网友您好, 请在下方输入框内输入要搜索的题目:

题目内容 (请给出正确答案)

You create Microsoft Windows-based applications.  You create an application that requires users to be authenticated by a domain controller.  The application contains a series of processor intensive method calls that require different database connections. A bug is reported during testing.  The bug description states that the application hangs during one of the processor-intensive calls more than 50 percent of the times when the method is executed.  Your unit test for the same method was successful.You need to reproduce the bug.   Which two factors should you ascertain from the tester?()

  • A、 Security credentials of the logged on user
  • B、 Code access security settings
  • C、 Hardware settings
  • D、 Network settings
  • E、 Database settings

参考答案

更多 “You create Microsoft Windows-based applications.  You create an application that requires users to be authenticated by a domain controller.  The application contains a series of processor intensive method calls that require different database connections. A bug is reported during testing.  The bug description states that the application hangs during one of the processor-intensive calls more than 50 percent of the times when the method is executed.  Your unit test for the same method was successful.You need to reproduce the bug.   Which two factors should you ascertain from the tester?()A、 Security credentials of the logged on userB、 Code access security settingsC、 Hardware settingsD、 Network settingsE、 Database settings” 相关考题
考题 You are the administrator of a network that consists of Windows 2000 Server Computers and Windows 2000 Professional computers.You want to configure the deployment of the most recent Windows 2000 Service pack so that users of the Windows 2000 Professional Computers receive the service pack automatically when they log on to the domain.What should you do?A.Create a Microsoft Windows installer package for the service pack. Configure RIS to use the package.B.Create a Microsoft Windows installer package for the service pack. Configure the package in a group policy.C.Create a Microsoft Windows installer package for the service pack. Configure the package in the local computer policy.D.Place the service pack in a distributed file system (Dfs).

考题 You create a Microsoft ASP.NET application by using the Microsoft .NET Framework version 3.5. You create a custom-templated server control.  You need to ensure that the child controls of the server control are uniquely identified within the control hierarchy of the page.  Which interface should you implement?()A、the ITemplatable interface B、the INamingContainer interface C、the IRequiresSessionState interfaceD、the IPostBackDataHandler interface

考题 You use Microsoft .NET Framework 4 to create a Windows Presentation Foundation (WPF) application named MyApp.exe. You use Microsoft Windows Installer to package the application. You create an icon file named Application.ico. You need to associate Application.ico with MyApp.exe when it is deployed. What should you do?()A、Use the File Types Editor tool.B、Rename the icon file to MyApp.exe .ico.C、Set the AddRemoveProgramsIcon property to Application.ico.D、Use the File System Editor tool to set the Icon property to Application.ico.

考题 You use Microsoft System Center Virtual Machine Manager (VMM) 2008 R2 to create and manage virtual machines (VMs). You attempt to create the first VM on a Hyper-V host by using Windows PowerShell. You receive an error message stating that the New-VM PowerShell cmdlet is not recognized. You need to be able to create VMs by using PowerShell. What should you do?()A、.Install the VMM Self-Service Portal.B、Enable the Windows PowerShell Integrated Scripting Environment feature.C、In PowerShell, run the Add-PSSnapin Microsoft.SystemCenter.VirtualMachineManager cmdlet.D、Run the Create-VM -Name "VM01" -VirtualHardDisk $VHD -VMHost $VMHost -Path "C:///MyVMs" PowerShell cmdlet.

考题 You need to design a configuration for the Microsoft Outlook Web Access servers. What should you do?()A、Create a Network Load Balancing cluster that contains the Outlook Web Access serversB、Create a Microsoft Cluster Server cluster that contains the Outlook Web Access serversC、Create public DNS host (A) resource records for each Outlook Web Access server. Instruct each user to connect to the server that contains his or her mailboxD、Install Microsoft Application Center 2000 on the Outlook Web Access servers. Create a Web cluster that contains all of the Outlook Web Access servers

考题 You create a Microsoft ASP.NET application by using the Microsoft .NET Framework version 3.5.  You create a custom-templated server control.  | English | Chinese | Japan | Korean | - 112 - Test Information Co., Ltd. All rights reserved. You need to ensure that the child controls of the server control are uniquely identified within thecontrol hierarchy of the page.  Which interface should you implement? ()A、the ITemplatable interfaceB、the INamingContainer interfaceC、the IRequiresSessionState interfaceD、the IPostBackDataHandler interface

考题 You use Microsoft Visual Studio 2010 and Microsoft .NET Framework 4 to create a Windows Presentation Foundation (WPF) application. You plan to implement a test strategy for the application. You need to ensure that the test strategy meets the following requirements: Test data can be added to the test project without recompiling. Multiple variations of a test can be executed at run time. What should you do? ()A、Use IntelliTrace.B、Use data-driven tests.C、Create a single test class.D、Create a test method for each data variation.

考题 You are employed as the senior administrator at Certkiller.com. You make use of Microsoft .NETFramework v3.5 to create a Microsoft ASP.NET application.  You make use of ASP.NET AJAX create a Web form. The code fragment below exists in the Webfrom. (The line numbers is included for reference purposes) 01  02 03 Sys.Application.add_init(initComponents); 04 05 function initComponents() {0607 } 08 09  10 11  13   You make use of the initComponents function to create and start a user behavior. This userbehavior is named CKBehavior. You have to make sure that CKBehavior is attached to CKTextBoxA. You should determine the appropriate code segment you need to add in line 6 toaccomplish this.  What should you identify?()A、Your best option would be to insert Sys.Component.create(CKBehavior, $get('CKTextBoxA'),null, null, null)B、Your best option would be to insert Sys.Component.create(CKBehavior, 'CKTextBoxA', null,null, null)C、Your best option would be to insert $create(CKBehavior, null, null, null, $get('CKTextBoxA'))D、Your best option would be to insert $create(CKBehavior, null, null, null, 'CKTextBoxA')

考题 You create a Microsoft ASP.NET application by using the Microsoft .NET Framework version 3.5.  When you access the application in a Web browser, you receive the following error message: "Service Unavailable".  You need to access the application successfully.  What should you do? ()A、Start Microsoft IIS 6.0.B、Start the Application pool.C、Set the .NET Framework version.D、Add the Web.config file for the application.

考题 You install Microsoft Windows Vista on a computer.  You will share the computer with another user.  You need to prevent the user from making unauthorized changes to the computer.  What should you do? ()A、Add the user to the Guests group.B、Create a standard user account for the user.C、Create an administrator account for the user.D、Add the user to the Remote Desktop Users group.

考题 You create a Microsoft ASP.NET application by using the Microsoft .NET Framework version 3.5.  You create a custom-templated server control.  You need to ensure that the child controls of the server control are uniquely identified within the control hierarchy of the page.  Which interface should you implement?()A、the ITemplatable interfaceB、the INamingContainer interfaceC、the IRequiresSessionState interfaceD、the IPostBackDataHandler interface

考题 You work as the enterprise exchange administrator at Xxx .Xxx is using Microsoft Exchange Server 2010 as their messaging solution.The Xxx network contains a Mailbox server named XXX-EX10.What action must you take to have mailboxes retained for 8 weeks after deletion?()A、You must create a legal hold.B、You must change the mailbox database properties.C、You must create Transport Protection Rules.D、You must create Personal archives.

考题 Your company purchases a new application to deploy on 200 computers. The application requires  that you modify the registry on each target computer before you install the application.     The registry modifications are in a file that has an .adm extension.     You need to prepare the target computers for the application.     What should you do()A、Import the .adm file into a new Group Policy Object (GPO). Edit the GPO and link it to an organizational unit that computer.B、Create a Microsoft Windows PowerShell script to copy the .adm file to the startup folder of each target computer.C、Create a Microsoft Windows PowerShell script to copy the .adm file to each computer. Run the REDIRUsr CONTAID、Create a Microsoft Windows PowerShell script to copy the .adm file to each computer. Run the REDIRCmp CONTA

考题 You have an Exchange Server 2010 organization.You need to ensure that items in a user’s Inboxfolder that are older than 60 days are moved to a custom folder.What should you do first?()A、Create a managed custom folder.Create a transport ruleB、Create a new mail folder by using Microsoft Office Outlook.Create a journal ruleC、Create a managed custom folder.Run the Managed Content Settings wizard from the Inbox managed default folderD、Create a new mail folder by using Microsoft Office Outlook.Run the Managed Content Settings wizard from the Inbox managed default folder

考题 You work in a company which is named Wiikigo Corp. The company uses SQL Server 2008. You are the administrator of the company database. Now you are in charge of a SQL Server 2008 instance.You must make sure that all SQL Server instances are consistently configured for naming conventions, security settings, force index creation and avoidance of data fragmentation. So what action should you perform to achieve this goal?()  A、You should use the Database Engine Tuning Advisor. B、In Microsoft SQL Server Management Studio, you should create a maintenance plan C、You should use the SQL Server Configuration Manager D、In Microsoft SQL Server Management Studio, you should create a policy

考题 A co-worker is unable to invite you to a Microsoft Windows Meeting Space meeting. You need to receive an invite to the meeting.  What should you do?()A、Sign in to the People Near Me feature.B、Start the Distributed Transaction Coordinator service.C、Create a custom Microsoft Windows Firewall exception to allow invitations from Windows Meeting Space.D、In the Microsoft Windows Mobility Center window, configure the presentation settings.

考题 You have a single Active Directory directory service domain. You plan to use a server named Server1  to deliver Microsoft updates to all your companys workstations. The workstations are located in an  organizational unit (OU) named Workstations. Server1 is located in an OU named Servers. You need to  ensure that all workstations receive Microsoft updates from Server1 and that the updates are installed at  3:00 AM each day.  What should you do?()A、 Create a GPO and enable the Configure Automatic Updates and Enable recommended updates via automatic Updates options. Link the GPO to the Workstations OU.B、 Create a GPO and enable the Configure Automatic Updates and Automatic Updates detection frequency options. Link the GPO to the Workstations OU.C、 Create a GPO and enable the Configure Automatic Updates and Specify intranet Microsoft update service location options. Link the GPO to the domain.D、 Create a GPO enable the Configure Automatic Updates and Specify intranet Microsoft update service location options. Link the GPO to the Servers OU.

考题 单选题You use Microsoft .NET Framework 4 to create a Windows Presentation Foundation (WPF) application that displays an image. You need to ensure that users can stretch and scale the image. Which control should you use?()A FrameB SliderC ViewboxD ScrollViewer

考题 单选题You create a Microsoft ASP.NET application by using the Microsoft .NET Framework version 3.5. You create a Web form in the application by using the following code fragment:   01     02 protected void Button_Handler(object sender, EventArgs e)   03 {   04   // some long-processing operation.  05 }   06    07  A AB BC CD D

考题 单选题You create a Microsoft ASP.NET application by using the Microsoft .NET Framework version 3.5.  You host the application on a server named ContosoTest that runs Microsoft IIS 6.0. You set up remote debugging on the ContosoTest server.  You need to debug the application remotely from another computer named ContosoDev. What should you do? ()A Attach Microsoft Visual Studio.NET to the w3wp.exe process.B Attach Microsoft Visual Studio.NET to the inetinfo.exe process.C Attach Microsoft Visual Studio.NET to the Msvsmon.exe process.D Attach Microsoft Visual Studio.NET to the WebDev.WebServer.exe process.

考题 单选题You create a Microsoft ASP.NET application by using the Microsoft .NET Framework version 3.5.  You create a custom-templated server control.  | English | Chinese | Japan | Korean | - 112 - Test Information Co., Ltd. All rights reserved. You need to ensure that the child controls of the server control are uniquely identified within thecontrol hierarchy of the page.  Which interface should you implement? ()A the ITemplatable interfaceB the INamingContainer interfaceC the IRequiresSessionState interfaceD the IPostBackDataHandler interface

考题 单选题You create a Microsoft ASP.NET application by using the Microsoft .NET Framework version 3.5.  You create a custom-templated server control.  You need to ensure that the child controls of the server control are uniquely identified within the control hierarchy of the page.  Which interface should you implement?()A the ITemplatable interfaceB the INamingContainer interfaceC the IRequiresSessionState interfaceD the IPostBackDataHandler interface

考题 单选题You create a Microsoft ASP.NET application by using the Microsoft .NET Framework version 3.5. You create a Web form in the application by using the following code fragment:   01     02 protected void Button_Handler(object sender, EventArgs e)   03 {   04   // some long-processing operation.  05 }   06    07  A AB BC CD D

考题 单选题You are employed as the senior administrator at Certkiller.com. You make use of Microsoft .NETFramework v3.5 to create a Microsoft ASP.NET application.  You make use of ASP.NET AJAX create a Web form. The code fragment below exists in the Webfrom. (The line numbers is included for reference purposes) 01  10 11  13   You make use of the initComponents function to create and start a user behavior. This userbehavior is named CKBehavior. You have to make sure that CKBehavior is attached to CKTextBoxA. You should determine the appropriate code segment you need to add in line 6 toaccomplish this.  What should you identify?()A Your best option would be to insert Sys.Component.create(CKBehavior, $get('CKTextBoxA'),null, null, null)B Your best option would be to insert Sys.Component.create(CKBehavior, 'CKTextBoxA', null,null, null)C Your best option would be to insert $create(CKBehavior, null, null, null, $get('CKTextBoxA'))D Your best option would be to insert $create(CKBehavior, null, null, null, 'CKTextBoxA')

考题 单选题You create a Microsoft ASP.NET AJAX application by using the Microsoft .NET Frameworkversion 3.5.  You attach Microsoft Visual Studio 2008 debugger to the Microsoft Internet Explorer instance to debug the JavaScript code in the AJAX application.  You need to ensure that the application displays the details of the client-side object on the debugger console.  What should you do?()A Use the Sys.Debug.fail method. B Use the Sys.Debug.trace method. C Use the Sys.Debug.assert method. D Use the Sys.Debug.traceDump method.

考题 单选题You work in a company which is named Wiikigo Corp. The company uses SQL Server 2008. You are the administrator of the company database. Now you are in charge of a SQL Server 2008 instance.You must make sure that all SQL Server instances are consistently configured for naming conventions, security settings, force index creation and avoidance of data fragmentation. So what action should you perform to achieve this goal?()A You should use the Database Engine Tuning Advisor. B In Microsoft SQL Server Management Studio, you should create a maintenance plan C You should use the SQL Server Configuration Manager D In Microsoft SQL Server Management Studio, you should create a policy

考题 单选题You use Microsoft System Center Virtual Machine Manager (VMM) 2008 R2 to create and manage virtual machines (VMs). You attempt to create the first VM on a Hyper-V host by using Windows PowerShell. You receive an error message stating that the New-VM PowerShell cmdlet is not recognized. You need to be able to create VMs by using PowerShell. What should you do?()A .Install the VMM Self-Service Portal.B Enable the Windows PowerShell Integrated Scripting Environment feature.C In PowerShell, run the Add-PSSnapin Microsoft.SystemCenter.VirtualMachineManager cmdlet.D Run the Create-VM -Name VM01 -VirtualHardDisk $VHD -VMHost $VMHost -Path C:///MyVMs PowerShell cmdlet.

考题 单选题You create a Microsoft ASP.NET application by using the Microsoft .NET Framework version 3.5. You create a custom-templated server control.  You need to ensure that the child controls of the server control are uniquely identified within the control hierarchy of the page.  Which interface should you implement?()A the ITemplatable interface B the INamingContainer interface C the IRequiresSessionState interfaceD the IPostBackDataHandler interface