-
You create a Web site with membership and personalization enabled. You must use an existing CRM database for storing the membership information. You need to implement the Membership Provider. What should you do?()
A . Modify the connection string in the Web.config file to connect to the CRM database.
B . Add new a SqlMembershipProvider to the Web.config file.
C . Create a custom Membership Provider inheriting from MembershipProvider.
D . Create a custom MembershipUser inheriting from MembershipUser.
-
You are implementing an ASP. NET MVC 2 Web application. You add a controller named Company Controller. You need to modify the application to handle the URL path /company/info. Which two actions should you perform?()
A . Add the following method to the CompanyController class. Function Info() As ActionResult Return View() End Function
B . Add the following method to the CompanyController class. Function Company_Info() As ActionResult Return View() End Function
C . Right-click the Views folder, and select View from the Add submenu to create the view for the action.
D . Right-click inside the action method in the CompanyController class, and select Add View to create a view for the actio
-
You want to be notified when the space usage of an existing critical tablespace has reached 75% of the allocated space. Which option would you use to achieve this?()
A . run a procedure to check the tablespace space usage
B . define the warning threshold for the tablespace at 75% in Database Control
C . create a trigger to be executed when tablespace space usage reaches 75%
D . submit a job by using DBMS_JOB package to check the free space in the tablespace at regular intervals
E . define the warning threshold to be 75% for the tablespace by ALTER TABLESPACE .. ADD THRESHOLD command
-
Your network contains an Active Directory forest. The forest schema contains a custom attribute for user objects. You need to modify the custom attribute value of 500 user accounts. Which tool should you use()
A . Csvde
B . Dsmod
C . Dsrm
D . Ldifde
-
You need to give the MANAGER role the ability to select from, insert into, and modify existing rows in the STUDENT_GRADES table. Anyone given this MANAGER role should be able to pass those privileges on to others. Which statement accomplishes this? ()
A . GRANT select, insert, update ON student_grades TO manager
B . GRANT select, insert, update ON student_grades TO ROLE manager
C . GRANT select, insert, modify ON student_grades TO manager WITH GRANT OPTION;
D . GRANT select, insert, update ON student_grades TO manager WITH GRANT OPTION;
E . GRANT select, insert, update ON student_grades TO ROLE manager WITH GRANT OPTION;
F . GRANT select, insert, modify ON student_grades TO ROLE manager WITH GRANT OPTION
-
You have a Microsoft Hyper-V Server 2008 R2 server. You need to join the server to an existing Active Directory Domain Services (AD DS) domain. Which should you use?()
A . oc set up
B . hvc onfig
C . sc config
D . net config
-
You are designing a plan to migrate an application to Windows Azure. The application generates log files in a proprietary format. You need to recommend an approach for retaining the existing log file format. What should you recommend?()
A . Configure Windows Azure Diagnostics to transfer event logs.
B . Configure Windows Azure Diagnostics to transfer directories.
C . Configure Windows AzureDiagnostics to transfer performance counters.
D . Configure Windows Azure Diagnostics to transfer basic Windows Azure logs.
-
You have an existing Windows Communication Foundation (WCF) service. You need to ensure that other services are notified when the service is started.What should you do?()
A .https://assets.asklib.com/images/image2/2018072616363418269.jpg
B .https://assets.asklib.com/images/image2/2018072616364457826.jpg
C .https://assets.asklib.com/images/image2/2018072616364928567.jpg
D .https://assets.asklib.com/images/image2/2018072616365769508.jpg
-
You are the DBA for an academic database. You need to create a role that allows a group of users to modify existing rows in the STUDENT_GRADES table. Which set of statements accomplishes this? ()
A . CREATE ROLL registrar; GRANT MODIFY ON student_grant TO registrar; GRANT registrar to user 1, user2, user3
B . CREATE NEW ROLE registrar; GRANT ALL ON student_grant TO registrar; GRANT registrar to user 1, user2, user3
C . CREATE ROLL registrar; GRANT UPDATE ON student_grant TO registrar; GRANT ROLE to user1, user2, user3
D . CREATE ROLL registrar; GRANT UPDATE ON student_grant TO registrar; GRANT registrar to user 1, user2, user3;
E . CREATE registrar; GRANT CHANGE ON student_grant TO registrar; GRANT registrar
-
Assume that you would like to clone an existing WebLogic Domain and enable some customizations. What scenario would you choose?()
A . In the Enterprise Manager, find the domain to be cloned. Choose "Clone WebLogic Domain" from the context menu. In the graphical wizard, customize and extend the domain if needed. These steps will only clone only the domain configuration. Binaries with deployments are needed to be cloned by operation on the file system.
B . In the Enterprise Manager, find the domain to be cloned. Choose "Clone WebLogic Domain" from the context menu. In the graphical wizard, customize the domain. These steps clone the binaries and domain configuration. If the extension is needed, perform it after cloning in the WebLogic web-based console.
C . In the Enterprise Manager, find the domain to be cloned. Choose "Clone WebLogic Domain" from the context menu. In the graphical wizard, customize and extend the domain if it is needed. These steps clone the binaries and domain configuration.
D . In the Enterprise Manager, find the domain to be cloned. Choose "Clone WebLogic Domain" from the context menu. These steps clone the binaries and domain configuration. If the customization or extension is needed, complete that after cloning in the WebLogic web-based console.
E . In the file system, copy the domain structure of the configuration directory and paste it in the new location. Modify configuration files for address and port. If further customization is needed, open the WebLogic web-based console and perform these modifications.
-
As an experienced technician, you are responsible for Technical Support in your company. You ask one of the trainees to document the layers of an existing CIS network. Which three statements best characterize this process? ()(Choose three.)
A . It provides reliable input for verifying network consistency.
B . It requires a network audit to support some upgrade decisions.
C . It requires a network audit to support any network restructuring.
D . It begins with gathering organizational input that may be inaccurate.
-
You started a long transaction. Before committing, you executed a query on one of the tables currently being modified. You received the following error: ORA-01555: snapshot too old How would you prevent such an error in the future?()
A . guarantee undo retention
B . add one more redo log group
C . size the redo log files appropriately
D . size the UNDO tablespace appropriately
E . size the SYSTEM tablespace appropriately
F . configure an appropriate undo retention interval
G . change automatic undo management to manual
-
You are perfoming security testing on an existing asp.net web page.You notice that you are able to issue unauthorised postback requests to the page. You need to prevent unauthorised post back requests. which page directive you use?()
A . <%@Page strict = "true" %>
B . <%@Page enableViewStateMac = "true" %>
C . <%@Page EnableEventValidation = "true" %>
D . <%@Page Aspcompact = "true" %>
-
You have an Exchange Server 2010 organization.You need to modify the permissions of a public folder.Which tool should you use?()
A . Exchange Control Panel (ECP)
B . Exchange Management Console (EMC)
C . Microsoft Office Outlook
D . Public Folder Management Console
-
You started a long transaction. Before committing, you executed a query on one of the tables currently being modified. You received the following error: ORA-01555: snapshot too old How would you prevent such an error in the future?()
A . guarantee undo retention
B . add one more redo log group
C . size the redo log files appropriately
D . size the UNDO tablespace appropriately
E . size the SYSTEM tablespace appropriately
F . configure an appropriate undo retention interval
G . change automatic undo management to manual
-
You have a Microsoft Hyper-V Server 2008 R2 server. You need to join the server to an existing Active Directory Domain Services (AD DS) domain. Which should you use?()
A . ocsetup
B . hvconfig
C . sc config
D . net config
-
Your company uses Microsoft Application Virtualization (App-V). You maintain the sequencing for applications. You need to add a template to an existing sequenced application. What should you do?()
A . Edit the application, add the template, and then save the application with a new name.
B . Sequence the template as a new application to the original application installation folder.
C . Restore the sequencing computer and add the template to the original application installation folder.
D . Upgrade the existing sequencing package, add the template to the package, and then save the application.
-
You have an Exchange Server 2010 organization.Your network contains internal DNS servers.You need to ensure that the Hub Transport servers use external DNS servers when they resolve Internet names. What should you modify?()
A . the message delivery properties of the Hub Transport global settings
B . the properties of the default remote domain
C . the properties of the Hub Transport server object
D . the properties of a Send connector
-
As an experienced Network Engineer, you are required to characterize an existing CIS network. In such a situation, what is the last step to take?()
A . Perform a network audit.
B . Form an impression about the network.
C . Use traffic analysis to augment organizational input.
D . Prepare and add to the network description.
-
Your network contains an Active Directory forest. The forest schema contains a custom attribute for user objects. You need to modify the custom attribute value of 500 user accounts. Which tool should you use()
A . Csvde
B . Dsmod
C . Dsrm
D . Ldifde
-
You are designing a test plan for an existing Windows Azure .NET 4 application. Method calls return incorrect results for certain input parameters. You need to recommend an approach for debugging the method calls. What should you recommend?()
A . Attach the remote debugger to the application.
B . Use the Microsoft Visual Studio 2010 Test Manager tool.
C . Use IntelliTrace to collect only eventsfrom the application.
D . Use IntelliTrace to collect events and call information from the application.
-
You have an existing Windows Communication Foundation (WCF) service that exposes a service contract over HTTP. You need to expose that contract over HTTP and TCP. What should you do?()
A . Add a net.tcp base address to the host.
B . Add an endpoint configured with a netTcpBinding.
C . Add an endpoint behavior named netTcpBehavior to the existing endpoint.
D . Add a binding configuration to the existing endpoint named netTcpBinding.
-
You have an Exchange Server 2003 organization. You install a new Exchange Server 2010 server in the organization. You need to ensure that you can modify the default e-mail address policy by using the Exchange Management Console (EMC) What should you do?()
A . Run the Set-EmailAddressPolicy cmdlet.
B . Run the Update-EmailAddressPolicy cmdlet.
C . From the Exchange System Manager, modify the properties of the default recipient policy.
D . From the EMc, select the E-mail Address Policies tab, right-click Default Policy, and then click apply.
-
You have an existing Windows Communication Foundation (WCF) Web service. The Web service i
You have an existing Windows Communication Foundation (WCF) Web service. The Web service is not responding to messages larger than 64 KB. You need to ensure that the Web service can accept messages larger than 64 KB without generating errors. What should you do?()
A. Increase the value of maxReceivedMessageSize on the endpoint binding.
B. Increase the value of maxRequestLength on the httpRuntime element.
C. Increase the value of maxBufferSize on the endpoint binding.
D. Increase the value of maxBufferPoolSize on the endpoint binding.