网友您好, 请在下方输入框内输入要搜索的题目:

题目内容 (请给出正确答案)

Certkiller .com has a server named Certkiller -SR05 that has numerous processors installed.You have been given the task of developing an application that displays certain clock speed statisticson all processors installed on Certkiller -SR05.You need to ensure that this requirement is fully satisfied.What should you do?()

A.

B.

C.

D.


参考答案

更多 “ Certkiller .com has a server named Certkiller -SR05 that has numerous processors installed.You have been given the task of developing an application that displays certain clock speed statisticson all processors installed on Certkiller -SR05.You need to ensure that this requirement is fully satisfied.What should you do?()A.B.C.D. ” 相关考题
考题 Certkiller .com has a file server named Certkiller -SR07 that stores old inventory files. Certkiller .com has given you the task of creating an application to archive these old inventory files.The inventory files have to be compressed prior to being uploaded to Certkiller .com‘s Web server.You are currently writing a method that will receive a byte array and compress it into a new file.You need to ensure that a data corruption check takes place during the decompression process.What should you do?()A.B.C.D.

考题 You work as an application developer at Certkiller .com. You are currently in the process of creating a new application for Certkiller .com. You are required to read compressed data files that has been sent by Certkiller .com‘s sales offices.These data files are less than 4 GB in size, but was compressed without cyclic redundancy. You want to write a method that receives the compressed files and return the uncompressed data as a byte array.What should you do?()A.B.C.D.

考题 Certkiller .com has asked you to create a file management application to monitor the hosts file.Certkiller .com has instructed you to change the hosts file if it has been changed.You, therefore, need to display the size and whether the hosts file is set to read-only.What should you do?()A.B.C.D.

考题 Certkiller .com has asked you to develop an application that displays the properties for all Certkiller.com‘s network drives.The information generated by this application will be utilized by Certkiller .com‘s network administrators to verify client setups.You need to ensure that these requirements are fully satisfied.What should you do?()A.B.C.D.

考题 You have recently completely creating a new application for Certkiller .com.This new application has to load an instance of the Inventory class from a large file named Inventory.dat.You need to ensure that the application executes the loading process in as little time as possible.What should you do?()A.B.C.D.

考题 You work as an administrator at ABC.com. The ABC.com network consists of a single domain named ABC.com. All servers on the ABC.com network have Windows Server 2012 R2 installed. ABC.com has a server, named ABC-SR07, which has the ADDS, DHCP, and DNS server roles installed. ABC.com also has a server, named ABC-SR08, which has the DHCP, and Remote Access server rolesinstalled. You have configured a server, which has the File and Storage Services server role installed, to automatically acquire an IP address. The server is named ABCSR09.You then create reservation on ABC-SR07, and a filter on ABC-SR08.  Which of the following is a reason for this configuration?()A、It allows ABC-SR09 to acquire a constant IP address from ABC-SR08 only.B、It configures ABC-SR09 with a static IP address.C、It allows ABC-SR09 to acquire a constant IP address from ABC-SR07 and ABC-SR08.D、It allows ABC-SR09 to acquire a constant IP address from ABC-SR07 only.

考题 You work as an application developer at Certkiller .com. Certkiller .com has been hired by a small local private school to develop a class library that will be used in an application named ManageAttendance for the purpose of managing student records.You are responsible for developing this class library. Certkiller .com has instructed you to create a collection in the application to store learners’ results. The school has informed you that they currently only have seven learners, but that this value will triple in the following year. Due to the limited resources, you need to ensure that the collection you create consumes a minimum amount of resources. What should you use to create the collection?()A、 The HybridDictionary collection class.B、 The HashTable collection class.C、 The ListDictionary collection class.D、 The StringCollection collection class.

考题 You work as an application developer at Certkiller .com. Certkiller .com has asked you to develop an application that monitors and controls the activities of a Windows service.You need to use the appropriate class to meet Certkiller .com’s requirements. What should you do?()A、 Use the ServiceBase class.B、 Use the ServiceInstaller class.C、 Use the ServiceManager class.D、 Use the ServiceController class.

考题 Certkiller.com has employed you as a system administrator. You are in the process of creating anASP.NET application using Microsoft.NET Framework v3.5. This application will be hosted on aserver named CERTKILLER-SR01. CERTKILLER-SR01 is configured to run Microsoft IIS 5.0.  You are assigned a computer named CERTKILLER-WS02. You make use of CERTKILLER-WS02to log on to the companies domain with an account named CKUser. CERTKILLER-SR01 andCERTKILLER-WS02 are both members of the Certkiller.com domain. To ensure productivity youneed to establish the necessary permissions to allow remote debugging.  What should you do?()A、Your best option would be to ensure that the Remote Debugging Monitor is set to make use of Windows Authentication.B、Your best option would be to ensure that the CKUser account is added to the domainAdministrators group.C、Your best option would be to ensure that the ASP.NET worker process is changed onCERTKILLER-SR01 to run as the local Administrator account.D、Your best option would be to ensure that the CKUser account is added to the localAdministrators group on CERTKILLER-SR01.

考题 You work as the enterprise exchange administrator at Company.com.The Company.com network consists of a single Active Directory domain named Company.com.Company.com has an Exchange Server 2010 organization.Company.com contains three servers named -sr11, -sr12 and -sr13.these servers are configured as follows:-sr11 has the front-end role installed and is running exchange server 2003 service pack 2.-sr12 has the back-end role installed and is running exchange server 2003 service pack 2.-sr13 has the client access role and the mailbox role installed and is running exchange server 2010.you have received instructions from the cio to move the mailboxes from -sr12 to -sr13.however, you need to make sure thag the users can use the e-mail facilities.What should you do?()A、You should consider installing the Exchange Server 2010 Edge Transport server role.B、You should consider removing the Exchange Server 2003 servers.C、You should consider installing a new Exchange Server 2010 Client Access server and remove the Exchange Server 2003 front-end server.D、You should consider installing the Exchange Server 2010 Hub Transport server role.

考题 You work as an administrator at ENSUREPASS.com. The ENSUREPASS.com network consists of  a single domain named ENSUREPASS.com. All servers on the ENSUREPASS.com network have  Windows Server 2012 installed. ENSUREPASS.com has a server, named ENSUREPASS-SR07, which has the AD DS, DHCP, and DNS server roles installed. ENSUREPASS.com also has a server, named ENSUREPASS-SR08, which has the DHCP, and Remote Access server roles installed. You have configured a server, which has the File and Storage Services server role installed, to automatically acquire an IP address. The server is named ENSUREPASSSR09. You then create a filter on ENSUREPASS-SR07.  Which of the following is a reason for this configuration?()A、To make sure that ENSUREPASS-SR07 issues ENSUREPASS-SR09 an IP addressB、To make sure that ENSUREPASS-SR07 does not issue ENSUREPASS-SR09 an IP addressC、To make sure that ENSUREPASS-SR09 acquires a constant IP address from ENSUREPASS-SR08 onlyD、To make sure that ENSUREPASS-SR09 is configured with a static IP address

考题 Certkiller .com has a main office and a branch office. Certkiller .com’s network consists of a single Active Directory forest. Some of the servers in the network run Windows Server 2008 and the rest run Windows server 2003.  You are the administrator at Certkiller .com. You have installed Active Directory Domain Services (AD DS) on a computer that runs Windows Server 2008. The branch office is located in a physically insecure place. It has not IT personnel onsite and there are no administrators over there. You need to setup a Read-Only Domain Controller (RODC) on the Server Core installation computer in the branch office. What should you do to setup RODC on the computer in branch office()A、Execute an attended installation of AD DSB、Execute an unattended installation of AD DSC、Execute RODC through AD DSD、Execute AD DS by using deploying the image of AD DSE、none of the above

考题 You work as a Web Developer at Certkiller.com. You are in the process of creating a Webapplication using Microsoft ASP.NET 3.5.  The configuration below exists in the Web.config file:           Certkiller.com hosts the Web application in Microsoft Internet Information Services (IIS) 6.0. TheIntegrated Windows Authentication is enabled in IIS and anonymous access disabled. The application pool is configured to run as the identity Certkiller/WebApp. The IIS anonymous accountis Certkiller/Anonymous.  The following code exists in the code-behind file for a web form:  stringname = WindowsIdentity.GetCurrent().Name;  Response.Write(name); A Certkiller.com employee named RoryAllen has a domain user account named Certkiller/RAllen.He uses this account to access the page. However, Rory Allen logs in to the Web application withthe user name FormsUser. You need to determine the output of this code when Rory Allenaccesses the page. What will the output of this code be?()A、The output will be FormsUser.B、The output will be Certkiller/RAllen.C、The output will be Certkiller/Anonymous.D、The output will be Certkiller/WebApp

考题 Certkiller.com has an active directory forest on a single domain.  Certkiller needs a distributed application that employs a custom application. The application is directory partition software named PARDAT. You need to implement this application for data replication.  Which two tools should you use to achieve this task()A、Dnscmd.B、Ntdsutil.C、IpconfigD、DnsutilE、All of the above

考题 You recently developed a Web application that accesses an external Web service to retrieve current exchange rates for Certkiller .com's e-Commerce Web site. The Web service converts USD prices to the customer's local currency. You have stored the URL to the external Web service's endpoint in the section of the Web.config file. The Web application has been successfully deployed to a Certkiller .com Web server named Certkiller -SR14. A few months later the vendor of the Web service changes the port that is used to access the Web service. You need to update the section of the Web application's Web.config file from Certkiller -WS528. You need to ensure that your solution has a minimal impact on customers that may be connected to the e-Commerce Web site. What should you do?()A、Create a Host entry in the Lmhosts file on Certkiller -SR14. Point the Host entry to the new end point.B、Use the Copy Web Site function in Visual Studio 2005 to deploy the Web.config file from Certkiller -WS528 to Certkiller -SR14.C、Create a Web Setup project in Visual Studio 2005 to deploy the Web.config file from Certkiller -WS528 to Certkiller -SR14.D、Use the Web Site Administration Tool to change the appSettings section of the Web.config file.

考题 The corporate network of Certkiller consists of a Windows Server 2008 single Active Directory domain. The domain has two servers named Certkiller 1 and Certkiller 2.  To ensure central monitoring of events you decided to collect all the events on one server, Certkiller 1. To collect events from Certkiller  2. and transfer them to Certkiller 1, you configured the required event subscriptions.  You selected the Normal option for the Event delivery optimization setting by using the HTTP protocol. However, you discovered that none of the subscriptions work.  Which of the following actions would you perform to configure the event collection and event forwarding on the two servers()A、Through Run window execute the winrm quickconfig command on Certkiller 2.B、Through Run window execute the wecutil qc command on Certkiller 2.C、Add the Certkiller 1 account to the Administrators group on Certkiller 2.D、Through Run window execute the winrm quickconfig command on Certkiller 1.E、Add the Certkiller 2 account to the Administrators group on Certkiller 1.F、Through Run window execute the wecutil qc command on Certkiller 1.

考题 Certkiller.COM有一个单一的Active Directory域命名的广告。 Certkiller.COM。 Windows Server 2008的所有域控制器上安装。域功能级别和林功能级别设置为Windows 2000本机模式。您必须确保为Certkiller UPN后缀.COM用户帐户。首先你应该怎么做来实现这一任务呢()A、更改默认域控制器组策略对象(GPO)Certkiller.COM的主DNS后缀选项。B、添加新的UPN后缀到林。C、提高Certkiller.com域的功能级别到Windows Server 2003或Windows Server 2008。D、提高Certkiller.COM森林功能级别到Windows Server 2003或Windows Server 2008。

考题 You work as an administrator at ABC.com. The ABC.com network consists of a single domain named ABC.com.ABC.com has a Windows Server 2012 R2domain controller, named ABC-DC01, which has the Domain Naming master and the Schema master roles installed. ABC.com also has a Windows Server 2008 R2 domain controller, named ABC-DC02, which has the PDC Emulator, RID master, and Infrastructure master roles installed.You have deployed a new Windows Server 2012 R2 server, which belongs to a workgroup, in ABC.com’s perimeter network. You then executed the djoin.exe command. Which of the following is the purpose of the djoin.exe command?()A、It sets up a computer account in a domain and requests an offline domain join when a computer restarts.B、It sets up a user account in a domain and requests an online domain join when a computer restarts.C、It sets up a computer account in a domain and requests an offline domain join immediately.D、It sets up a computer account in a domain and requests an online domain join immediately.

考题 单选题You work as an administrator at ABC.com. The ABC.com network consists of a single domain named ABC.com.All servers on the ABC.com network have Windows Server 2012 R2 installed. ABC.com has a server, named ABC-SR07, which has the AD DS, DHCP, and DNS server roles installed.ABC.com also has a server, named ABC-SR08, which has the DHCP, and Remote Access server roles installed.You have configured a server, which has the File and Storage Services server role installed, to automatically acquire an IP address. The server is named ABCSR09. You then create a filter on ABC-SR07.  Which of the following is a reason for this configuration?()A To make sure that ABC-SR07 issues ABC-SR09 an IP address.B To make sure that ABC-SR07 does not issue ABC-SR09 an IP address.C To make sure that ABC-SR09 acquires a constant IP address from ABC-SR08 only.D To make sure that ABC-SR09 is configured with a static IP address.

考题 单选题Certkiller .com has a domain controller that runs Windows Server 2008. The Certkiller .com network boosts 40 Windows Vista client machines. As an administrator at Certkiller .com, you want to deploy Active Directory Certificate service (AD CS) to authorize the network users by issuing digital certificates.  What should you do to manage certificate settings on all machines in a domain from one main location()A Configure Enterprise CA certificate settingsB Configure Enterprise trust certificate settingsC Configure Advance CA certificate settingsD Configure Group Policy certificate settingsE All of the above

考题 多选题Certkiller .com has a software evaluation lab. There is a server in the evaluation lab named as CKT. CKT runs Windows Server 2008 and Microsoft Virtual Server 2005 R2. CKT has 200 virtual servers running on an isolated virtual segment to evaluate software. To connect to the internet, it uses physical network interface card.  Certkiller .com requires every server in the company to access Internet.  Certkiller .com security policy dictates that the IP address space used by software evaluation lab must not be used by other networks. Similarly, it states the IP address space used by other networks should not be used by the evaluation lab network. As an administrator you find you that the applications tested in the software evaluation lab need to access normal network to connect to the vendors update servers on the internet. You need to configure all virtual servers on the CKT server to access the internet. You also need to comply with company’s security policy.  Which two actions should you perform to achieve this task()ATrigger the Virtual DHCP server for the external virtual network and run  ipconfig/renew command on each virtual serverBOn CKT’s physical network interface, activate the Internet Connection Sharing (ICS)CUse Certkiller .com intranet IP addresses on all virtual servers on CKT.DAdd and install a Microsoft Loopback Adapter network interface on CKT. Use a new network interface and create a new virtual network.ENone of the above

考题 多选题You work as an administrator at ABC.com. The ABC.com network consists of a single domain named ABC.com. ABC.com has a server, named ABC-SR15, which has Windows Server 2012 R2 installed. ABC.com also has a server, named ABC-SR16, which has Windows Server 2008 R2 SP1 installed.  You have been instructed to make sure that ABC-SR16 is able to run Windows PowerShell 3.0.  Which of the following actions should you take?()AYou should consider making sure that ABC-SR16 has a full installation of Microsoft .NET Framework 4 installed.BYou should consider making sure that ABC-SR16 has a full installation of Microsoft .NET Framework 2 installed.CYou should consider making sure that ABC-SR16 has WS-Management 3.0 installed.DYou should consider making sure that ABC-SR16 is upgraded to Windows Server 2012 R2.

考题 多选题Certkiller.com has an active directory forest on a single domain.  Certkiller needs a distributed application that employs a custom application. The application is directory partition software named PARDAT. You need to implement this application for data replication.  Which two tools should you use to achieve this task()ADnscmd.BNtdsutil.CIpconfigDDnsutilEAll of the above

考题 单选题Certkiller.com has a server with Active Directory Rights Management Services (AD RMS) server installed. Users have computers with Windows Vista installed on them with an Active Directory domain installed at Windows Server 2003 functional level. As an administrator at Certkiller.com, you discover that the users are unable to benefit from AD RMS to protect their documents. You need to configure AD RMS to enable users to use it and protect their documents. What should you do to achieve this functionality()A Configure an email account in Active Directory Domain Services (AD DS) for each user.B Add and configure ADRMSADMIN account in local administrators group on the user computersC Add and configure the ADRMSSRVC account in AD RMS server’s local administrator groupD Reinstall the Active Directory domain on user computersE All of the above

考题 单选题You work as an application developer at Certkiller .com. Certkiller .com has asked you to develop an application that monitors and controls the activities of a Windows service.You need to use the appropriate class to meet Certkiller .com’s requirements. What should you do?()A  Use the ServiceBase class.B  Use the ServiceInstaller class.C  Use the ServiceManager class.D  Use the ServiceController class.

考题 单选题Certkiller .com has a network that is comprise of a single Active Directory Domain.  As an administrator at Certkiller .com, you install Active Directory Lightweight Directory Services (AD LDS) on a server that runs Windows Server 2008. To enable Secure Sockets Layer (SSL) based connections to the AD LDS server, you install certificates from a trusted Certification Authority (CA) on the AD LDS server and client computers.  Which tool should you use to test the certificate with AD LDS()A Ldp.exeB Active Directory Domain servicesC ntdsutil.exeD Lds.exeE wsamain.exeF None of the above

考题 单选题You work as a Web Developer at Certkiller.com. You are in the process of creating a Webapplication using Microsoft ASP.NET 3.5.  The configuration below exists in the Web.config file:           Certkiller.com hosts the Web application in Microsoft Internet Information Services (IIS) 6.0. TheIntegrated Windows Authentication is enabled in IIS and anonymous access disabled. The application pool is configured to run as the identity Certkiller/WebApp. The IIS anonymous accountis Certkiller/Anonymous.  The following code exists in the code-behind file for a web form:  stringname = WindowsIdentity.GetCurrent().Name;  Response.Write(name); A Certkiller.com employee named RoryAllen has a domain user account named Certkiller/RAllen.He uses this account to access the page. However, Rory Allen logs in to the Web application withthe user name FormsUser. You need to determine the output of this code when Rory Allenaccesses the page. What will the output of this code be?()A The output will be FormsUser.B The output will be Certkiller/RAllen.C The output will be Certkiller/Anonymous.D The output will be Certkiller/WebApp