网友您好, 请在下方输入框内输入要搜索的题目:

题目内容 (请给出正确答案)
单选题
You need to design the consolidation strategy for the Promotions and Partners databases. You want to choose a strategy that results in the best database performance while maintaining the permissions of end users in each database.What consolidation strategy should you choose?()
A

Place each database in a separate instance running on SQL2.

B

Place each database in a separate instance running on SQL3.

C

Place both databases in a single instance running on SQL2.

D

Place both databases in a single instance running on SQL3.


参考答案

参考解析
解析: 暂无解析
更多 “单选题You need to design the consolidation strategy for the Promotions and Partners databases. You want to choose a strategy that results in the best database performance while maintaining the permissions of end users in each database.What consolidation strategy should you choose?()A Place each database in a separate instance running on SQL2.B Place each database in a separate instance running on SQL3.C Place both databases in a single instance running on SQL2.D Place both databases in a single instance running on SQL3.” 相关考题
考题 You are speaking to an IT manager with 350 small servers. The IT manager is looking to reduce and consolidate systems.  What strategy would you follow?()A、Tell the customer that IBM has the best scale-out server strategy.B、Show the benefit of server consolidation with IBM and the return on investment.C、Find out the mixture of server processor and application type.D、Tell the customer to buy smaller servers.

考题 You design a Business Intelligence (BI) solution by using SQL Server 2008. You plan to design the report strategy for a new report project that will be used by a financial application. The application uses five calculations that are implemented in Microsoft .NET Framework 3.5 assemblies. The assemblies are written in the C# language and use the static methods. You need to ensure that the calculations can be used by the expressions in all reports. You also need to ensure consistency within the reports by using the least amount of development effort. What should you do?()A、 Add a reference to the assemblies in the Report Properties References tab. B、 Write the calculation logic used by the calculations by using T-SQL functions. C、 Write the code of the calculation logic into the Report Properties Custom Code tab.D、 Write the calculation logic in each report by using the mathematical functions available natively to SQL Server 2008 Reporting Services (SSRS).

考题 You work as the enterprise exchange administrator at TestKing.com. TestKing.com makes use of Microsoft Exchange Server messaging solution. The TestKing.com network consists of a single ActiveDirectory domain named testking.com. TestKing.com is configured to run an exchange 2010 environment.  You are planning to design the installation of numerous Mailbox servers. TestKing.com Service LevelAgreement (SLA) requires the following: * The servers need to support 1,500 concurrent connections to mailboxes.* The servers need to maintain a latency of less than 20 milliseconds. You ensure deployment success you need to ensure that your design comply with the Service LevelAgreement (SLA) of TestKing.com. What should you do?()A、The best option is to use the Exchange Server User Monitor (ExMon) tool to check if your design meets the requirements.B、The best option is to use the Exchange Server Load Generator (LoadGen) 2010 tool to check if your design meets the requirements.C、The best option is to use the Exchange Server Connectivity Analyzer (ExRCA) tool to check if your design meets the requirements.D、The best option is to use the Exchange Server Jetstress 2010 tool to check if you design meets there quirements.

考题 You need to design an access control strategy for the marketing application. You solution must minimize impact on server and network performance. What should you do?()A、Require client computers to connect to the marketing application by using a VPN connectionB、Use IPSec to encrypt communications between the servers in the New York and Atlanta officesC、Require the high security setting on Terminal Services connections to the marketing applicationD、Configure all marketing application Web pages to require SSL

考题 You need to recommend a backup strategy for the servers in the San Francisco office. The strategy must meet the company's technical requirements    What should you include in the recommendation?()A、native-boot virtual hard disks (VHDs)B、Microsoft System Center Data Protection Manager 2010C、system restore pointsD、Windows Server Backup

考题 You need to design an e-mail access strategy for remote users. What should you do? () A、 Instruct remote users to connect to their e-mail by using RPCB、 Instruct remote users to connect to Outlook Web Access by using only HTTPSC、 Instruct remote users to connect to the company network by using PPTP connectionsD、 Instruct remote users to connectd to their e-mail by using RPC over HTTP Configure the HTTP servers to require encryption.

考题 You are developing a Windows Presentation Foundation (WPF) application for a travel reservation system You need to ensure that users can select a range of travel dates. What should you do ?()A、Add single DatePicker control to the design surfaceB、Add single Calendar control to the design surfaceC、Add single MediaElement control to the design surface to display a calendarD、Add the appropriate Windows Forms references to the project references. Add a single Windows Forms DateTimePicker control to the design surface

考题 You need to design a strategy for identifying the number of instances that any one SQL Server 2005 computer will support. What should you do?()A、Specify that each server must have one instance for each customer.B、Specify that each server must each have only one instance.C、Specify that each server must have one instance for each database that is hosted on that server.D、Specify that each server must have one instance for each customer who has one or more databases that are hosted on that server.

考题 Your company has a single Active Directory Domain Services (AD DS) domain with Windows Server 2008 R2 member servers and 1,000 Windows 7 client computers. You are designing the deployment of a custom application.   You have the following requirements:   The application must be available to only users who need it. Minimize network traffic during deployment.   You need to design a deployment strategy that meets the requirements.   Which deployment method should you use?()A、RemoteApp and Desktop ConnectionsB、software installation in Group PolicyC、Microsoft Application Virtualization (App-V)D、Microsoft System Center Configuration Manager 2007

考题 You need to recommend a strategy to ensure that the administration of AD LDS is encrypted.  What should you include in the recommendation?()A、a server authentication certificateB、client authentication certificatesC、Digest authenticationD、Windows Integrated authentication

考题 You need to recommend a strategy for using managed service accounts on the Web servers.How many managed service accounts should you recommend?()A、1B、2C、3D、5

考题 You need to recommend a configuration design for the new VMs. The design must ensure that operating systems can be deployed to the new VMs. What should you include in the recommendation?()A、virtual machine queue (VMQ)B、Virtual Machine ChimneyC、a synthetic network adapterD、an emulated network adapter

考题 You need to design a strategy to ensure that all servers are in compliance with the business requirements for maintaining security patches. What should you do?()A、Log on to a domain controller and run the Resultant Set of Policy wizard in planning mode on the domainB、Log on to each server and run Security Configuration and Analysis to analyze the security settings by using a custom security templateC、Create a logon script to run the secedit command to analyze all servers in the domainD、Run the Microsoft Baseline Security Analyzer (MBSA) on a server to scan for Windows vulnerabilities on all servers in the domain

考题 单选题You need to design an access control strategy for the Payment folder for the Sales Managers group. What should you do?()A Use IPSec in transport modeB Use Encrypting File System (EFS) over Web Distributed Authoring and Versioning (WebDAV)C Use PEAP-EAP-TLSD Use Encrypting File System (EFS) remote encryption

考题 单选题You need to recommend a configuration design for the new VMs. The design must ensure that operating systems can be deployed to the new VMs. What should you include in the recommendation?()A virtual machine queue (VMQ)B Virtual Machine ChimneyC a synthetic network adapterD an emulated network adapter

考题 单选题Your company has client computers that run Windows XP Professional.   You are planning to install Windows 7 Enterprise on the existing client computers.   You have the following requirements:   Migrate user data and operating system components.  Encrypt and password-protect the migration store.   You need to design a user state migration strategy that supports the requirements. What should you do?()A Use a hard-link migration storeB Use a compressed migration storeC Perform an offline migration by using WindowsoldD Perform an offline migration by using Windows PE

考题 多选题You need to design a strategy to increase security for the client computers in the finance department. Which two actions should you perform?()AEnable automatic certificate enrollmentBEnforce smart card logonsCEnable Encrypting File System (EFS) for offline filesDEnable a screen saver password

考题 单选题You need to recommend a Group Policy strategy for the Remote Desktop servers. What should you include in the recommendation?()A block inheritanceB loopback processingC security filteringD WMI filtering

考题 单选题You are developing a Windows Presentation Foundation (WPF) application. You need to display HTML content from a Web Page on the WPF form. What should you do?()A Add a FlowDocumentReader control to the design surface. Then create a FlowDocument control.B Add a ContentControl control to the design surface. The reference a WebClient object to return an HTML string.C Add a DocumentViewer control to the design surface. The create a FixedDocument control.

考题 单选题You need to recommend a strategy to ensure that the administration of AD LDS is encrypted.  What should you include in the recommendation?()A a server authentication certificateB client authentication certificatesC Digest authenticationD Windows Integrated authentication

考题 单选题Your company has a single Active Directory Domain Services (AD DS) domain and 1,000 client computers.  You are planning to deploy Windows 7 Enterprise to the client computers.    You need to design a zero-touch installation strategy.()A unattended installationB custom Windows 7 image on DVDC Windows Deployment Services (WDS)D Microsoft System Center Configuration Manager 2007 R2

考题 单选题You are designing a strategy for migrating domain user accounts to the new Windows Server 2003 Active Directory environment. You want to identify the minimum number of trust relationships that need to be manually created to perform this operation.  Which design should you use? ()A  one external trust relationshipB  two external trust relationshipsC  six external trust relationshipsD  twelve external trust relationshipsE  one two-way cross-forest trust relationship

考题 单选题You design a Business Intelligence (BI) solution by using SQL Server 2008. You plan to design the report strategy for a new report project that will be used by a financial application. The application uses five calculations that are implemented in Microsoft .NET Framework 3.5 assemblies. The assemblies are written in the C# language and use the static methods. You need to ensure that the calculations can be used by the expressions in all reports. You also need to ensure consistency within the reports by using the least amount of development effort. What should you do?()A  Add a reference to the assemblies in the Report Properties References tab. B  Write the calculation logic used by the calculations by using T-SQL functions. C  Write the code of the calculation logic into the Report Properties Custom Code tab.D  Write the calculation logic in each report by using the mathematical functions available natively to SQL Server 2008 Reporting Services (SSRS).

考题 单选题You need to design a group membership strategy for the EditorialAdmins group. What should you do?()A Move the EditorialAdmins group to the Servers OU in the editorial departmentB Move the members of the EditorialAdmins group to the Editorial OUC Move the members of the EditorialAdmins group to the New York OUD Move the EditorialAdmins group to the New York OU

考题 单选题You need to design the consolidation plan for SQL1, SQL2, and SQL3. You need to identify the appropriate combination of SQL Server instances and SQL Server 2005 computers that are needed to fulfill the company’s consolidation plans and security requirements.Which combination should you use?()A one SQL Server 2005 computer with one instanceB two SQL Server 2005 computers, each with two instancesC two SQL Server computers, one with one instance and one with three instancesD one SQL Server 2005 computer with two instances