网友您好, 请在下方输入框内输入要搜索的题目:

题目内容 (请给出正确答案)

You are creating a client application and configuring it to call a Windows Communication Foundation (WCF) service.When the application is deployed, it will be configured to send all messages to a WCF routing service. You need to ensure that the application can consume the target service after the application is deployed. What should you do?()

  • A、In the client application, add a service reference to the router service. In the client binding configuration, specify the address of the router service.
  • B、In the client application, add a service reference to the target service. In the client binding configuration, specify the address of the target service.
  • C、In the client application, add a service reference to the router service. In the client binding configuration, specify the address of the target service.
  • D、In the client application, add a service reference to the target service. In the client binding configuration, specify the address of the router service.

参考答案

更多 “ You are creating a client application and configuring it to call a Windows Communication Foundation (WCF) service.When the application is deployed, it will be configured to send all messages to a WCF routing service. You need to ensure that the application can consume the target service after the application is deployed. What should you do?()A、In the client application, add a service reference to the router service. In the client binding configuration, specify the address of the router service.B、In the client application, add a service reference to the target service. In the client binding configuration, specify the address of the target service.C、In the client application, add a service reference to the router service. In the client binding configuration, specify the address of the target service.D、In the client application, add a service reference to the target service. In the client binding configuration, specify the address of the router service.” 相关考题
考题 You are creating an application that consumes a Windows Communication Foundation (WCF) service. The service implements the IService contract. The client application contains the CallbackHandler class, which implements IServiceCallback.You need to ensure that a client proxy is created that can communicate with the service over a duplex channel.Which code segment should you use?()A.B.C.D.

考题 You want to debug the Windows Communication Foundation (WCF) client and server interaction through message and application tracing.You need to correlate traces generated on the client and the server. Which XML segment should you add to the system.diagnostics configuration element in the client and server application configuration file?()A.B.C.D.

考题 You are creating a Windows Communication Foundation (WCF) service that implements operations in a RESTful manner. You need to add a delete operation. You implement the delete method as follows:void DeleteItems(string id);You need to configure WCF to call this method when the client calls the service with the HTTP DELETE operation. What should you do?()A. Add the WebInvoke(UriTemplate=/Items/{id}, Method=DELETE) attribute to the operationB. Add the HttpDelete atribute to the operationC. Replace the string parameter with a RemovedActivityAction parameterD. Replace the return type with RemovedActivityAction.

考题 What are four capabilities of the mysql client program?() A.Creating, dropping, and modifying tables and indexesB.Initiating a binary backup of the database by using the START BACKUP commandC.Displaying replication status informationD.Shutting down the server by using the SHUTDOWN commandE.Creating and dropping databasesF.Creating and administering users

考题 Which statement is correct about defining an Infranet Enforcer for use as a RADIUS Client? ()A、You do not need to configure a RADIUS client policy.B、You must know the exact model number of the Infranet Enforcer.C、You must specify the NACN password of the device in the RADIUS client policy.D、You do not need to designate a location group to which the Infranet Enforcer will belong.

考题 You are employed as the exchange administrator at Company.com.the Company.com network contains an exchange 2010 organization.you are responsible for managing an exchange server 2010 mailbox server named -ex01.You are in the process of implementing a policy that deletes e-mail messages automatically after 60 days.You receive an instruction from management to identify another location where users can store their messages after 60 days.However, administrators need to locate the e-mail messages in both locations when executing multi- mailbox searches. What should you do?()A、You should consider creating a Retention Policy.B、You should consider creating a.pst file for each user that is stored in a shared folder.C、You should consider creating a Personal Archive for each user.D、You should consider creating a journal rule.

考题 You work as an application developer at Certkiller .com. Certkiller .com wants you to develop an application that stores and retrieves client information by means of a unique account number.You create a custom collection class, which implements the IDictionary interface,named ClientDictionary. The following code have been included into the new application. //Create Client objects Client c1 = new Client ("AReid", "Andy Reid", Status.Current); Client c2 = new Client ("DAustin", "Dean Austin", Status.New); //Create ClientDictionary object IDictionary cData = new ClientDictionary (); cData.Add ("10001", c1); cData.Add ("10002", c2); You use the same method to add other Client objects to the collection. You need to ensure that you are able to retrieve client information associated with the account number 10111.What should you do?()A、 Use the following code: Client foundClient;foundClient = (Client) cData.Find ("10111"); B、 Use the following code: Client foundClient;if (cData.Contains ("10111")) foundClient = cData ["10111"]; C、 Use the following code: Client foundClient;if (cData.Contains ("10111"))foundClient =(Client) cData ["10111"]; D、 Use the following code: Client foundClient;foreach (string key in cData.Keys {if (key == "10111")foundClient = (Client) cData.Values ["10111"]; }

考题 Which tool allows a LAN client to determine which router should be the first hop to a particular remote destination, allowing simplified client configuration and processing without creating a single point of failure?()A、Proxy ARPB、IRDPC、Dynamic Routing ProtocolD、VRRP

考题 You have applications that have frequently executed queries, and produce small and static result sets.You configure the sqlnet.ora file in the client machine to set a nonzero value for the OCI_RESULT_CACHE_MAX_SIZE parameter. What is the purpose of this configuration?()A、to avoid round trips to the server by enabling caching of query results in client memoryB、to improve performance by storing a copy of the data from the private SQL area of the PGAC、to enhance the query performance by creating a cache in the client memory for sorting operationsD、to avoid the storing of query plans and results in the server by creating a cache in the client memory

考题 You have a single Active Directory directory service domain. You use a Group Policy object (GPO) to apply security settings to your client computers. You configure the startup type for system services settings in a new GPO, and you link the GPO to an organizational unit (OU).  You discover that the startup type for system services on one of the client computers has not been updated. You need to ensure that the Group Policy settings are applied to the client computer. What should you do?()A、  Restart the client computer.B、 Instruct the user to log off and then log on to the client computer.C、 On the client computer, run the Gpupdate.exe command with the /Force parameter.D、 On the client computer, run the Gpupdate.exe command with the /Target:computer parameter.

考题 You are designing a remote administration solution that meets business requirements. You need to specify client or server software that will be required. What should you do?()A、Ensure that all client computers have a graphical Telnet client installedB、Ensure that all client computers have the Remote Desktop Connection client software installedC、Ensure that all server computers have RCONSOLE installed and that it is configured to start automaticallyD、Ensure that all server computers have Remote Administration (HTML) installed

考题 You are creating a Windows Communication Foundation (WCF) service. The service endpoints change frequently. On the service, you add a new ServiceDiscoveryBehavior to the Behaviors collection of the ServiceHost Description property. You need to ensure that client applications can communicate with the service and discover changes to the service endpoints. What should you do?()A、Add a new ServiceDiscoveryBehavior to the Behaviors collection in the client application.B、Add a new AnnouncementClient to the Behaviors collection in the client application.C、Use the FindCriteria class and the UdpDiscoveryEndpoint class to set up the binding in the client application.D、Use the DiscoveryProxy class and the EndpointDiscoveryMetadata class to set up the binding in the client application.

考题 You are the network administrator for The network consists of a single Active Directory domain named All network servers run Windows Server 2003, and all client computers run Windows XP Professional. You create a shared folder named Client Docs on a member server named TestKing13. Client Docs will store project documents. You configure shadow copies for the volume containing Client Docs. You need to enable client computers to access previous version of the documents in Client Docs. What should you do?()A、Create a Group Policy object (GPO) to enable Offline Files on all client computers.B、On each client computer, customize the view for Client Docs to use the Documents (for any file type) folder template.C、Create a Group Policy object (GPO) that installs the Previous Versions client software on all client computers.D、Assign the Allow - Full Control permission on Client Docs to all users.E、On each client computer, install the Backup utility and schedule a daily backup.

考题 You are developing a client application that consumes a Windows Communication Foundation (WCF) service. You use the svcutil.exe utility to create a proxy for the service. You use the svcutil.exe switches that generate asynchronous calls. GetFlight is a service operation that takes no parameters and returns a string. The GetFlightCallback method must be called when the service operation returns.You create an instance of the client proxy with the following code:var client = new TranvelServiceClient( );You need to ensure that a callback is received when the GetFlight operation is called asynchronously. Which code segment should you use?()A、client.BeginGetFlight(GetFlightCallback, null); client.GetFlight();B、client.GetFlight(); client.BeginGetFlight(GetFlightCallback, null);C、client.GetFlightCompleted += new EventHandler(GetFlightCallback); client.GetFlightAsync();D、IAsyncResult asyncResult = client.BeginGetFlight(GetFlightCallback, client); client.EndGetFlight(asyncResult);

考题 You work as the exchange administrator at TestKing.com. The TestKing.com network contains anExchange Server 2010 Organization. TestKing.com has its headquarters in Stockholm where you arelocated. You are responsible for managing the Exchange network for TestKing.com. The Exchange organization contains two Client Access Servers. You are in the process of deploying aMicrosoft Internet Security and Acceleration (ISA) server. During the course of day you receive aninstruction from the CIO to recommend a high availability solution for the Client Access servers formanagment. Management wants OWA connections to be available in the event of one Client Access Server failing as well as ensuring that the client access services is accessible in a fail on the Client AccessServer. What should you do?()A、You should recommend the deployment of Windows Network Load Balancing.B、You should recommend publishing every Client Access server in a separate publishing rule.C、You should recommend publishing the two Client Access servers in a single publishing rule as a Web server farm.D、You should recommend the deployment of a hardware load balancer.

考题 You work as a network Exchange administrator at Company.com.The Company.com network currently consists of a single Active Directory forest containing a single domain named Company.com.The Company.com organization makes use of Microsoft Exchange Server 2010 as their messaging solution.During the course of the week you receive an instruction from the CIO to stop internal users from sending e-mail messages containing the words "Classified Data" to users outside the organization. What should you do?()A、You should consider creating a message classification.B、You should consider creating a Transport rule.C、You should consider creating a Send connector.D、You should consider creating a managed folder mailbox policy.

考题 You work as the enterprise exchange administrator at Company.com.The Company.com network consists of a single Active Directory domain named Company.com.Company.com has an Exchange Server 2010 organization.You have received instructions from the CIO to support Autodiscover from the Internet by creating a resource record in DNS.What should you do?()A、You should consider creating a Host (A) resource record.B、You should consider creating a Text (TXT) resource record.C、You should consider creating a Pointer (PTR) resource record.D、You should consider creating a Mail exchange (MX) resource record.

考题 A Windows Communication Foundation (WCF) service has a callback contract. You are developing a client application that will call this service.You must ensure that the client application can interact with the WCF service. What should you do?()A、On the OperationContractAttribute, set the AsyncPattern property value to true.B、On the OperationContractAttribute, set the ReplyAction property value to the endpoint address of the client.C、On the client, create a proxy derived from DuplexClientBaseTChannel .D、On the client, use GetCallbackChannelT .

考题 What are four capabilities of the mysql client program?()A、Creating, dropping, and modifying tables and indexesB、Initiating a binary backup of the database by using the START BACKUP commandC、Displaying replication status informationD、Shutting down the server by using the SHUTDOWN commandE、Creating and dropping databasesF、Creating and administering users

考题 单选题You work as the enterprise exchange administrator at Company.com.The Company.com network consists of a single Active Directory domain named Company.com.Company.com has an Exchange Server 2010 organization.You have received instructions from the CIO to support Autodiscover from the Internet by creating a resource record in DNS.What should you do?()A You should consider creating a Host (A) resource record.B You should consider creating a Text (TXT) resource record.C You should consider creating a Pointer (PTR) resource record.D You should consider creating a Mail exchange (MX) resource record.

考题 多选题A customer is developing a custom application that involves a multistep provisioning process for a new account. There is a custom Java client application that is generating multiple JMS messages as part of the process and sending them to the WebLogic tier where they are processed.    Which three steps must you take to implement the solution to allow for scalability and parallel processing of multiple simultaneous provisioning requests while ensuring messages for an individual process are not delivered out of order?()AUpdate the client application that is creating the JMS messages to use Unit of Work.BConfigure a WebLogic Cluster for Distributed JMS.CUpdate the client application that is creating the JMS messages to use Unit of Order.DEnable XA Transactions on the JMS Connection Factory used by the client application.EEnable Load Balancing on the JMS connection factory used by the client application.

考题 单选题You are creating a Windows Communication Foundation (WCF) service that implements operations in a RESTful manner.You need to add a delete operation. You implement the delete method as follows. string void DeleteItems(string id);You need to configure WCF to call this method when the client calls the service with the HTTP DELETE operation. What should you do?()A  Add the WebInvoke(UriTemplate = /Items/{id},Method=DELETE) attribute to the operation.B  Add the HttpDelete attribute to the operation.C  Replace the string parameter with a RemovedActivityAction parameter.D  Replace the return type with RemovedActivityAction.

考题 单选题You are creating a Windows Communication Foundation (WCF) service that implements operations in a RESTful manner. You need to add a delete operation. You implement the delete method as follows:void DeleteItems(string id);You need to configure WCF to call this method when the client calls the service with the HTTP DELETE operation. What should you do?()A Add the WebInvoke(UriTemplate=/Items/{id}, Method=DELETE) attribute to the operationB Add the HttpDelete atribute to the operationC Replace the string parameter with a RemovedActivityAction parameterD Replace the return type with RemovedActivityAction.

考题 单选题You are creating a Windows Forms Application by using the .NET Framework 3.5.You plan to deploy a new Applciation.You need to ensure that on deployment, the application meets the following requirements;    (1)It is executed on the client computer.   (2)It is removed from the client computer after the application closed.   (3)It is not displayed in the Add/Remove programs panel on the client computer.     What sould you do?()A Deploy the application to a central network server.- Access the application by using hte Remote Desktop Connection tool.B Deploy the application by using the ClickOnce technology.- Use the Mage.exe tool to set the Online Only option in the deployment manifest.C Deploy the application by using the ClickOnce technologoy.- Set the Install attiribute of the deployment tag to true in the deployment manifest.D Deploy the application to a CD-ROM by using the ClickOnce technology. - Execute the application from the CD-ROM.

考题 单选题You are at the client site working with a WebLogic Administrator who has to type Username and Password each time he/she starts an instance og Oracle WebLogic server and is quite annoyed by it. Please suggest a secure and optimal way to reduce the typing of username passwod during server startup ()A  Since Boot Identity file for server doesn’t exist, you recommend creating a script file that can automate the task of entering username and passwordB  Since Boot Identity file for server doesn’t exist, you recommend reinstalling the serverC  Since Boot Identity file for server doesn’t exist, you recommend creating one as this file is referred for credentialsD  Since Boot Identity file for server doesn’t exist, you recommend logging a support ticket with Oracle

考题 单选题You have applications that have frequently executed queries, and produce small and static result sets.You configure the sqlnet.ora file in the client machine to set a nonzero value for the OCI_RESULT_CACHE_MAX_SIZE parameter. What is the purpose of this configuration?()A to avoid round trips to the server by enabling caching of query results in client memoryB to improve performance by storing a copy of the data from the private SQL area of the PGAC to enhance the query performance by creating a cache in the client memory for sorting operationsD to avoid the storing of query plans and results in the server by creating a cache in the client memory

考题 单选题You are developing a client application that consumes a Windows Communication Foundation (WCF) service. You use the svcutil.exe utility to create a proxy for the service. You use the svcutil.exe switches that generate asynchronous calls. GetFlight is a service operation that takes no parameters and returns a string. The GetFlightCallback method must be called when the service operation returns.You create an instance of the client proxy with the following code:var client = new TranvelServiceClient( );You need to ensure that a callback is received when the GetFlight operation is called asynchronously. Which code segment should you use?()A client.BeginGetFlight(GetFlightCallback, null); client.GetFlight();B client.GetFlight(); client.BeginGetFlight(GetFlightCallback, null);C client.GetFlightCompleted += new EventHandler(GetFlightCallback); client.GetFlightAsync();D IAsyncResult asyncResult = client.BeginGetFlight(GetFlightCallback, client); client.EndGetFlight(asyncResult);