-
How can you create a listener class that receives events when the mouse is moved?()
A . By extending MouseListener.
B . By implementing MouseListener.
C . By extending MouseMotionListener.
D . By implementing MouseMotionListener.
E . Either by extending MouseMotionListener or extending MouseListener.
F . Either by implementing MouseMotion Listener or implementing MouseListener.
-
You are creating a Windows Communication Foundation (WCF) service. You need to ensure that the service is compatible with ASP.NET to make use of the session state. Which binding should you use?()
A . NetTcpContextBinding
B . BasicHttpContextBinding
C . NetTcpBinding
D . NetMsmqBinding
-
Although lube oils used in the main lubricating service systems should have a relatively high flash point to avoid ignition, they can create smoke and fire hazards when they ().
A . are exposed to a vacuum
B . come in contact with extremely hot surfaces
C . are reduced in temperature to just above the pour point
D . become extremely agitated or aerated
-
Which of the following attributes should be specified when creating a volume group?()
A . stripe size
B . allocation policy
C . physical partition size
D . number of logical partitio
-
What is a critical piece of information that you should have when creating a VLAN-based implementation plan?()
A . approval from senior management
B . end-user requirements
C . IEEE 802.1X authentication parameters
D . a summary implementation pla
-
What interface is created when an FC Port Channel is created on a Cisco Unified Computing System?()
A . An interface ’san-port-channel’ in NXOS
B . An interface ’port-channel’ in NXOS
C . An interface ’port-channel’ with ’mode fc’ configured
D . An interface ’fc-port-channel’ in NXOS
-
Which of the following resources are created in the WebSphere Application Server configuration when a WebSphere Commerce V5.6 instance is created?()
A . DataSource
B . Virtual Hosts
C . Server Group
D . The selected JDBC Driver
E . Remote Servlet Redirector
-
Your network contains a single Active Directory domain. You need to create an Active Directory Domain Services snapshot. What should you do()
A . Use the Ldp tool.
B . Use the NTDSUtil tool.
C . Use the Wbadmin tool.
D . From Windows Server Backup, perform a full backup.
-
When should you create a role? ()
A . To simplify the process of creating new users using the CREATE USER xxx IDENTIFIED by yyy statement.
B . To grant a group of related privileges to a user.
C . When the number of people using the database is very high.
D . To simplify the process of granting and revoking privileges.
E . To simplify profile maintenance for a user who is constantly traveling.
-
You are building a client for a Windows Communication Foundation (WCF) service. You need to create a proxy to consume this service. Which class should you use?()
A . ChannelFactory
B .
-
When creating a QoS policy dialog box in Cisco UCSM, which four fields can be modified?()
A . name
B . best-effort
C . burst
D . rate
E . host control
-
When creating a Web service which requires reliable delivery of SOAP messages, which transport should be used?()
A . SOAP/TCP
B . SOAP/JMS
C . SOAP/HTTP
D . SOAP/SMTP
E . SOAP/HTTPS
-
When you create a backup control file, where is the resulting file written to?()
A . The database user dump destination directory
B . The database diagnostic destination directory
C . To $ORACLE_HOME/rdbms
D . To $ORACLE_HOME/admin
E . To the directory and filename you specify in the command
-
All of the following are attributes that can be specified when creating a logical volume EXCEPT:()
A . Number of logical partitions
B . Disk where logical volume will reside
C . Size of the logical volume control block
D . Position of the logical volume on the disk
-
When creating a Virtual Ethernet adapter, which of the following steps is done FIRST?()
A . Generate a unique MAC address.
B . Run cfgmgr to create device special files.
C . Create a virtual device with "smitty vlan".
D . Add a virtual Ethernet adapter to the partition profile.
-
Your network contains a single Active Directory domain. You need to create an Active Directory Domain Services snapshot. What should you do()
A . Use the Ldp tool.
B . Use the NTDSUtil tool.
C . Use the Wbadmin tool.
D . From Windows Server Backup, perform a full backup.
-
When defining shipping for a store using WebSphere Commerce Accelerator a seller must create:()
A . shipping jurisdictions for each fulfillment center
B . shipping codes for each set of shipping charges to be applied to products
C . shipping methods for each carrier and service offered by the carrier
D . shipping zones for each geographical region where goods will be shipped
-
Amazon created a delevery service called \Prime\ in 2005.
-
5.something designed and created to serve a particular function and to afford a particular convenience or service
-
You are creating a Windows Communication Foundation (WCF) service. The service endpoints c
You are creating a Windows Communication Foundation (WCF) service. The service endpoints change frequently. On the service, you add a new ServiceDiscoveryBehavior to the Behaviors collection of the ServiceHost Description property. You need to ensure that client applications can communicate with the service and discover changes to the service endpoints.What should you do?()
A. Add a new ServiceDiscoveryBehavior to the Behaviors collection in the client application.
B. Add a new AnnouncementClient to the Behaviors collection in the client application.
C. Use the FindCriteria class and the UdpDiscoveryEndpoint class to set up the binding in the client application.
D. Use the DiscoveryProxy class and the EndpointDiscoveryMetadata class to set up the binding in the client application.
-
You are creating a Windows Communication Foundation (WCF) service based on WSHttpBinding.
You are creating a Windows Communication Foundation (WCF) service based on WSHttpBinding. New audit requirements dictate that callers must be authenticated on every call to ensure that their credentials have not been revoked.You need to ensure that the service will not cache the security request token. What should you do?()
A. Apply a ServiceBehavior attribute to the service implementation class with the lnstanceContextMode property set to Single.
B. In the message security configuration, change clientCredentialType from lssuedToken to UserName
C. In the message security configuration, set establishSecurityContext to false.
D. At the end of every operation, call the SessionStateUtility.RaiseSessionEnd method.
-
You are the administrator of a Junos Pulse Access Control Service implementation. You must restrict authenticated users connected from the branch offices to a few specific resources within the data center. However, when the authenticated users are connected at the corporate office, they are allowed more access to the data center resources.You have created two roles with different levels of access and are trying to determine the best way of controlling when a user is mapped to a specific role. Having the user prompted to manually select their role is possible, but you want to automate the process.Which configuration solves this problem?()
A. Implement a RADIUS request attribute policy to assist with realm selection and create different role-mapping rules for the user in each realm.
B. Implement a directory/attribute server on the realm and set up this server to determine by group membership the proper role to which a user should be mapped.
C. Reorder the role-mapping rules to allow for the more open role to be mapped first and then enable the "stop processing rules when this rule matches" function on this role.
D. Implement a Host Checker policy on the realm that determines the geographic location of the device and restricts the user based on the results of the policy.
-
You are creating a Windows Communication Foundation (WCF) service that is implemented as f
You are creating a Windows Communication Foundation (WCF) service that is implemented as follows.(Line numbers are included for reference only.)01 [ServiceContract]02 [ServiceBehavior(IncludeExceptionDetailsInFaults = true)]03 public class OrderService04 {05 [OperationContract]06 public void SubmitOrder(Order anOrder)07 {08 try09 {10 ...11 }12 catch(DivideByZeroException ex)13 {14 ...15 }16 }17 }You need to ensure that the stack trace details of the exception are not included in the error information sent to the client.What should you do?()
A. Replace line 14 with the following line: throw;
B. Replace line 14 with the following line: throw new FaultException<order>(anOrder, ex.ToString());
C. After line 05, add the following line: [FaultContract(typeof(FaultException<order>))] Replace line 14 with the following line: throw ex;
D. Alter line 05, add the following line: [FaultContract(typeof(FaultException<order>))] Replace line 14 with the following line: throw new FaultException<order>(anOrder, "Divide by zero exception");</order></order></order></order>