网友您好, 请在下方输入框内输入要搜索的题目:

题目内容 (请给出正确答案)
单选题
An on-premise application is exposed to external users through a Windows Communication Framework (WCF) service endpoint registered in the Windows Azure AppFabric Service Bus.  You need to recommend an approach for providing transport-level security that maximizes performance and minimizes bandwidth requirements.  What should you recommend?()
A

 Use reliable messaging.  Use HTTP for message delivery.

B

 Use binary message encoding.  Use TCP for message delivery.

C

 Use Plain Old XML (POX) messages.  Use TCP for message delivery.

D

 Use Message Transmission Optimization Mechanism (MTOM) message encoding. Use HTTPS formessage delivery


参考答案

参考解析
解析: 暂无解析
更多 “单选题An on-premise application is exposed to external users through a Windows Communication Framework (WCF) service endpoint registered in the Windows Azure AppFabric Service Bus.  You need to recommend an approach for providing transport-level security that maximizes performance and minimizes bandwidth requirements.  What should you recommend?()A  Use reliable messaging.  Use HTTP for message delivery.B  Use binary message encoding.  Use TCP for message delivery.C  Use Plain Old XML (POX) messages.  Use TCP for message delivery.D  Use Message Transmission Optimization Mechanism (MTOM) message encoding. Use HTTPS formessage delivery” 相关考题
考题 The following are examples of external users of accounting information except:() A、governmentB、customersC、creditorsD、all of the above

考题 A user works daily with video production and needs portable storage which will allow them to transport their work back and forth from home. Taking the users storage and bandwidth requirements into consideration, which of the following would BEST suit the users needs?()A、An external hard drive connected via eSATAB、An external hard drive connected via USB 2.0C、An external hard drive connected via serialD、A thumb drive connected via USB 2.0

考题 In one of your online transaction processing (OLTP) applications, most users frequently modify the values, including the key values, of the application tables. Some users generate application reports by using multiple application tables.  What is the best table structure that you can use to gain optimal performance?()A、heap tableB、object tableC、external tableD、clustered tableE、global temporary tableF、index­organized table (IOT)

考题 A customer has a WebTrade application that initially uses the embedded LDAP to authenticate users. To enhance security, the customer decides to use OAM to authenticate some of the users against an external LDAP store. For this to work, a customer configured an OAMAuthenticator, but was not sure what to select for the Control Flag. What Control Flag should the customer choose?() A、OPTIONALB、REQUISITEC、REQUIREDD、SUFFICIENTE、MANDATORY

考题 In one of your online transaction processing (OLTP) applications, most users frequently modify the values, including the key values, of the application tables. Some users generate application reports by using multiple application tables.  What is the best table structure that you can use to gain optimal performance?()A、heap tableB、object tableC、external tableD、clustered tableE、global temporary tableF、index-organized table (IOT)

考题 Identify architecturally where in an application, Coherence stack will be used ()A、 coherence resides locally on the machines of all remote application usersB、 coherence resides between remote users and the Web tierC、 coherence resides between the Web tier and application tierD、 coherence resides between the application tier and data tier

考题 You need to design a permission structure for registry objects that enables the legacy application at the resorts to run. Your solution must comply with the written security policy.  What should you do?()A、Create a GPO. Link the GPO to the OUs that contain computer accounts for computers that run the legacy application, Use the GPO to give the Domain Users security group full control on the partitions of the registry that the legacy application usesB、Create a GPO. Link the GPO to the OUs that contain computer accounts for computers that run the legacy application. Use the GPO to give the Domain Users security group full control on the HKEY_USERS partition of the registryC、Create a GPO. Link the GPO to the OUs that contain computer accounts for computers that run the Legacy application. Use the GPO to make all users who require access to the application members of Local Administrators group on each computerD、Create a GPO. Link the GPO to the OUs that contain computer accounts for computers that run the Legacy application. Use the GPO to give all users who require access to the application full control for the Ntuser.dat file

考题 An on-premise .NET application uses an on-premise Microsoft SQL Server 2008 database.  The existing compute infrastructure is insufficient to support peak loads.   You plan to move only the compute-intensive component of the application into Windows Azure.  The component requires access to the on-premise database.   The on-premise database cannot be accessed from outside the network boundary.  You need to recommend a database topology.  What should you recommend?()A、 Use SQL Azure for the on-premise components and the compute-intensive component.B、 Configure merge replication with the on-premise database as publisher and the SQL Azure database as subscriber.C、 Configure snapshot replication with the on-premise database as publisher and the SQL Azure database assubscriber.D、 Configure snapshot replication with the SQL Azuredatabase as publisher and the on-premise database as subscriber.

考题 You are designing a Windows Azure application that will communicate with existing on-premise applications and services.  The application will be activated for Windows Azure Connect.  You need to recommend a solution for completing the Windows Azure Connect configuration.  Which two actions should you recommend?()A、 Place local endpoints in groups and then configure a connection between the groups and the application.B、 Place hosted endpoints in groups and then configure a connection between the groups and the application.C、 Install endpoint software on local computers or virtual machines.D、 Install endpoint software on hosted virtual machines.

考题 Multiple Windows Azure applications connect to multiple SQL Azure servers.  On-premise users connect to the SQL Azure servers for a variety of purposes.   You successfully deploy a new Windows Azure application with its own SQL Azure server.  When on- premise users attempt to connect to the new SQL Azure server they receive connection errors.   You need to recommend an approach for mitigating the connectivity issue.  What should you recommend? ()A、 Open port 1433 on the network firewall.B、 Use Security Support Provider Interface (SSPI).C、 Disable the validation of the SSL certificate for the SQL Azure server through theconnection string.D、 Change the firewall rules of the new SQL Azure server to allow access by computers on the internalnetwork.

考题 You are a desktop administrator for your company. You are responsible for deploying a new application. The application is packaged in an .msi file. You need to deploy the application to only three users in the company. The .msi file contains all of the information necessary to correctly install the application. You need to install the application so that users see information about the installation progress, but no other user interface is displayed during the installation. What should you do?()A、Use the Msiexec.exe program to perform a quiet installation of the application.B、Use the Msiexec.exe program to perform a passive installation of the application. C、Create a Group Policy object (GPO) that assigns the application. Link the GPO to the site containing the users who will use the application. D、Create a Group Policy object (GPO) that advertises the application. Link the GPO to the domain. 

考题 You are the desktop administrator for your company. All users in the network have Windows XP Professional computers. Users in the research department have dual-processor computers. Users in the research department report that when they run 16-bit Windows programs, their computer performance becomes very slow. You use System Monitor to monitor the users’ computers. You discover that when the users are running their 16-bit applications, one processor shows a sustained utilization of more than 90 percent while the other processor only shows utilization of less than 10 percent. You need to improve application performance for the users in the research department. What should you do?()A、Configure each application to run in a separate memory space.B、Configure each application to run in AboveNormal priority class.C、For each application, set the compatibility mode to Windows 95.  D、Configure processor affinity for each application to allow it to run on both processors.

考题 An on-premise application is exposed to external users through a Windows Communication Framework (WCF) service endpoint registered in the Windows Azure AppFabric Service Bus.  You need to recommend an approach for providing transport-level security that maximizes performance and minimizes bandwidth requirements.  What should you recommend?()A、 Use reliable messaging.  Use HTTP for message delivery.B、 Use binary message encoding.  Use TCP for message delivery.C、 Use Plain Old XML (POX) messages.  Use TCP for message delivery.D、 Use Message Transmission Optimization Mechanism (MTOM) message encoding. Use HTTPS formessage delivery

考题 How can you connect on-premise server and an application via IPSec with Azure?()  A、 Configure Windows Azure Connect.B、 Configure Windows Azure AppFabric Access Control.C、 Use the Windows Azure AppFabric Service Bus.D、 Use the Windows Azure Content Delivery Network (CDN).

考题 Your network consists of a single Active Directory domain. All domain controllers run Windows Server 2008 R2. All client computers run Windows 7. All user accounts are stored in an organizational unit (OU) named Staff. All client computer accounts are stored in an OU named Clients.  You plan to deploy a new application. You need to ensure that the application deployment meets the following requirements: èUsers must access the application from an icon on the Start menu. èThe application must be available to remote users when they are offline. What should you do?()A、Publish the application to users in the Staff OU.B、Publish the application to users in the Clients OU.C、Assign the application to computers in the Staff OU.D、Assign the application to computers in the Clients OU.

考题 单选题In one of your online transaction processing (OLTP) applications, most users frequently modify the values, including the key values, of the application tables. Some users generate application reports by using multiple application tables.  What is the best table structure that you can use to gain optimal performance?()A heap tableB object tableC external tableD clustered tableE global temporary tableF index-organized table (IOT)

考题 单选题You are a systems administrator responsible for deploying Windows SharePoint Services (WSS) for accessby users from an external business partner. You have installed the appropriate server role and have verified that the SharePoint Web site loads properly from the local server computer. All options are usingtheir installation default values. External users report that they cannot log on to the site. Which of thefollowing changes should you make to resolve the problem?()A Create a new site within an existing site collection for the external users.B Create a new site collection for the external users.C Change the authentication mode for the Web application to Forms authentication.D Modify the User Permissions For Web Applications settings.

考题 单选题Because Web servers are platform and application (), they can send or request data from legacy or external applications including databases.A independentB coupledC relatedD dependent

考题 单选题In one of your online transaction processing (OLTP) applications, most users frequently modify the values, including the key values, of the application tables. Some users generate application reports by using multiple application tables. What is the best table structure that you can use to gain optimal performance?()A  Heap tableB  Object tableC  External tableD  Clustered tableE  Global temporary tableF  Index-organized table (IOT)

考题 单选题A customer has a WebTrade application that initially uses the embedded LDAP to authenticate users. To enhance security, the customer decides to use OAM to authenticate some of the users against an external LDAP store. For this to work, a customer configured an OAMAuthenticator, but was not sure what to select for the Control Flag. What Control Flag should the customer choose?()A OPTIONALB REQUISITEC REQUIREDD SUFFICIENTE MANDATORY

考题 单选题You are responsible for migrating client computers from Windows 98 and Windows NT Workstation 4.0 to Windows 2000 Professional. You have installed Windows 2000 Professional and reinstalled the necessary application on 10 computers. You have returned these computers to their users. The users of these computers report that their word processing application will not start. What should you do?()A Set the permission on the application to Execute.B Add the application to the Run key in the registry.C Apply the Securews.inf security template on the users’ computers.D Apply the compatws.inf security template on the users’ computers.

考题 单选题A user works daily with video production and needs portable storage which will allow them to transport their work back and forth from home. Taking the users storage and bandwidth requirements into consideration, which of the following would BEST suit the users needs?()A An external hard drive connected via eSATAB An external hard drive connected via USB 2.0C An external hard drive connected via serialD A thumb drive connected via USB 2.0

考题 单选题You deploy mobile devices that run Microsoft Windows Mobile 5.0. Users store a price list in Microsoft Office Excel Mobile files on the devices.   Users install a new mobile application on the devices.   A user reports that the device performs slowly after the installation. All attempts to remove the application fail.   You need to remove the application without losing the saved price list.   What should you do?()A Copy the price list to an external storage card and perform a hard reset.B Copy the price list by using a Desktop ActiveSync and perform a soft reset.C Copy the price list to another Windows Mobilebased device by using Bluetooth and perform a soft reset.D Move the price list to the Program Files directory on the Windows Mobilebased device and perform a hard reset.

考题 单选题An on-premise .NET application uses an on-premise Microsoft SQL Server 2008 database.  The existing compute infrastructure is insufficient to support peak loads.   You plan to move only the compute-intensive component of the application into Windows Azure.  The component requires access to the on-premise database.   The on-premise database cannot be accessed from outside the network boundary.  You need to recommend a database topology.  What should you recommend?()A  Use SQL Azure for the on-premise components and the compute-intensive component.B  Configure merge replication with the on-premise database as publisher and the SQL Azure database as subscriber.C  Configure snapshot replication with the on-premise database as publisher and the SQL Azure database assubscriber.D  Configure snapshot replication with the SQL Azuredatabase as publisher and the on-premise database as subscriber.

考题 单选题You use Microsoft .NET Framework 4 to create a Windows Presentation Foundation (WPF) application. The application requires frequent updates. You want to use the ClickOnce technology to distribute the application to Internet users. You need to ensure that the application is automatically updated without requiring user intervention. You also need to ensure that the users execute the most recent version of the application. What should you do when you publish the application? ()A Use Install the application from a file share. Select the Application is available online and offline option.B Use Install the application from CD-ROM or a DVD-ROM. Select the Application will not check for updates option.C Use Install the application from a Web site. Select the Application is available online only option.D Use Install the application from a Web site. Select the Application is available online and offline option.

考题 单选题You are designing a Windows Azure web application.   The application must integrate with on-premise business services.   The business services are running on an on-premise server and cannot be rewritten. The business services are not exposed externally.   You need to recommend an approach for accessing the business services.  What should you recommend?()A  Move business service functionality to Windows Azure.B  Connect to the on-premise server from a custom service in Windows Azure.C  Create a VPN connection between the application and the on-premise server.D  Expose the business services to the Windows Azure AppFabricService Bus by using a custom service that configures relay binding.

考题 单选题In one of your online transaction processing (OLTP) applications, most users frequently modify the values, including the key values, of the application tables. Some users generate application reports by using multiple application tables.  What is the best table structure that you can use to gain optimal performance?()A heap tableB object tableC external tableD clustered tableE global temporary tableF index­organized table (IOT)