网友您好, 请在下方输入框内输入要搜索的题目:
题目内容
(请给出正确答案)
单选题
You need to design a method to address the chief information officer’s security concerns. What should you do?()
A
Configure Windows Management Instrumentation (WMI) filtering options in the Default Domain Policy GPO
B
Use the gpresult command
C
Use Mbsacli.exe
D
Configure software restriction policy options in the Default Domain Policy GPO
参考答案
参考解析
解析:
暂无解析
更多 “单选题You need to design a method to address the chief information officer’s security concerns. What should you do?()A Configure Windows Management Instrumentation (WMI) filtering options in the Default Domain Policy GPOB Use the gpresult commandC Use Mbsacli.exeD Configure software restriction policy options in the Default Domain Policy GPO” 相关考题
考题
In telephone communication , you should ( )A. get to the point without any greeting or introductionB. keep your company' s address in confidentialityC. make sure you have the information you need
考题
If you need to access information and know where it is on the Web, you only need to enter the entire www address into your browser’s Uniform. Resource Locator (URL) field.()
此题为判断题(对,错)。
考题
You need to configure two Ezonexam switches to exchange VLAN information. Which protocol provides a method of sharing VLAN configuration information between these two switches?A. STPB. 802.1QC. VLSMD. ISLE. VTPF. HSRPG. None of the above
考题
Which of the information should be entered on the form?A.Amount of money earned
B.Name of employer
C.Remittance method used
D.Employee's company address
考题
Your company has a single Active Directory Domain Services (AD DS) domain and 1,000 Windows Vista computers. You are planning to deploy Windows 7 and a custom application. You have the following requirements: The application must be available to only a specific group of users. You must be able to monitor application usage. You need to design a deployment method for the custom application that meets the requirements. Which deployment method should you use in your design?()A、software installation in Group PolicyB、startup scripts in Group PolicyC、Microsoft Application Virtualization (App-V)D、baseline Windows 7 image that includes the custom application
考题
You are designing a test plan for an existing Windows Azure .NET 4 application. Method calls return incorrect results for certain input parameters. You need to recommend an approach for debugging the method calls. What should you recommend?() A、 Attach the remote debugger to the application.B、 Use the Microsoft Visual Studio 2010 Test Manager tool.C、 Use IntelliTrace to collect only eventsfrom the application.D、 Use IntelliTrace to collect events and call information from the application.
考题
You need to design a method to standardize and deploy a baseline security configuration for servers. You solution must meet business requirements. What should you do?()A、Create a script that installs the Hisecdc.inf security templateB、Use a GPO to distribute and apply the Hisec.inf security templateC、Use the System Policy Editor to configure each server’s security settingsD、Use a GPO to distribute and apply a custom security template
考题
You are developing a Web control. The Web control captures user address information in a Web application. You create a class named AddressControl that inherits from CompositeControl. This control consists of child controls. You need to ensure that the child controls are properly output to the browser. Developers using your control must be able to set the appropriate text for labels. In addition, they must be able to pull user address information from the associated text boxes during postback. What should you do? ()A、Override the EnsureChildControls method of the base class. Add the child controls to the base container.B、Override the CreateControlCollection method of the base class. Add the child controls to the ControlCollection class.C、Override the CreateChildControls method of the base class. Add the child controls to the base container.D、Override the DataBindChildren method of the base class. Add the child controls to the ControlCollection class.
考题
You need to design a method to address the chief information officer’s security concerns. What should you do?()A、Configure Windows Management Instrumentation (WMI) filtering options in the Default Domain Policy GPOB、Use the gpresult commandC、Use Mbsacli.exeD、Configure software restriction policy options in the Default Domain Policy GPO
考题
You are developing a custom-collection class.You need to create a method in your class. You need to ensure that the method you create in your class returns a type that is compatible with the Foreach statement. Which criterion should the method meet?()A、The method must return a type of either IEnumerator or IEnumerable.B、The method must return a type of IComparable.C、The method must explicitly contain a collection.D、The method must be the only iterator in the class.
考题
You are a database administrator for your company. A user named Susan belongs to the Windows SalesManagers group. Susan needs a Reporting Services report to display annual sales information by territory. A user named Joe reports to Susan and belongs to the Windows Sales group. He needs a report that is limited to his sales territory, but still displays the same detailed sales data that is on Susan’s report. You need to design a secure solution that meets the reporting needs of the users and that consumes the minimal amount of server resources. What should you do?()A、Design a report for Susan that includes two data regions. One data region is used for summary sales data. The other data region is used for the detailed sales data for each sales representative. Then, design a report for Joe that displays the detailed sales data.B、Design two reports for Susan. One report includes the territory information, and one report includes the detailed sales data. Then, design a report for Joe that displays the detailed sales data for his territories.C、Design a report for Susan that includes the territory information. Then, design a report for Joe that includes detailed sales data for his territories. Finally, configure Susans report so that it includes the data in Joes report.D、Design a parameterized report for Susan that includes all territory information. Then, design a linked report for Joe that links to Susans report.
考题
You work as a Web Developer at Certkiller.com. You are in the process of creating a Webapplication using Microsoft ASP.NET 3.5. You need to ensure that the application is able to load staff information from an XML file into aDataSet instance. The XML file contains an inline schema. You have to call a method of theDataSet class in order to load the information. Identify how you can accomplish this?()A、You should call the ReadXml method with the ReadSchema XML read mode.B、You should call the ReadXml method with the InferTypedSchema XML read mode.C、You should call the ReadXmlSchema method.D、You should call the ReadXml method with the InferSchema XML read mode.
考题
单选题You develop a service application named PollingService that periodically calls long-running procedures.These procedures are called from the DoWork method.You use the following service application code: When you attempt to start the service, you receive the following error message: Could not start the PollingService service on the local computer.Error 1053: The service did not respond to the start or control request in a timely fashion. You need to modify the service application code so that the service starts properly.What should you do?()A
Move the loop code into the constructor of the service class from the OnStart method.B
Drag a timer component onto the design surface of the service. Move the calls to the long-running procedure from the OnStart method into the Tick event procedure of the timer, set the Enabled property of the timer to True, and call the Start method of the timer in the OnStart method.C
Add a class-level System.Timers.Timer variable to the service class code. Move the call to the DoWork method into the Elapsed event procedure of the timer, set the Enabled property of the timer to True, and call the Start method of the timer in the OnStart method.D
Move the loop code from the OnStart method into the DoWork method.
考题
单选题You work as a Web Developer at Certkiller.com. You are in the process of creating a Webapplication using Microsoft ASP.NET 3.5. You need to ensure that the application is able to load staff information from an XML file into aDataSet instance. The XML file contains an inline schema. You have to call a method of theDataSet class in order to load the information. Identify how you can accomplish this?()A
You should call the ReadXml method with the ReadSchema XML read mode.B
You should call the ReadXml method with the InferTypedSchema XML read mode.C
You should call the ReadXmlSchema method.D
You should call the ReadXml method with the InferSchema XML read mode.
考题
单选题You need to design a method to configure the servers in the development department to meet the requirements of the chief information officer. What should you do?()A
Use error reporting on all servers in the development department to report errors for a custom applicationB
Configure all servers in the development department so that they do not require the CTRL+ALT+DELTE keys to pressed in order to log on interactively to the serverC
Create a Group Policy object (GPO) and link it to the development department’s Servers OU. Configure the GPO with an interactive logon policy to display a message for users who attempt to log onD
Configure the screen saver on all servers in the development department to require a password
考题
单选题You need to design a method to encrypt confidential data. Your solution must address the concerns of the chief information officer. What should you do?()A
Encrypt customer information when it is stored and when it is being transmittedB
Require encrypted connections to the public Web site, which is hosted on the Web server on the perimeter networkC
Encrypt all marketing information on file servers and client computersD
Require encrypted connections to all file servers
考题
单选题You are developing a Windows Presentation Foundation (WPF) application.You need to display HTML content from a Web page on the WPF form. What should you do?()A
Add a FlowDocumentReader control to the design surface. Then create a FlowDocument control.B
Add a DocumentViewer control to the design surface. Then create a FixedDocument control.C
Add a WebBrowser control to the design surface. Then use the Navigate method to navigate the URI object.D
Add a ContentControl control to the design surface. Then reference a WebClient object to return an HTML string.
考题
单选题Which of the following information should be entered on the form?A
Amount of money earnedB
Name of employerC
Remittance method usedD
Employee’s company address
考题
单选题In your web application,you need to execute a block of code whenever the session object is first created. Which design will accomplish this goal?()A
Create an HttpSessionListener class and implement the sessionInitialized method with that block ofcode.B
Create an HttpSessionActivationListener class and implement the sessionCreated method with thatblock of code.C
Create a Filter class, call the getSession(false) method, and if the result was null, then execute that block of code.D
Create an HttpSessionListener class and implement the sessionCreated method with that block of code.
考题
单选题You use Reflection to obtain information about a method named MyMethod.You need to ascertain whether MyMethod is accessible to a derived class.What should you do?()A
Call the IsAssembly property of the MethodInfo class.B
Call the IsVirtual property of the MethodInfo class.C
Call the IsStatic property of the MethodInfo class.D
Call the IsFamily property of the MethodInfo class.
考题
单选题You need to recommend a NAP enforcement method that meets the companyˉs security requirements. Which method should you recommend?()A
802.1XB
DHCPC
IPSecD
VPN
考题
问答题Directions: You are preparing to organize a lecture and in need of a prominent professor. Write a letter to invite him. Your letter should cover the following information: (1) the time and place of the lecture; (2) the theme of the lecture; (3) the reasons of bolding such a lecture. You should write about 100 words. Do not sign your own name at the end of the letter. Use "Li Ming" instead. You don't need to write the address.
考题
单选题You need to design a method to protect traffic on the wireless network. Your solution must meet the requirements of the chief security officer. What should you do?()A
Configure the wireless access points in Denver and Dallas to filter unauthorized Media Access Control (MAC) addressesB
Configure the wireless network connection properties for all computers in Denver and in Dallas to use the same network name that the wireless access points useC
Create a GPO and link it to the Denver OU and to the Dallas OU. Create a wireless network policy and configure it to use Windows to configure wireless network settings for the Denver and the Dallas networksD
Create a GPO and link it to the Denver OU and to the Dallas OU. Create a wireless network policy and enable data encryption and dynamic key assignments for the Denver and Dallas networks
考题
单选题You are developing a custom-collection class.You need to create a method in your class. You need to ensure that the method you create in your class returns a type that is compatible with the Foreach statement. Which criterion should the method meet?()A
The method must return a type of either IEnumerator or IEnumerable.B
The method must return a type of IComparable.C
The method must explicitly contain a collection.D
The method must be the only iterator in the class.
考题
单选题You need to recommend a solution for managing the address information of the user accounts. The solution must meet the company’s security requirements. What should you include in the recommendation?()A
Active Directory delegationB
Authorization ManagerC
built-in security groupsD
user rights assignments
考题
单选题You need to design a security solution for WEB1. Your solution must address the chief information officer’s concerns. What should you do?()A
Enable Web distributed Authoring and Versioning (WebDAV) components on WEB1B
Install and configure the URLScan ISAPI filter on WEB1C
Install a computer certificate on WEB1, and enable the Server (Request Security) IPSec policy on WEB1D
Configure the Web site redirection option on the properties of WEB1 in the Internet Service Manager console
考题
单选题You are designing a test plan for an existing Windows Azure .NET 4 application. Method calls return incorrect results for certain input parameters. You need to recommend an approach for debugging the method calls. What should you recommend?()A
Attach the remote debugger to the application.B
Use the Microsoft Visual Studio 2010 Test Manager tool.C
Use IntelliTrace to collect only eventsfrom the application.D
Use IntelliTrace to collect events and call information from the application.
考题
单选题Your company has client computers that run Windows XP Professional. You are planning to install Windows 7 Enterprise on the existing client computers. You need to design a user state migration strategy that minimizes network bandwidth and server use when user data is being migrated. What should you do?()A
Use the Refresh Computer method and a hard-link migration store.B
Use the Refresh Computer method and a compressed migration store.C
Use the Replace Computer method and a hard-link migration store.D
Use the Replace Computer method and a compressed migration store.
热门标签
最新试卷