网友您好, 请在下方输入框内输入要搜索的题目:

题目内容 (请给出正确答案)
单选题
What should be done if a company decides to stop doing business with a vendor? ()
A

 Notify buyers using Workflow.

B

 Delete the Company Master record.

C

 Set the Company record status to DISQUAL.

D

 Check the Disqualified Vendor check box on the Company record.


参考答案

参考解析
解析: 暂无解析
更多 “单选题What should be done if a company decides to stop doing business with a vendor? ()A  Notify buyers using Workflow.B  Delete the Company Master record.C  Set the Company record status to DISQUAL.D  Check the Disqualified Vendor check box on the Company record.” 相关考题
考题 Company.com network consists of a single Active Directory domain named  Company.com.Company.com has an Exchange Server 2010 organization.The Company.com employees use Microsoft Office Outlook 2007 to connect to their mailboxes.RPC over HTTP and Auto discover are configured on Microsoft Office Outlook 2007. A new Company.com security policy requires that the employees connected to the domain does not need authentication when using Outlook Anywhere.However, those not connected t the domain needs to be authentication when using Outlook Anywhere.The employees need to comply with the new Company.com security policy.  What should you do?()A、You should consider using Basic authentication on Outlook Anywhere and set up only Basic authentication on the RPC virtual directory.B、You should consider using NTLM authentication on Outlook Anywhere and set up Basic authentication and NTLM authentication on the RPC virtual directory.C、You should consider using NTLM authentication on Outlook Anywhere and set up only Basic authentication on the RPC virtual directory.D、You should consider using Basic authentication on Outlook Anywhere and set up Basic authentication and NTLM authentication on the RPC virtual directory.

考题 You work as the enterprise exchange administrator at Company.com.The Company.com network consists of a single Active Directory domain named Company.com.Company.com has an Exchange Server 2010 organization.Due to circumstances, Company.com has acquired a new Internet domain name.This results in that the employees cannot receive e-mail that is sent to the new Internet domain name.The new Internet domain name is set up as an e-mail address suffix.The Company.com employees need to receive e-mail sent from the new Internet domain name. What should you do?()A、You should consider using an External Relay Accepted Domain.B、You should consider using an Authoritative Accepted Domain.C、You should consider using a remote domain.D、You should consider using a new Receive connector.

考题 Which should be the key driver for a company security policy’s creation, implementation and enforcement?()A、 the business knowledge of the IT staffB、 the technical knowledge of the IT staffC、 the company’s business objectivesD、 the company’s network topologyE、 the IT future directions

考题 What should be done if a company decides to stop doing business with a vendor? ()A、 Notify buyers using Workflow.B、 Delete the Company Master record.C、 Set the Company record status to DISQUAL.D、 Check the Disqualified Vendor check box on the Company record.

考题 You are a database administrator for your company. The company uses a vendor company’s application that is based on a proprietary database. You query data from the application database and import the data into a SQL Server 2005 database. The application vendor provides you with a new OLE DB driver to be used when querying the application database. Company policy prohibits connections between the SQL Server database and the application database, except when querying this data. You need to provide a way to query data from the application database. What should you?()A、Configure a Linked Server connection to the application database.B、Write a query that uses an OPENDATASOURCE command.C、Write a query that uses an OPENQUERY command.D、Configure a Remote Server connection to the application database.

考题 You work as the enterprise exchange administrator at Company.com.The Company.com network consists of a single Active Directory domain named Company.com.Company.com has an Exchange Server 2010 organization.You receive a complaint from a Company.com employee named Mia Hamm stating that she is only able to access her mailbox using Outlook Web App.You need to make sure that she can access her Mailbox.What should you do?()A、You should consider enabling and set up Outlook Anywhere.B、You should consider setting up an Outlook Web App Mailbox policy.C、You should consider changing Mia Hamm’s mailbox features.D、You should consider removing Autodiscover record from the DNS zone.

考题 You work as the enterprise exchange administrator at Company.com.The Company.com network consists of a single Active Directory domain named Company.com.Company.com has an Exchange Server 2010 organization.Company.com has merged with another company named Courseware Publishers.The users at Courseware Publishers complained that they cannot automatically locate the Client Access servers at Company.com.The users need to locate the Client Access servers at Company.com.What should you do?()A、The best option is to use an A record for FederatedSharing.Company.com.B、The best option is to use an SRV record for _autodiscover._TCP._msdcs.Company.com.C、The best option is to use an A record for autodiscover.Company.com.D、The best option is to use an SRV record for _FederatedSharing._UDP._msdcs.Company.com.

考题 You want to connect to your company network from your Windows 2000 Professional computer at home. You have an ISDN line that is used for internet connectivity. You create a VPN connection and are able to connect successfully to the company network. While connected to the company network, you are unable to access the Internet.   What must you do so that you can access the Internet?()A、Configure the ISDN connection to use SLIP instead of PPP.B、Select the Enable Internet Connection Sharing for this connection check box in the ISDN connection properties.C、Clear the Use default gateway on remote network check box.D、Install and configure the SAP Agent service.

考题 You are the network administrator for Company.You need to connect to Company’s network from your Windows 2000 Professional computer at home.You have a DSL line that is used for Internet connectivity. You create an L2TP virtual private network(VPN) connection and are able to connect successfully to Company’s network. While connected toCompany’s network, you are unable to access the Internet.You want to be able to access the Internet while connected to Company’s network.How should you configure the connection properties?()A、Configure the DSL connection to use PPTP instead of L2TP. B、Enable Internet Connection Sharing for the DSL connection properties. C、CLEAR THE Use default gateway on remote network check box. D、Clear the Require data encryption check box. 

考题 You work as a network Exchange administrator at Company.com.The Company.com network currently consists of a single Active Directory forest containing a single domain named Company.com.The Company.com organization makes use of Microsoft Exchange Server 2010 as their messaging solution.During the course of the business week you receive instruction from Company.com to have the permission of a public folder named KingPublic modified.What should you do?()A、You should consider using the Microsoft Office Outlook tool.B、You should consider using the Public Folder Management Console tool.C、You should consider using the Exchange Control Panel (ECP) tool.D、You should consider using the Exchange Management Console (EMC) tool.

考题 You work as the enterprise exchange administrator at Company.com.The Company.com network consists of a single Active Directory domain named Company.com.Company.com has an Exchange Server 2010 organization.Company.com is has Federated Sharing enabled.You have received instructions from the CIO to store the Application Identifier (AppID) of the domain for the federated trust by setting up a DNS record.What should you do?()A、The best option is to use an A record.B、The best option is to use a CNAME record.C、The best option is to use a TXT record.D、The best option is to use a SRV record.

考题 You work as the enterprise exchange administrator at Company.com.The Company.com network consists of a single Active Directory domain named Company.com.Company.com has an Exchange Server 2010 organization.You have received instructions from the CIO to support Autodiscover from the Internet by creating a resource record in DNS.What should you do?()A、You should consider creating a Host (A) resource record.B、You should consider creating a Text (TXT) resource record.C、You should consider creating a Pointer (PTR) resource record.D、You should consider creating a Mail exchange (MX) resource record.

考题 单选题You are a database administrator for your company. The company uses a vendor company’s application that is based on a proprietary database. You query data from the application database and import the data into a SQL Server 2005 database. The application vendor provides you with a new OLE DB driver to be used when querying the application database. Company policy prohibits connections between the SQL Server database and the application database, except when querying this data. You need to provide a way to query data from the application database. What should you?()A Configure a Linked Server connection to the application database.B Write a query that uses an OPENDATASOURCE command.C Write a query that uses an OPENQUERY command.D Configure a Remote Server connection to the application database.

考题 单选题You work as the enterprise exchange administrator at Company.com.The Company.com network consists of a single Active Directory domain named Company.com.Company.com has an Exchange Server 2010 organization.You have received instructions from the CIO to support Autodiscover from the Internet by creating a resource record in DNS.What should you do?()A You should consider creating a Host (A) resource record.B You should consider creating a Text (TXT) resource record.C You should consider creating a Pointer (PTR) resource record.D You should consider creating a Mail exchange (MX) resource record.

考题 单选题You work as the enterprise exchange administrator at Company.com.The Company.com network consists of a single Active Directory domain named Company.com.Company.com has an Exchange Server 2010 organization.You receive a complaint from a Company.com employee named Mia Hamm stating that she is only able to access her mailbox using Outlook Web App.You need to make sure that she can access her Mailbox.What should you do?()A You should consider enabling and set up Outlook Anywhere.B You should consider setting up an Outlook Web App Mailbox policy.C You should consider changing Mia Hamm’s mailbox features.D You should consider removing Autodiscover record from the DNS zone.

考题 单选题Company XYZ receives an invoice from one of its vendors. How is this processed in IBM Maximo Asset Management V6.2 (IMAM)?()A  When an invoice is received by the company, the user will access the Invoices application, enter the receipt information, approve, and then route to Accounts Payable.B  All invoices are routed by IMAM to the Accounts Payable department for matching against existing purchase requisitions (PR). Once the PR is confirmed with the proper approvals, the  Accounts Payable department will process payment.C  When an invoice is received by company XYZ, the user will access the Invoices application, enter the Vendors Invoice information by creating a new record, match the Vendor Invoice to the  Purchase Order (PO), approve, and then route to Accounts Payable.D  When an invoice is received by the company XYZ, the user will go to the PO application, access the PO Line tab, and insure that the receipt box has a Y. If the Y is showed, the invoice will be closed, but if the Y is missing, the invoice will be routed back to the vendor for verification.

考题 单选题All client computers on your company network run Windows 7 and are members of an Active Directory Domain Services domain. Employees using portable computers report that they get connected to a coffee shop wireless network from the company conference room. You need to ensure that the employees connect to the company wireless network by default from anywhere within the company premises. What should you do?()A Configure the Network authentication (Shared mode) setting.B Apply a Wireless Network Policy to set the network type to WPA-PSK.C Apply a Wireless Network Policy to automatically connect to the company wireless network.D Apply a Wireless Network Policy to set the company wireless network as the preferred network.

考题 单选题You work as a network Exchange administrator at Company.com.The Company.com network currently consists of a single Active Directory forest containing a single domain named Company.com.The Company.com organization makes use of Microsoft Exchange Server 2010 as their messaging solution.Company.com recently decided to investigate a user named Rory Allen.During the course of the business week you receive instruction from Company.com to have Rory Allen prevented from deleting the items permanently from his mailbox. What should you do?()A You should consider having the Set-Mailbox Rory Allen -RetainDeletedItemsUntilBackup $true command run.B You should consider having the Set-Mailbox Rory Allen -RetentionHoldEnabled $true command run.C You should consider having the Set-Mailbox Rory Allen -LitigationHoldEnabled $true command run.D You should consider having the Set-Mailbox Rory Allen -ModerationEnabled $true command run.

考题 单选题You work as the enterprise exchange administrator at Company.com.The Company.com network consists of a single Active Directory domain named Company.com.Company.com has an Exchange Server 2010 organization.Due to circumstances, Company.com has acquired a new Internet domain name.This results in that the employees cannot receive e-mail that is sent to the new Internet domain name.The new Internet domain name is set up as an e-mail address suffix.The Company.com employees need to receive e-mail sent from the new Internet domain name. What should you do?()A You should consider using an External Relay Accepted Domain.B You should consider using an Authoritative Accepted Domain.C You should consider using a remote domain.D You should consider using a new Receive connector.

考题 单选题You want to connect to your company network from your Windows 2000 Professional computer at home. You have an ISDN line that is used for internet connectivity. You create a VPN connection and are able to connect successfully to the company network. While connected to the company network, you are unable to access the Internet.   What must you do so that you can access the Internet?()A Configure the ISDN connection to use SLIP instead of PPP.B Select the Enable Internet Connection Sharing for this connection check box in the ISDN connection properties.C Clear the Use default gateway on remote network check box.D Install and configure the SAP Agent service.

考题 单选题You work as the enterprise exchange administrator at Company.com.The Company.com network consists of a single Active Directory domain named Company.com.Company.com has an Exchange Server 2010 organization.A new Company.com policy prohibits the users from changing their password by using Outlook Web App (OWA). What should you do?()A The best option is to set up an Outlook Web App Mailbox policy so that the users comply with the Company.com policy.B The best option is to set up a Group Policy Object so that the users comply with the Company.com policy.C The best option is to change the authentication settings of the OWA virtual directory so that the users comply with the Company.com policy.D The best option is to change the authentication settings of the IISADMPWD virtual directory so that the users comply with the Company.com policy.

考题 单选题You work as a network Exchange administrator at Company.com.The Company.com network currently consists of a single Active Directory forest containing a single domain named Company.com.The Company.com organization makes use of Microsoft Exchange Server 2010 as their messaging solution.During the course of the business week you receive instruction from Company.com to have the permission of a public folder named KingPublic modified.What should you do?()A You should consider using the Microsoft Office Outlook tool.B You should consider using the Public Folder Management Console tool.C You should consider using the Exchange Control Panel (ECP) tool.D You should consider using the Exchange Management Console (EMC) tool.

考题 单选题You work as the enterprise exchange administrator at Company.com.The Company.com network consists of a single Active Directory domain named Company.com.Company.com has an Exchange Server 2010 organization.Company.com has merged with another company named Courseware Publishers.The users at Courseware Publishers complained that they cannot automatically locate the Client Access servers at Company.com.The users need to locate the Client Access servers at Company.com.What should you do?()A The best option is to use an A record for FederatedSharing.Company.com.B The best option is to use an SRV record for _autodiscover._TCP._msdcs.Company.com.C The best option is to use an A record for autodiscover.Company.com.D The best option is to use an SRV record for _FederatedSharing._UDP._msdcs.Company.com.

考题 单选题Which should be the key driver for a company security policy’s creation, implementation and enforcement?()A  the business knowledge of the IT staffB  the technical knowledge of the IT staffC  the company’s business objectivesD  the company’s network topologyE  the IT future directions

考题 单选题You are a database administrator for your company. The company uses a SQL Server 2005 database that includes a table named Inventory. The table contains a column named Price. A company policy states that the value in the Price column cannot be decreased by more than 10 percent in any single database operation. Updates to the Price column are made by various means, including by using ad hoc queries. You need to ensure that this company policy is enforced. What should you do?()A Create a trigger that rolls back changes to the Price column that violate company policy.B Create a stored procedure that disallows changes to the Price column that violate company policy.C On the Price column, create a check constraint that requires a specified minimum value.D On the Price column, create a foreign key constraint to a table that contains valid prices.

考题 单选题Company.com network consists of a single Active Directory domain named  Company.com.Company.com has an Exchange Server 2010 organization.The Company.com employees use Microsoft Office Outlook 2007 to connect to their mailboxes.RPC over HTTP and Auto discover are configured on Microsoft Office Outlook 2007. A new Company.com security policy requires that the employees connected to the domain does not need authentication when using Outlook Anywhere.However, those not connected t the domain needs to be authentication when using Outlook Anywhere.The employees need to comply with the new Company.com security policy.  What should you do?()A You should consider using Basic authentication on Outlook Anywhere and set up only Basic authentication on the RPC virtual directory.B You should consider using NTLM authentication on Outlook Anywhere and set up Basic authentication and NTLM authentication on the RPC virtual directory.C You should consider using NTLM authentication on Outlook Anywhere and set up only Basic authentication on the RPC virtual directory.D You should consider using Basic authentication on Outlook Anywhere and set up Basic authentication and NTLM authentication on the RPC virtual directory.

考题 单选题You are the network administrator for Company.You need to connect to Company’s network from your Windows 2000 Professional computer at home.You have a DSL line that is used for Internet connectivity. You create an L2TP virtual private network(VPN) connection and are able to connect successfully to Company’s network. While connected toCompany’s network, you are unable to access the Internet.You want to be able to access the Internet while connected to Company’s network.How should you configure the connection properties?()A Configure the DSL connection to use PPTP instead of L2TP. B Enable Internet Connection Sharing for the DSL connection properties. C CLEAR THE Use default gateway on remote network check box. D Clear the Require data encryption check box.