网友您好, 请在下方输入框内输入要搜索的题目:

题目内容 (请给出正确答案)
单选题
You create a master-detail form. The users need to be able to exit the form quickly, adhering to default transaction processing, regardless of the cursor location. You believe you can achieve this using a Key-Exit trigger. What do you need to do to implement this request? ()
A

Define a Key-Exit trigger for all the blocks in the form.  

B

In the Object Navigator, highlight all the items and define a Key-Exit trigger. 

C

Define a Key-Exit trigger on the primary key item in the master block.

D

No additional key-trigger definition is necessary.


参考答案

参考解析
解析: 暂无解析
更多 “单选题You create a master-detail form. The users need to be able to exit the form quickly, adhering to default transaction processing, regardless of the cursor location. You believe you can achieve this using a Key-Exit trigger. What do you need to do to implement this request? ()A Define a Key-Exit trigger for all the blocks in the form.  B In the Object Navigator, highlight all the items and define a Key-Exit trigger. C Define a Key-Exit trigger on the primary key item in the master block.D No additional key-trigger definition is necessary.” 相关考题
考题 You create a Web application for your company‘s intranet. You want to enable users to customize their versions of the intranet home page. You create sections of content as Web Parts. You need to ensure that users can customize content at any time.Which two code segments should you use?()A.B.C.D.

考题 You create a Web site that is for members only. The Web site allows members to create lists of users that have access to information about member profiles. The name of the list is stored in the listName variable. The user name of the user to whom access is given is stored in the username variable.You need to enable members to manage their lists of users.Which code segment should you use?()A.B.C.D.

考题 You create an intranet Web site for management of project documents. You need to enable all users to browse documents on the site. Only members of the administrators group must be able to upload files. Which code segment of the Web.config file should you use? ()A. allow verbs=GET users=* /deny verbs=POST users=* /allow verbs=POST roles=Administrators /B. allow roles=Administrators /deny users=* /C. allow u sers=Administrators /allow users=* /D. allow v erbs = POST roles=Administrators /deny verbs=POST users=* /allow verbs=GET users=* /

考题 You share your computer with other users. You install a new Microsoft add-on to view videos on the computer. You discover that this add-on conflicts with existing add-ons that other users frequently require.You need to ensure that you are able to view videos without affecting other users.What should you do?()A.AB.BC.CD.D

考题 You deploy a Windows Server 2008 VPN server behind a firewall. Remote users connect to the VPN by using portable computers taht run Windows Vista with the latest service pack. the firewall is configured to allow only secured Web communications. you need to enable remote users to connect as securely as possible. You must achieve this goal without opening any additional ports on the firewall. What should you do? ()A、Create an IPsec tunnelB、Create an SSTP VPN connectionC、Create a PPTP VPN connectionD、Create a L2TP VPN connection

考题 You have an Exchange Server 2010 Mailbox server.All users use Microsoft Office Outlook 2010 to access their mailboxes.You implement a policy that automatically deletes e-mail messages that are older than 90 days.You need to provide users with an alternate location to store email messages that are older than 90 days.Administrators must be able to find the messages in both locations when they perform multi-mailbox searches.What should you create?()A、a .pst file for each user that is stored in a shared folderB、a Personal Archive for each userC、a journal ruleD、a Retention Policy

考题 You design a Business Intelligence (BI) solution by using SQL Server 2008.  You plan to create a SQL Server 2008 Reporting Services (SSRS) solution that contains five sales dashboard reports.  Users must be able to manipulate the reports’ parameters to analyze data. You need to ensure that the following requirements are met: Users can manipulate the parameters for data analysis in a single trip to the data source.  Reports are automatically rendered as soon as they are accessed for the first time. Which two tasks should you perform?()A、 Filter data by using expressions.B、 Specify the default values for each parameter.C、 Create an available values list for each parameter.D、 Create report parameters by using query parameters to filter data at the data source.

考题 Your corporate network has a member server named RAS1 that runs Windows Server 2008 R2. You configure RAS1 to use the Routing and Remote Access Services (RRAS).The companys remote access policy allows members of the Domain Users group to dial in to RAS1. The company issues smart cards to all employees.You need to ensure that smart card users are able to connect to RAS1 by using a dial-up connection.What should you do?()A、Install the Network Policy Server (NPS) server role on RAS1.B、Create a remote access policy that requires users to authenticate by using SPAP.C、Create a remote access policy that requires users to authenticate by using EAP-TLS.D、Create a remote access policy that requires users to authenticate by using MS-CHAP v2.

考题 You have an Exchange Server 2010 organization.You need to ensure that all users in the organization can automatically schedule the use of a projector.What should you do?()A、Create a new sharing policyB、Create a mailboxC、Modify the properties of the Calendar managed default folderD、Modify the schedule for the Managed Folder Assistant

考题 You have an Exchange Server 2010 organization.  Your company acquires another company that has an Exchange Server 2010 organization.  You need to recommend a solution for the Exchange Server 2010 organization to meet the followingrequirements:  .All users must be able to view the global address lists (GALs) for both organizations.All users must be able to view free/busy information for users in both organizations  What should you include in the solution?()A、.Implement Active Directory Federation Services (AD FS) .Run the Microsoft Exchange Inter-Organization Replication toolB、.Implement Microsoft Identity Lifecycle Manager (ILM) 2007 .Create a two-way cross-forest trust between both organizationsC、.Create a federation trust between both organizations .Implement Microsoft Identity Lifecycle Manager (ILM) 2007 .Run the New Organization Relationship wizardD、.Create a two-way cross-forest trust between both organizations .Implement Active Directory Federation Services (AD FS).Run the Microsoft Exchange Inter-Organization Replication tool

考题 Your corporate network has a member server named RAS1 that runs Windows Server 2008. You configure RAS1 to use the Routing and Remote Access Service (RRAS) The companys remote access policy allows members of the Domain Users group to dial in to RAS1. The company issues smart cards to all employees. You need to ensure that smart card users are able to connect to RAS1 by using a dial-up connection. What should you do?()A、 Install the Network Policy Server (NPS) on the RAS1 serverB、 Create a remote access policy that requires users to authenticate by using SPAPC、 Create a remote access policy that requires users to authenticate by using EAP-TLSD、 Create a remote access policy that requires users to authenticate by using MS-CHAP v2

考题 You have a server that runs the Terminal Services Gateway (TS Gateway) role service. Users need to connect remotely through the gateway to desktop computers located in their offices.  You create a security group named Remote1 for the users who need to connect to computers in their offices.  You need to enable the users to connect to the TS Gateway. What should you do?()A、Add the Remote1 security group to the local remote desktop users group on the TS Gateway server.B、Create a client authorization policy. Add the Remote1 security group and enable Device redirection.C、Create a resource authorization policy. Add the Remote1 security group and enable Users to connect to any resource.D、Create a Group Policy object and enable the Set TS Gateway authentication method properties to Ask for credentials, use Basic protocol. Apply the policy to the TS Gateway server.

考题 All client computers on your company network run Windows 7 and are members of an Active Directory Domain Services domain. AppLocker is configured to allow only approved applications to run. Employees with standard user account permissions are able to run applications that install into the user profile folder. You need to prevent standard users from running unauthorized applications. What should you do?()A、Create Executable Rules by selecting the Create Default Rules option.B、Create Windows Installer Rules by selecting the Create Default Rules option.C、Create the following Windows Installer Rule.Deny C Everyone - %OSDRIVE%/Users//Downloads/*D、Create the following Executable Rule.Deny - Everyone - %OSDRIVE%/Users//Documents/*

考题 You are the administrator of a Windows 2000 domain. You develop a graphics software application for users in the Graphics organizational unit (OU). You want to create a custom installation for three users named Carlos, Carmen, and Maria, who are members of the Graphics OU. You want these three users to be able to access additional text, filters, and other graphics options for the software. What should you do? ()A、 Create the Graphic Users OU in the domain. Add a custom .msi file to the Graphics OUB、 Create the Graphic Users OU in the domain. Add a custom .mst file to the Graphics OUC、 Create the Advanced Software OU within the Graphics OU, and add Carlos, Carmen, and  Maria.Create an .msi file, including changes, and apply the modifications to the Advanced Software OUD、 Create the Advanced Software OU within the Graphics OU, and add Carlos. Carmen, and Maria. Create an: mst file, including changes, and apply the modifications to the Advanced Software OU

考题 You create a Web Form. The Web Form allows users to recover their passwords. You add a PasswordRecovery server control by using the following code segment.You need to ensure that the server control generates a new password and sends it by e-mail to the users e?mail address. Which two actions should you perform?()A、Create a valid definition in the Web.config file.B、Set the passwordFormat attribute of the configured membership provider to Encrypted.C、Ensure that the enablePasswordRetrieval attribute of the configured membership provider is set to False.D、Ensure that the enablePasswordRetrieval attribute of the configured membership provider is set to True.

考题 You install a new Exchange Server 2010 organization that contains a single server named erver1.Users report that they receive a large number of unsolicited commercial email (UCE) messages.You need to reduce the amount of UCE messages that users in the organization receive.What should you do?()A、Create a journal rule and then create an Outlook Protection RuleB、Create a Transport Protection Rule and then create a journal ruleC、Run the AntispamCommon.ps1 script and then create a Transport Protection RuleD、Run the Install-AntispamAgents.ps1 script and then configure all transport agents

考题 You create 200 new user accounts. The users are located in six different sites. New users report that they receive the following error message when they try to log on: "The username or password is incorrect." You confirm that the user accounts exist and are enabled. You also confirm that the user name and password information supplied are correct. You need to identify the cause of the failure. You also need to ensure that the new users are able to log on Which utility should you run()A、RsdiagB、RstoolsC、RepadminD、Active Directory Domains and Trusts

考题 You create an intranet Web site for management of project documents. You need to enable all users to browse documents on the site. Only members of the administrators group must be able to upload files. Which code segment of the Web.config file should you use? ()A、allow verbs="GET" users="*" /deny verbs="POST" users="*" /allow verbs="POST" roles="Administrators" /B、allow role s="Administrators" /deny users="*" /C、allow u sers="Administrators" /allow users="*" /D、allow v erbs = "POST" roles="Administrators" /deny verbs="POST" users="*" /allow verbs="GET" users="*" /

考题 You need to ensure that the network administrators are able to administer the NewApp database servers. Which two actions should you perform?()A、Create an organizational unit (OU) for all users who log on to any of the NewApp servers.B、Create an organizational unit (OU) named NewApp Users for the NewApp users.C、Create an organizational unit (OU) named NewApp Servers for the NewApp servers.D、Create a Group Policy object (GPO) for the NewApp Users OU to enforce the use of IPSec.E、Create a global group for all NewApp servers. Add this group to the NewApp Servers OU.F、Create a Group Policy object (GPO) for the NewApp Servers OU to enforce the use of smart cards.

考题 单选题All client computers on your company network run Windows 7 and are members of an Active Directory Domain Services domain. AppLocker is configured to allow only approved applications to run. Employees with standard user account permissions are able to run applications that install into the user profile folder. You need to prevent standard users from running unauthorized applications. What should you do?()A Create Executable Rules by selecting the Create Default Rules option.B Create Windows Installer Rules by selecting the Create Default Rules option.C Create the following Windows Installer Rule.Deny C Everyone - %OSDRIVE%/Users//Downloads/*D Create the following Executable Rule.Deny - Everyone - %OSDRIVE%/Users//Documents/*

考题 单选题You create a master-detail form. The users need to be able to exit the form quickly, adhering to default transaction processing, regardless of the cursor location. You believe you can achieve this using a Key-Exit trigger. What do you need to do to implement this request? ()A Define a Key-Exit trigger for all the blocks in the form.  B In the Object Navigator, highlight all the items and define a Key-Exit trigger. C Define a Key-Exit trigger on the primary key item in the master block.D No additional key-trigger definition is necessary.

考题 多选题You are the network administrator for All network servers run Windows Server 2003. All client computers run Windows XP Professional. You create a folder on thet network and share it as TestKingDocs. You want users to be able to read, create, and modify documents that are stored in the shared folder. You also want users to be able to delete the folders and the files that they create. A user reports that another used deleted a folder that she created. You discover that the Everyone group ias assigned the Allow - Full Control NTFS permission for the folder. You remove all assigned permissions for the Everyone group. You need to configure permission for the TestKingDocs shared folder to meet your requirements. You also need to ensure that users cannot delete the folders and files that other users create. Which two actions should you perform ()(Each correct answer presents part of the solution. Choose two.)AAssign the Authenticated Users group the Allow - Read Execute permission.BAssign the Anonymous group the Allow - Modify permission.CAssign the Creator Owner group the Allow - Modify permission.DAssign the Creator Owner group the Allow - Full Control permission

考题 单选题You are the network administrator for your company. Your network consists of a single Active Directory domain. The functional level of the domain is Windows Server 2003. You add eight servers for a new application. You create an organizational unit (OU) named Application to hold the servers and other resources for the application. Users and groups in the domain will need varied permissions on the application servers. The members of a global group named Server Access Team need to be able to grant access to the servers. The Server Access Team group does not need to be able to perform any other tasks on the servers. You need to allow the Server Access Team group to grant permissions for the application servers without granting the Server Access Team group unnecessary permissions.  What should you do?()A  Create a Group Policy object (GPO) for restricted groups. Configure the GPO to make the Server Access Team group a member of the Power Users group on each application server. Link the GPO to the Application OU.B  Grant the Server Access Team group permissions to modify computer objects in the Application OU.C  Move the Server Access Team group object into the Application OU.D  Create domain local groups that grant access to the application servers. Grant the Server Access Team group permissions to modify the membership of the domain local groups.

考题 单选题You need to create a Password Settings object (PSO).     Which tool should you use()A Active Directory Users and ComputersB ADSI EditC Group Policy Management ConsoleD Ntdsutil

考题 单选题You use Microsoft .NET Framework 4 to create a Windows Presentation Foundation (WPF) application that allows users to arrange images. You need to ensure that users can arrange child elements in a panel without affecting the size of the elements. You also need to ensure that child elements are oriented horizontally. Which control should you use?()A ListBoxB DockPanelC WrapPanelD StackPanel

考题 单选题You are the administrator of a Windows 2000 domain. You develop a graphics software application for users in the Graphics organizational unit (OU). You want to create a custom installation for three users named Carlos, Carmen, and Maria, who are members of the Graphics OU. You want these three users to be able to access additional text, filters, and other graphics options for the software. What should you do? ()A  Create the Graphic Users OU in the domain. Add a custom .msi file to the Graphics OUB  Create the Graphic Users OU in the domain. Add a custom .mst file to the Graphics OUC  Create the Advanced Software OU within the Graphics OU, and add Carlos, Carmen, and  Maria.Create an .msi file, including changes, and apply the modifications to the Advanced Software OUD  Create the Advanced Software OU within the Graphics OU, and add Carlos. Carmen, and Maria. Create an: mst file, including changes, and apply the modifications to the Advanced Software OU

考题 单选题You are developing a tax report for the payroll application. You created a before parameter form report trigger to create three temporary tables to store text that are need while the report is executed. Which report trigger would you use to delete these temporary tables?()A Before parameter form. B After parameter form. C Before report. D After report.

考题 多选题You create a Web Form. The Web Form allows users to recover their passwords. You add a PasswordRecovery server control by using the following code segment.You need to ensure that the server control generates a new password and sends it by e-mail to the users e?mail address. Which two actions should you perform? ()ACreate a valid definition in the Web.config file.BSet the passwordFormat attribute of the configured membership provider to Encrypted.CEnsure that the enablePasswordRetrieval attribute of the configured membership provider is set to False.DEnsure that the enablePasswordRetrieval attribute of the configured membership provider is set to True.