-
Your MPLS implementation is currently using internal backdoor links. What can you do to minimize the impact of having these links?()
A . use BGP as the CE-PE routing protocol
B . use OSPF as the CE-PE routing protocol
C . use EIGRP as the CE-PE routing protocol
D . use the SP to redistribute routes as external routes for OSPF and EIGRP
E . use route redistribution at each location to ensure external routes are imported into the IGP
-
If you create your database using Oracle Managed Files (OMF), what is true?()
A . You must use Oracle predefined names to identify raw partitions that will hold OMF structures.
B . You must define directories for two online redo log groups and three copies of the control file.
C . If your CREATE DATABASE command fails, any OMF database files that have already been created will be dropped automatically.
D . You must use only OMF data files when adding new tablespaces or data files to your database in the future.
-
You have just created a new VLAN on your network. What is one step that you should include in your VLAN-based implementation and verification plan? ()
A . Verify that trunked links are configured to allow the VLAN traffic.
B . Verify that the switch is configured to allow for trunking on the switch ports.
C . Verify that each switch port has the correct IP address space assigned to it for the new VLAN.
D . Verify that different native VLANs exist between two switches for security purposes.
-
You have a master-detail relationship in the EMPLOYEE form module. You set the Delete Record Behavior property to Cascading. When a user deletes a master record, how does Forms implement the cascade-delete foreign-key rule? ()
A . With a Pre-Delete trigger.
B . With an On-Delete trigger.
C . With a Post-Delete trigger.
D . With the On-Check-Delete-Master trigger.
-
You plan to implement Hyper-V live migration. You configure the Hyper-V hosts to connect to a shared storage. You need to prepare the Hyper-V hosts for the implementation of live migration. What should you configure on the Hyper-V hosts?()
A . Microsoft System Center Operations Manager with Performance and Resource Optimization (PRO)
B . virtual machine queue (VMQ)
C . Network Load Balancing (NLB) for the VMs
D . quick migration
E . Microsoft System Center Virtual Machine Manager 2008 R2
F . Network Load Balancing (NLB) for the Hyper-V hosts
G . Cluster Shared Volumes (CSV)
H . Windows System Resource Manager (WSRM)
I . Virtual Machine Chimney
J . pass-through disks
K . a failover cluster for the Hyper-V hosts
L . Second-Level Address Translation (SLAT)
M . a failover cluster between the VMs
N . Network Attached Storage (NAS)
O . a Fibre Channel Storage Area Network (SAN)
P . an iSCSI Storage Area Network (SAN)
-
You are managing an Oracle Database 10g database that uses Oracle Managed Files (OMF). You enabled the block change tracking feature for the database. Which statement regarding the change tracking file is true?()
A . One block change tracking file is created for each data file. By default, the file is created in DB_CREATE_FILE_DEST.
B . One block change tracking file is created for each data file. By default, the file is created in BACKGROUND_DUMP_DEST.
C . One block change tracking file is created for the database. By default, the file is created in DB_CREATE_FILE_DEST.
D . One block change tracking file is created for the database. By default, the file is created in BACKGROUND_DUMP_DEST.
-
What network information do you need when you plan to implement a VLAN-based solution?()
A . default VLAN information for all unused switch ports
B . 802.1x configuration parameters
C . number of IP subnets needed
D . IP routing protocol informatio
-
You have configured OMF in your database. You enabled the ALTER DATABASE ENABLE BLOCK CHANGE TRACKING; statement to enable the block change tracking feature. What information will be written in the change tracking file?()
A . the system change number
B . the locations of the redo log files
C . the locations of the datafiles
D . the physical location of all the database change
-
What is a critical piece of information that you should have when creating a VLAN-based implementation plan?()
A . approval from senior management
B . end-user requirements
C . IEEE 802.1X authentication parameters
D . a summary implementation pla
-
You are designing a DNS implementation strategy for the network. Which two zone types should you use?()
A . Reverse lookup zones
B . Standard primary zones
C . Standard secondary zones
D . Active Directory-integrated zone
-
You need to implement a solution for the branch office file servers that meets the company's technical requirements. What should you implement on the branch office file servers?()
A . File Server Resource Manager (FSRM) quotas
B . Network Policy Server (NPS) connection request policies
C . NTFS disk quotas
D . Windows System Resource Manager (WSRM) resource allocation policie
-
You have just created a new VLAN on your network for inter-VLAN routing. What is one step that you should include in your VLAN-based implementation and verification plan?()
A . Verify that different native VLANs exist between two switches for security purposes.
B . Verify that the switch is configured to allow for trunking on the switch ports.
C . Verify that each switch port has the proper IP address space assigned to it for the new VLAN.
D . Verify that the VLAN virtual interface has been correctly created and enabled.
-
You need to ensure that the Cust_CalcData column is implemented appropriately. What should you do?()
A . Specify that the Cust_CalcData column must be implemented as a computed column of the table.
B . Specify that the Cust_CalcData column must be indexed using a non-clustered index.
C . Specify that the Cust_CalcData column must be implemented as a column that uses a user-defined data type.
D . Specify that the Cust_CalcData column must be updated by a SQL Server Agent job that runs nightly.
-
You have just created a new VLAN on your network for inter-VLAN routing. What is one step that you should include in your VLAN-based implementation and verification plan?()
A . Verify that different native VLANs exist between two switches for security purposes.
B . Verify that the switch is configured to allow for trunking on the switch ports.
C . Verify that each switch port has the proper IP address space assigned to it for the new VLAN.
D . Verify that the VLAN virtual interface has been correctly created and enabled.
-
You are ready to implement RMAN in the backup and recover strategy for your company. Which system privilege must the RMAN user have to be able to connect and execute RMAN commands on a target database?()
A . SYSDBA
B . SYSOPER
C . No system privileges are required for the RMAN user.
D . Only SYS user can connect and execute RMAN commands on a target database.
-
You have just created a new VLAN on your network. What is one step that you should include in your VLAN based implementation and verification plan? ()
A . Verify that different native VLANs exist between two switches for security purposes.
B . Verify that the VLAN was added on all switches with the use of the show vlan command.
C . Verify that the switch is configured to allow for trunking on the switch ports.
D . Verify that each switch port has the correct IP address space assigned to it for the new VLAN.
-
You are designing an Active Directory implementation strategy to present to executives from your company and from Contoso, Ltd. Which implementation strategy should you use?()
A . Upgrade the New York domain. Upgrade the Chicago domain. Create a pristine forest for Contoso, Ltd.
B . Create a pristine forest. Upgrade the New York domain. Upgrade the Chicago domain. Do nothing further.
C . Create pristine forest. Upgrade the New York domain.Upgrade the Chicago domain.Create a pristine forest for Contoso, Ltd.
D . Create a pristine forest.Upgrade the New York domain. Upgrade the Chicago domain.Create a new child domain for Contoso, Ltd.
-
You are designing an Active Directory implementation strategy to present to executives from your company and from Contoso, Ltd. Which implementation strategy should you use?()
A . Upgrade the New York domain. Upgrade the Chicago domain. Create a pristine forest for Contoso, Ltd.
B . Create a pristine forest. Upgrade the New York domain. Upgrade the Chicago domain. Do nothing further.
C . Create pristine forest. Upgrade the New York domain. Upgrade the Chicago domain. Create a pristine forest for Contoso, Ltd.
D . Create a pristine forest. Upgrade the New York domain. Upgrade the Chicago domain. Create a new child domain for Contoso, Ltd. &e
-
You create a Microsoft ASP.NET application by using the Microsoft .NET Framework version 3.5. You create a class that implements the IHttpHandler interface. You implement the ProcessRequest method by using the following code segment. ()
A.A
B.B
C.C
D.D
-
听力原文:F: Have you started researching your paper on computer programming languages of the future?
M: To tell you the troth, I've been putting it off.
Q: What does the man mean?
(15)
A.He has finished the paper.
B.He put his paper somewhere else.
C.He forgot to begin researching his paper.
D.He postponed the research.
-
听力原文:M: This shirt is a bit too small. Have you got a bigger size?F: Er… I'm afraid we are out of them now. Could you look in again tomorrow?
What do we know from the talk?
A.The man is looking for a smaller shirt.
B.It's time for the shop to close.
C.Bigger shirts may arrive the next day.
-
选出与该句匹配的段落:Some parts of the world have seen successful implementation of family planning.?
-
You are the administrator of a Junos Pulse Access Control Service implementation. You must restrict authenticated users connected from the branch offices to a few specific resources within the data center. However, when the authenticated users are connected at the corporate office, they are allowed more access to the data center resources.You have created two roles with different levels of access and are trying to determine the best way of controlling when a user is mapped to a specific role. Having the user prompted to manually select their role is possible, but you want to automate the process.Which configuration solves this problem?()
A. Implement a RADIUS request attribute policy to assist with realm selection and create different role-mapping rules for the user in each realm.
B. Implement a directory/attribute server on the realm and set up this server to determine by group membership the proper role to which a user should be mapped.
C. Reorder the role-mapping rules to allow for the more open role to be mapped first and then enable the "stop processing rules when this rule matches" function on this role.
D. Implement a Host Checker policy on the realm that determines the geographic location of the device and restricts the user based on the results of the policy.
-
You are creating a Windows Communication Foundation (WCF) service that is implemented as f
You are creating a Windows Communication Foundation (WCF) service that is implemented as follows.(Line numbers are included for reference only.)01 [ServiceContract]02 [ServiceBehavior(IncludeExceptionDetailsInFaults = true)]03 public class OrderService04 {05 [OperationContract]06 public void SubmitOrder(Order anOrder)07 {08 try09 {10 ...11 }12 catch(DivideByZeroException ex)13 {14 ...15 }16 }17 }You need to ensure that the stack trace details of the exception are not included in the error information sent to the client.What should you do?()
A. Replace line 14 with the following line: throw;
B. Replace line 14 with the following line: throw new FaultException<order>(anOrder, ex.ToString());
C. After line 05, add the following line: [FaultContract(typeof(FaultException<order>))] Replace line 14 with the following line: throw ex;
D. Alter line 05, add the following line: [FaultContract(typeof(FaultException<order>))] Replace line 14 with the following line: throw new FaultException<order>(anOrder, "Divide by zero exception");</order></order></order></order>