A company uses an application that creates temp files that need to be backed up on a daily basis. A test restore fails to restore the temp files. In checking the backup catalog, Karen, a technician, discovers that the temp files are not being backed up. Which of the following is the MOST likely reason?()
第1题:
A. It uses a Reliable transport mechanism.
B. It uses a Non-reliable transport mechanism
C. It is less bandwidth-intensive than connection oriented services
D. it uses handshaking
第2题:
You are a database administrator for your company. The company uses a vendor company’s application that is based on a proprietary database. You query data from the application database and import the data into a SQL Server 2005 database. The application vendor provides you with a new OLE DB driver to be used when querying the application database. Company policy prohibits connections between the SQL Server database and the application database, except when querying this data. You need to provide a way to query data from the application database. What should you?()
第3题:
Your company uses Microsoft Application Virtualization (App-V). You maintain the sequencing for applications. You need to add a template to an existing sequenced application. What should you do?()
第4题:
Your company has an internal Web application that uses a self-signed SSL certificate. The company has an internal certification authority (CA) with autoenrollment.When users attempt to start the Web application, Internet Explorer displays an error message that recommends closing the Web page rather than continuing to the application. You need to ensure that Internet Explorer does not display the error message. What should you do?()
第5题:
You work in a company which uses SQL Server 2008. You are the administrator of the company database. Now you are in charge of a SQL Server 2008 instance. There is a database named DB01 in the instance. The company CIO wants all the application developers can capture traces to troubleshoot the application that uses the database DB1, and they can perform this by using SQL Server Profiler. But they have to be given as little permission as possible. The company CIO assigns this task to you. So what action should you perform to achieve this goal?()
第6题:
Your network contains an Active Directory domain named contoso.com. The domain contains a server named Server1. The Active Directory Federation Services (AD FS) role is installed on Server1. Contoso.com is defined as an account store. A partner company has a Web-based application that uses AD FS authentication. The partner company plans to provide users from contoso.com access to the Web application. You need to configure AD FS on contoso.com to allow contoso.com users to be authenticated by the partner company. What should you create on Server1()
第7题:
java MainClass if run from the /apps directory
java com.company.application.MainClass if run from the /apps directory
java -classpath /apps com.company.application.MainClass if run from any directory
java -classpath . MainClass if run from the /apps/com/company/application directory
java -classpath /apps/com/company/application:. MainClass if run from the /apps directory
第8题:
Use RangeValidator.
Use RegularExpressionValidator
Use RequiredValidator
Use CompareValidator
Use RequiredFieldValidator
第9题:
You should install SQL Server 2008 as the default instance, and configure the new application to use the default instance
You should upgrade the SQL Server 2005 application to use SQL Server 2008
You should upgrade the SQL Server 2005 instance to a SQL Server 2008 instance
You should install SQL Server 2008 as a named instance, and make the new application use the new instance.
第10题:
Run the Dcpromo utility on the five member servers.
Run the Regsvr32 command on the five member servers
Run the Webadmin command on the five member servers
Run the RacAgent utility on the five member servers
第11题:
Install the application on all client computers by using Group Policy,and then use the Compatibility tab.
Install the Microsoft Enterprise Desktop Virtualization(MED-V) v2 package on each client computer.
Install the Microsoft Application Virtualization(App-V) client on each client computer,and stream the application byusing App-V.
Install the Microsoft Application Virtualization(App-V) client on each client computer,and run the application in offline mode.
第12题:
It uses a Reliable transport mechanism.
It uses a Non-reliable transport mechanism
It is less bandwidth-intensive than connection oriented services
it uses handshaking
第13题:
A brand new network application is required for the Acme Company, and they are considering the use of a connectionless service. What are the characteristics of a connectionless service?()
第14题:
You install a third-party application on your computer. The application uses port 80 to negotiate a listening port. After establishing the listening port, the application uses dynamic ports above 6000. You need to configure Microsoft Windows Firewall to allow traffic for the application. What should you do? ()
第15题:
You work in a company which uses SQL Server 2008. You are the administrator of the company database. Now you are in charge of a SQL Server 2008 instance. The instance has databases for a finance application and a manufacturing application. You want to put some limitation on the maximum CPU query time allowed by the applications, so you configure the Resource Governor to achieve this. But you notice that certain reports do not execute successfully any longer on the manufacturing application. You have to allow the manufacturing application to consume more CPU time, so you have to change the Resource Governor configuration. Which Resource Governor component should you configure?()
第16题:
Your company has 1,000 client computers that run Windows XP Professional x64. You are planning to deploy Windows 7 Enterprise x64. The company uses an application that is incompatible with Windows 7 Enterprise x64. You have the following requirements: Provide all users with access to the application. Deploy and manage the application by using a centralized solution. You need to design a solution that meets the requirements. What should you do?()
第17题:
Your company uses Microsoft Application Virtualization (App - V). You maintain the sequencing f or applications. You need to add a template to an existing sequenced application. What should you do?()
第18题:
Transfer Object
Service Locator
Intercepting Filter
Model-View-Controller
第19题:
You should install SQL Server 2008 as a named instance, and make the new application to use the new instance.
You should install SQL Server 2008 as the default instance, and make the new application to use the default instance.
You should upgrade the SQL Server 2005 application to use SQL Server 2008.
You should upgrade the SQL Server 2005 instance to a SQL Server 2008 instance.
第20题:
You should use Dynamic Management Views
You should use SQL Server Resource Governor
You should use SQL Server Profiler
You should use Windows System Monitor
第21题:
java MainClass if run from the /apps directory
java com.company.application.MainClass if run from the /apps directory
java -classpath /apps com.company.application.MainClass if run from any directory
java -classpath . MainClass if run from the /apps/com/company/application directory
java -classpath /apps/com/company/application:. MainClass if run from the /apps directory
java com.company.application.MainClass if run from the /apps/com/company/application directory
第22题:
Deploy version 2 of the application by using Microsoft Application Virtualization (App-V).
Deploy version 2 of the application as a Remote Desktop Services RemoteApp.
Deploy version 2 of the application by using a Group Policy Software Installation policy.
Deploy version 2 of the application by using a Microsoft System Center Configuration Manager package.
第23题:
The workload group which is used by default
The workload group which is used by the finance application
The classifier function which identifies the finance application
The workload group which is used by the manufacturing application