You create a new pluggable database, HR_PDB, from the seed database. Which three tablespaces arecreated by default in HR_PDB?()
第1题:
You work as the enterprise exchange administrator at Company.com.The Company.com network consists of a single Active Directory domain named Company.com.Company.com has an Exchange Server 2010 organization.Due to company growth Company.com, has acquired an accepted domain named courseware.com.The employees of both domains are configured with internal and external Out Of Office messages.You have received instructions to make sure that the internal Out Of Office messages are sent to senders from the courseware.com. What should you do?()
第2题:
You are creating a Windows Forms Application by using the .NET Framework 3.5.You plan to design a new control that will be used on multiple forms in the app.You need to ensure that the control meets the following requirement (1)It retrieves data from a MSSQL Server 2008 database instance. (2)It uses WPF classes to display data. (3)It uses user-customizable actions when the control is first painted on the form. What should you do?()
第3题:
You have two servers that run Windows Server 2008 named Server1 and Server2. You install Windows SharePoint Services (WSS) 3.0 on Server1. You install the SMTP feature on Server2. You configure the outgoing e-mail settings on Server1 to use the SMTP service on Server2. You need to ensure that e-mail messages from Server1 are forwarded to users. What should you do?()
第4题:
You have an Exchange Server 2010 organization.You need to use Role Based Access Control (RBAC) to provide a user the ability to manage recipients in a specific organizational unit (OU). What should you do first?()
第5题:
You have a computer that runs Windows 7. You install a second internal hard disk drive in the computer.You attempt to create a system image and discover that the new disk is not listed as a backup destination.You need to ensure that you can use the new disk as a backup destination for system images. What should you do?()
第6题:
You are building a test environment to evaluate DNS Security Extensions (DNSSEC). You have a domain controller named Server1 that runs Windows Server 2008 R2 in your test environment. Server1 has the DNS Server server role installed. You need to configure Server1 to support the DNSSEC evaluation. Which two actions should you perform?()
第7题:
You need to design a domain model that meets the company business and security requirements for controlling access to the new Web-based ordering application. What should you do?()
第8题:
You need to recommend a solution that meets the company’s application provsioning requirements. What should you recommend?()
第9题:
You have an Exchange Server 2010 organization. You attempt to create a new address list based on each userˉs country attribute You discover that the country attribute is unavailable in the New Address List wizard. You need to create a new address list based on user's country What should you do()?
第10题:
From Disk Management, convert the new disk to a dynamic disk.
From System Properties, configure the System Protection settings.
From System and Security, enable BitLocker Drive Encryption (BitLocker).
From the properties of the new drive, create a share and modify the caching settings.
第11题:
The CDB must be open.
The CDB must be in the mount stage.
The CDB must be in the nomount stage.
Alt existing PDBs must be closed.
第12题:
Use the introspect () command in WLST to gather the configuration information from the original domain.
Use pack/unpack to transfer the domain from one machine to another.
Create a domain template from the original domain using the Domain Template Builder and use the Configuration Wizard to create a new domain from the template.
Use the Admin Console of the original domain to create a domain template from the original domain and use the Configuration Wizard to create a new domain from the template.
第13题:
You completed the development of a new application and want to create a new domain in a new environment for functional testing. You want to have the same settings for your new domain as your old domain, with the option of changing the configuration in the new target environment. Which two actions should you execute?()
第14题:
Your network consists of a single Active Directory domain named contoso.com. All servers run Windows Server 2003 Service Pack 2 (SP2).You plan to deploy a new DNS zone named adatum.com. You need to ensure that only computers in the contoso.com domain can update host records in the new DNS zone. What should you do?()
第15题:
You need to design an audit strategy for Southbridge Video. Your solution must meet business requirements.What should you do?()
第16题:
You create a server control that inherits from WebControl. You need to enable the server control to emit markup for a new kind of mobile device. You must not alter the code in the server controls. Which two actions should you perform?()
第17题:
You are designing an Active Directory implementation strategy to present to executives from your company and from Contoso, Ltd. Which implementation strategy should you use?()
第18题:
You create Windows Forms applications by using the .NET Framework 3.5.You plan to deploy a new application by using the ClickOnce deployment technology. The application is signed by using a certificate obtained from a trustworthy authority. You need to ensure that the application can be deployed as a trusted application to Windows Vista client computers on a corporate network.What should you do?()
第19题:
You have a computer that runs Windows 7. Windows Backup is configured to store backups on an externaldrive. You create a new NTFS volume on the computer. You need to configure Windows Backup to includethe files on the new volume as part of regularly scheduled backups. What should you do?()
第20题:
You create a server control that inherits from WebControl. You need to enable the server control to emit markup for a new kind of mobile device. You must not alter the code in the server controls.()
第21题:
You are developing an application to create a new file on the local file system.You need to define specific security settings for the file. You must deny the file inheritance of any default security settings during creation.What should you do?()
第22题:
SYSTEM
SYSAUX
EXAMPLE
UNDO
TEMP
USERS
第23题:
create a hash cluster to store the data
create an index cluster to store the data
create a partitioned table to store the data
create a sorted hash cluster to store the data
create a heap table with rowid to store the data