案
参考解析
解析:
暂无解析
更多 “单选题You want to create a role to meet these requirements: 1:The role is to be protected from unauthorized usage. 2:The password of the role is not to be embedded in the application source code or stored in a table. Which method would you use to restrict enabling of such roles()A Create the role with global authentication.B Create the role with external authentication.C Create the role as a secure application role.D Create the role as a password-protected role.E Create a role and use Fine-Grained Access Control (FGAC) to secure the role.” 相关考题
考题
You need to perform these tasks:1. Create and assign a MANAGER role to Blake and Clark2. Grant CREATE TABLE and CREATE VIEW privileges to Blake and ClarkWhich set of SQL statements achieves the desired results? ()A. CREATE ROLE manager; GRANT create table, create view TO manager; GRANT manager TO BLACK, CLARK;B. CREATE ROLE manager; GRANT create table, create voew TO manager; GRANT manager ROLE TO BLACK, CLARK;C. GRANT manager ROLE TO BLACK, CLARK; GRANT create table, create voew TO BLACK CLARK; ***MISSING***
考题
You need to recommend changes to Web1 that meet the company’s application requirements for the WebApp2 deployment. What should you recommend?()A、Add a second IP address.B、Configure request filtering.C、Create separate application pools.D、Add worker processes to the DefaultAppPool.
考题
You have a server that runs Windows Server 2008 and has the Windows Server Virtualization (WSv) server role installed. You create a new virtual machine. You need to configure the virtual machine to meet the following requirements: Allow network communications between the virtual machine and the host system. Prevent communications with other network servers. What should you do first?()A、Install the Microsoft Loopback Adapter.B、Create a new Virtual Network Switch.C、Enable Internet Connection Sharing (ICS).D、Set the Connection to None for the network interface card.
考题
You are designing a DNS strategy to meet the business and technical requirements. Which two actions should you perform?()A、Create a dynamic reverse lookup zone for each subnet.B、Create a dynamic forward lookup for each domain.C、Install caching-only DNS servers in the branch offices.D、Enable the BIND secondaries option for each DNS server.
考题
You are designing a Windows Azure application. The application includes two web roles and three instances of a worker role. The web roles will send requests to the worker role through one or more Windows Azure Queues. You have the following requirements: - Ensure that each request is processed exactly one time. - Minimize the idle time of each worker role instance. - Maximize the reliability of request processing. You need to recommend a queue design for sending requests to the worker role. What should you recommend?()A、 Create a single queue. Send requests on the single queue.B、 Create a queue for each web role. Send requests on all queues at the same time.C、 Create a queue for each workerrole instance. Send requests on each worker queue in a round robin.D、 Create a queue for each combination of web roles and worker role instances. Send requests to all worker role instances based on the sending web role.
考题
You want to create a role to meet these requirements: 1:The role is to be protected from unauthorized usage. 2:The password of the role is not to be embedded in the application source code or stored in a table. Which method would you use to restrict enabling of such roles()A、Create the role with global authentication.B、Create the role with external authentication.C、Create the role as a secure application role.D、Create the role as a password-protected role.E、Create a role and use Fine-Grained Access Control (FGAC) to secure the role.
考题
You want to create a role to meet these requirements: 1. The role is to be protected from unauthorized usage. 2. The password of the role is not to be embedded in the application source code or stored in a table. method would you use to restrict enabling of such roles()A、Create the role with external authentication.B、Create the role as a secure application role.C、Create the role as a password-protected role.D、Create a role and use Fine-Grained Access Control (FGAC) to secure the role
考题
You need to perform these tasks: 1. Create and assign a MANAGER role to Blake and Clark 2. Grant CREATE TABLE and CREATE VIEW privileges to Blake and Clark Which set of SQL statements achieves the desired results?()A、CREATE ROLE manager; GRANT create table, create view TO manager; GRANT manager TO BLACK, CLARK;B、CREATE ROLE manager; GRANT create table, create voew TO manager; GRANT manager ROLE TO BLACK, CLARK;C、GRANT manager ROLE TO BLACK, CLARK; GRANT create table, create voew TO BLACK CLARK; ***MISSING***
考题
You are designing the placement of the PDC emulator role to meet the business and technical requirements. In which location should you place the PDC emulator role?()A、Los AngelesB、ParisC、SydneyD、LisbonE、Barcelona
考题
You have an Exchange Server 2010 organization. The organization contains two servers named Server1 and Server2. Server1 and Server2 have the Mailbox server role and the Hub Transport server role installed. Server 1 and Server2 are members of a database availability group (DAG). You need to plan the deployment of Client Access servers to meet the following requirements: .Users must be able to access their mailboxes if a single server fails .Users must not attempt to connect to a failed server What should you include in your plan?()A、On Server1 and Server2, install the Client Access server role. Implement failover clustering.B、On Server1 and Server2, install the Client Access server role. Configure network interface card (NIC) teaming on each server.C、Deploy two new Client Access servers. Implement load balancing by using DNS round robin.Create a Client Access server array.D、Deploy two new Client Access servers. Implement load balancing by using a Windows Network Load Balancing cluster. Create a Client Access server array.
考题
You are adatabase developer. You develop atask management application that connect stoa SQLServer 2008 database named TaskDB.Users logon to the application by using a SQLServer login. The application contains amodule named Task that assigns tasks tousers. Information about the setasks is stored in the Tasks table of the TaskDB data base. The Tasks table contains multiple columns. These include the Close Dateand Estimated Timecolumns. The application must meet the following security requirements: Users assigned toad atabase role named User 1 canupd ate all task information columns except the Close Date and the Estimated Time columns in the Tasks table. Administrative users assigned toad atabase role named Task_Admin canupd ateall task information in the Tasks table.You needto design a strategy to meet the security requirements. Which two actions should you perform?()A、Add the Task_Admin role to thedb_accessadmin fixed database role.B、Grant Update permissions on the Tasks table to the Task_Admin role.C、Grant Update permissions on the Tasks table to the User 1 role foreach column except the Close Dateand Estimated Time columns.D、Createan INSTEAD OF trigger on the Tasks Table. Use theIs_Member function toprevent the User 1 role from updating the Close Date and Estimated Time columns.
考题
You need to recommend a solution for managing all of the servers. The solution must meet the company’s technical requirements.What should you include in the recommendation?()A、Remote Server Administration Tools (RSAT)B、the Administration Tools Pack (adminpak.msi)C、the Remote Desktop Gateway (RD Gateway) role serviceD、the Remote Desktop Web Access (RD Web Access) role service
考题
You need to meet the fraud detection requirements. What should you do?()A、Use Percentage Sampling in SSIS.B、Use a Neural Network Data mining algorithm.C、Create an SSAS Key Performance Indicator for each account.D、Monitor transactions by using SQL Server Profiler.
考题
单选题You need to perform these tasks: 1. Create and assign a MANAGER role to Blake and Clark 2. Grant CREATE TABLE and CREATE VIEW privileges to Blake and Clark Which set of SQL statements achieves the desired results? ()A
CREATE ROLE manager; GRANT create table, create view TO manager; GRANT manager TO BLACK, CLARK;B
CREATE ROLE manager; GRANT create table, create voew TO manager; GRANT manager ROLE TO BLACK, CLARK;C
GRANT manager ROLE TO BLACK, CLARK; GRANT create table, create voew TO BLACK CLARK; ***MISSING***
考题
单选题You want to create a role to meet these requirements: 1. The role is to be protected from unauthorized usage. 2. The password of the role is not to be embedded in the application source code or stored in a table. method would you use to restrict enabling of such roles()A
Create the role with external authentication.B
Create the role as a secure application role.C
Create the role as a password-protected role.D
Create a role and use Fine-Grained Access Control (FGAC) to secure the role
考题
单选题You are designing the placement of the PDC emulator role to meet the business and technical requirements. In which location should you place the PDC emulator role?()A
Los AngelesB
ParisC
SydneyD
LisbonE
Barcelona
考题
单选题You are designing the placement of the PDC emulator role to meet the business and technical requirements. In which location should you place the PDC emulator role?()A
Los AngelesB
ParisC
SydneyD
LisbonE
Barcelona
考题
单选题You need to perform these tasks: 1. Create and assign a MANAGER role to Blake and Clark 2. Grant CREATE TABLE and CREATE VIEW privileges to Blake and Clark Which set of SQL statements achieves the desired results?()A
CREATE ROLE manager; GRANT create table, create view TO manager; GRANT manager TO BLACK, CLARK;B
CREATE ROLE manager; GRANT create table, create voew TO manager; GRANT manager ROLE TO BLACK, CLARK;C
GRANT manager ROLE TO BLACK, CLARK; GRANT create table, create voew TO BLACK CLARK; ***MISSING***
考题
单选题You have a server that runs Windows Server 2008 and has the Windows Server Virtualization (WSv) server role installed. You create a new virtual machine. You need to configure the virtual machine to meet the following requirements: Allow network communications between the virtual machine and the host system. Prevent communications with other network servers. What should you do first?()A
Install the Microsoft Loopback Adapter.B
Create a new Virtual Network Switch.C
Enable Internet Connection Sharing (ICS).D
Set the Connection to None for the network interface card.
考题
单选题You want to create a role to meet these requirements: 1. The role is to be protected from unauthorized usage. 2. The password of the role is not to be embedded in the application source code or stored in a table. method would you use to restrict enabling of such roles()A
Create the role with external authentication.B
Create the role as a secure application role.C
Create the role as a password-protected role.D
Create a role and use Fine-Grained Access Control (FGAC) to secure the role
考题
单选题You are designing a forest structure to meet the business and technical requirements. How many forests should you create?()A
OneB
TwoC
ThreeD
Four
考题
单选题You are designing a forest structure to meet the business and technical requirements. How many forests should you create?()A
OneB
TwoC
ThreeD
Four
考题
单选题You need to recommend a solution for managing all of the servers. The solution must meet the company’s technical requirements.What should you include in the recommendation?()A
Remote Server Administration Tools (RSAT)B
the Administration Tools Pack (adminpak.msi)C
the Remote Desktop Gateway (RD Gateway) role serviceD
the Remote Desktop Web Access (RD Web Access) role service
考题
单选题You create Windows Forms applications by using the .NET Framework 3.5.You plan to deploy a new Windows Presentation Foundation (WPF) XAML browser application (XBAP).The deployment must meet the following requirements: (1)shortcut is added to the Start menu (2)The most recent version of the application is installed and executed on client computers (3)Users can uninstall the application from the control panel You need to identify a deployment technology that meets the specified requirements.You want to achieve this goal by using the minimum amount of development effort. Which deployment technology should you use?()A
XCOPYB
ClickOnceC
MicrosoftWindows InstallerD
Remote Desktop connections
考题
单选题You have an Exchange Server 2010 organization. Your companys compliance policy states that the following occurs when a user leaves the company:.The user account is disabled .The user account and mailbox are deleted after six months .All e-mail messages in the mailbox are retained for three years You need to recommend a solution to retain the e-mail messages of users who leave the company.The solution must meet the following requirements: .Ensure that a group named Group1 can manage the process .Minimize disk space required to store the mailbox databases What should you recommend?()A
Assign the Mailbox Search management role to Group1, and then create a retention policy.B
Assign the Mailbox Search management role to Group1, and then create a managed folder mailbox policy.C
Assign the Mailbox Import Export management role to Group1, and then configure Personal Archivesfor each mailbox.D
Assign the Mailbox Import Export management role to Group1, and then instruct Group1 to export mailboxes to personal folder (.pst) files.
考题
单选题You need to recommend an administrative solution for the local support technicians in the satellite offices. The solution must meet the companys security requirements.What should you include in the recommendation?()A
Active Directory delegationB
Administrator Role SeparationC
managed service accountsD
Restricted Groups
考题
单选题You are the Exchange administrator of the Xxx Corporation’s Exchange 2010 organization.You create a public folder named PublicFolder1 on a Mailbox server named MBX55 to enable users to post messages.You want your assistant, Josh, to configure PublicFolder1 to replicate with the Mailbox servers in other offices.To achieve this, you want Josh to run the Set-PublicFolder cmdlet to configure the replication schedule.You must delegate appropriate permissions to Josh to enable him to run the Set-PublicFolder cmdlet.What should you do?()A
Add Josh to the local Server Operators group.B
Delegate the Exchange Recipient Administrators role to Josh.C
Delegate the Exchange Public Folder Administrators role to Josh.D
Delegate the Exchange View-Only Administrators role to Josh.
热门标签
最新试卷