-
You are designing a migration strategy to meet the business and technical requirements. What should you do? ()
A . Upgrade the fourthcoffee BDC to Windows Server 2003. Then upgrade the PDC to Windows Server 2003
B . Upgrade an existing domain controller to Windows Server 2003. Establish a two-way trust relationship with the fourthcoffee domain.
C . Install and configure a new Windows NT 4.0 BDC. Promote the BDC to a PDC. Then upgrade the PDC to Windows Server 2003
D . Create a new Windows 2000 Server Active Directory domain. Establish a two-way trust relationship with the fourthcoffee domain. Use the Active Directory Migration Tool (ADMT) to migrate all user and computer accounts.
-
You are planning the migration of a Microsoft SQL Server 2008 database to SQL Azure. You need to recommend an approach for ensuring that database connectivity does not degrade. Which two actions should you recommend?()
A . Implement transactions for database queries.
B . Close database connections in the application.
C . Use Microsoft ADO.NET in the data access layer.
D . Implement a retry policy in the data access layer.
-
You send a remote assistance invitation for help. You need to open a personal document without allowing the help desk to view the document. You also need to ensure that the remote assistance session remains connected. What should you do? ()
A . Press the ESC key.
B . Click the Pause option.
C . Click the Stop Sharing option.
D . Minimize the remote assistance session window.
-
In your production database you want to use an Automatic Storage Management (ASM) instance to manage the database files. Which option would you use to migrate the database files from a nonASM instance to an ASM instance?()
A . Oracle Migration Assistant
B . Recovery Manager (RMAN)
C . Oracle Data Pump Export and Import
D . conventional Oracle Export and Import
E . operating system utilities to copy the files to the ASM instance
-
You are designing a Windows Server 2008 R2 Hyper-V environment. Your design includes a failover cluster that supports live migration. You need to ensure that the network supports this design. What should you do?()
A . Use two iSCSI host bus adapters
B . Use two Fibre Channel host bus adapters
C . Place the physical host servers on the same TCP/IP subnet
D . Place the physical host servers on different TCP/IP subnet
-
You want to migrate your existing nonASM files to ASM files for the database PROD. Which method or command would you use to accomplish this task?()
A . the CONVERT command of RMAN
B . Data Pump Export and Import into the same database
C . conventional export and import into the same database
D . the BACKUP DATABASE and RESTORE DATABASE commands of RMAN
E . the BACKUP AS COPY DATABASE and SWITCH DATABASE TO COPY command of RMAN
-
You have a computer that runs Windows XP. The computer has one partition. You install Windows 7 on thecomputer. You need to migrate a user profile from the Windows XP installation to Windows 7 installation. What should you do first?()
A . From Windows 7, run Scanstate.exe /offlineWinOld:c:\windows.
B . From Windows 7, run Scanstate.exe /offlineWinOld:c:\windows.old.
C . At the command prompt, run Xcopy /s /e c:\windows\users\*.* c:\users\.
D . At the command prompt, run Xcopy /s /e c:\windows.old\documents and settings\*.* c:\users\.
-
You plan to implement Hyper-V live migration. You configure the Hyper-V hosts to connect to a shared storage. You need to prepare the Hyper-V hosts for the implementation of live migration. What should you configure on the Hyper-V hosts?()
A . Microsoft System Center Operations Manager with Performance and Resource Optimization (PRO)
B . virtual machine queue (VMQ)
C . Network Load Balancing (NLB) for the VMs
D . quick migration
E . Microsoft System Center Virtual Machine Manager 2008 R2
F . Network Load Balancing (NLB) for the Hyper-V hosts
G . Cluster Shared Volumes (CSV)
H . Windows System Resource Manager (WSRM)
I . Virtual Machine Chimney
J . pass-through disks
K . a failover cluster for the Hyper-V hosts
L . Second-Level Address Translation (SLAT)
M . a failover cluster between the VMs
N . Network Attached Storage (NAS)
O . a Fibre Channel Storage Area Network (SAN)
P . an iSCSI Storage Area Network (SAN)
-
You are designing a plan to migrate an application to Windows Azure. The application generates log files in a proprietary format. You need to recommend an approach for retaining the existing log file format. What should you recommend?()
A . Configure Windows Azure Diagnostics to transfer event logs.
B . Configure Windows Azure Diagnostics to transfer directories.
C . Configure Windows AzureDiagnostics to transfer performance counters.
D . Configure Windows Azure Diagnostics to transfer basic Windows Azure logs.
-
You need to design a strategy for migrating to the mailboxes from Exchange Server 5.5 to Exchange Server 2003. What should you do?()
A . Use the Exchange Migration Wizard to migrate all the mailboxes to the Exchange 2003 Servers
B . Use the Exchange Mailbox Merge Wizard (Exmerge) to migrate all the mailboxes to use the Exchange 2003 servers
C . Use the Exchange Server Migration Wizard to migrate all the mailboxes to the Exchange 2003 Servers
D . Export the contents of each mailbox to a .pst file. Create a new mailbox on the Exchange 2003 servers for each existing mailbox. Import the .pst file contents into each new mailbox
-
You are designing a strategy for migrating the UNIX user accounts to Active Directory. Which three actions should you perform?()
A . Import the user accounts as inetOrgPerson objects.
B . Import the user accounts into Active Directory by using the Ldifde command-line tool.
C . Export all user accounts from the UNIX servers to a text file.
D . Export all user accounts and their passwords from the UNIX servers to a text file. Encrypt this file to achieve extra security.
E . Assign random passwords to each user object, and securely distribute the password to the users.
F . Create the same strong password for each user object, and require users to change their passwords at first logon.
G . Instruct users to use the same name and password as they used on the UNIX servers.
-
You have a computer named Computer1 that runs Windows 7. You plan to migrate the user state on Computer1 by using User State Migration Tool (USMT) 4.0. You need to identify which user documents willbe included in the migration. What should you do?()
A . Run Usmtutils.exe and use the /ec option.
B . Run Sysprep.exe and use the /audit option.
C . Run Loadstate.exe and use the /v:12 option.
D . Run Scanstate.exe and use the /genmigxml option.
-
You are designing a migration strategy to create user IDs for all company users in the new environment. What should you do?()
A . Create a script that uses Active Directory Services Interfaces (ADSI) to import all user account into the new environment.
B . Create new accounts for all users. Create a trust relationship between the existing environment and the new environment to enable access to resources in the existing environment.
C . Import all user accounts into the new environment by using the Active Directory Migration Tool (ADMT).
D . Import all user accounts into the new environment. Instruct users to no change their passwords during the migration phase so that they can access resources in the existing environment.
-
Companycom is migrating their application that was built on AIX 4.3, to a new p5 590 system that is running AIX 5.3. The application was a 32-bit program. What will need to be done with the application to allow it to run on the new system?()
A . Run without recompiling on AIX 5.3
B . Relink to the 32-bit kernel in order to run the application
C . Recompile to run on AIX 5.3 because the libraries are in different locations
D . Recompile 32-bit applications because the compiler flags and versions have changed
-
You are designing a strategy for migrating to the new environment. Which two factions from your current environment will affect your migration strategy?()
A . Trusts between domains
B . Number of BDC s in each domain
C . Users and resources in each domain
D . Current hardware for domain controllers
E . Current amount of replication traffic over WAN link
-
You are designing a strategy for migrating the UNIX user accounts to Active Directory. Which three actions should you perform?()
A . Import the user accounts as inetOrgPerson objects.
B . Import the user accounts into Active Directory by using the Ldifde command-line tool.
C . Export all user accounts from the UNIX servers to a text file.
D . Export all user accounts and their passwords from the UNIX servers to a text file. Encrypt this file to achieve extra security.
E . Assign random passwords to each user object, and securely distribute the password to the users.
F . Create the same strong password for each user object, and require users to change their passwords at first logon.&e
-
Your database is configured on non-ASM disk storage. You need to migrate your database to ASM disk storage. Which statement is true about migrating from non-ASM disk storage to ASM disk storage?()
A . You can use the operating system utility to migrate from non-ASM disk storage to ASM disk storage.
B . You cannot perform a database backup from non-ASM disk storage to tape and then move it to ASM disk storage.
C . You can use the SWITCH DATABASE TO COPY Recovery Manager (RMAN) command to switch back to non-ASM disk storage if you have not deleted your original datafiles.
D . You cannot use Recovery Manager (RMAN) to migrate from non-ASM disk storage to ASM disk storage if you are not using RMAN for your backup and recovery strategies.
-
You are designing a strategy for migrating to the new environment. Which two factions from your current environment will affect your migration strategy?()
A . Trusts between domains
B . Number of BDC s in each domain
C . Users and resources in each domain
D . Current hardware for domain controllers
E . Current amount of replication traffic over WAN link
-
You need to design a migration path for migrating user accounts and mailboxes to the new environment. Which two actions should you perform?()
A . Use the Migration Wizard to create and migrate mailboxes to Exchange Server 2003
B . Use Active Directory Users and Computers to move user accounts and mailboxes to the new environment
C . Use Microsoft Identity Integration Server (MIIS) to synchronize user accounts with the new environment
D . Use the Active Directory Migration Tool (ADMT) to clone user accounts in Active Directory
E . Use ClonePrincipal to migrate user accounts to the new environment
-
You need to identify the features that will be available immediately after the domain migration to the new environment is complete. Which feature or features will be available?()
A . Global group nesting.
B . Universal group nesting.
C . Domain local group nesting.
D . Universal security groups.
E . Sid history attributes.&e
-
You need to check the EMP_EAST partition in the EMPLOYEES table for physical corruptions. You also need to verify that the rows belong to the correct partition. Which option could you use?()
A . LogMiner
B . The DBNEWID utility
C . The DBVERIFY utility
D . The ANALYZE command
E . The RMAN REPORT command
F . The RMAN CROSSCHECK command.
G . The RMAN BLOCKRECOVER command.
-
You are designing a Windows Server 2008 R2 Hyper-V environment. Your design includes a failover cluster that supports live migration. You need to ensure that the network supports this design. What should you do?()
A . Use two iSCSI host bus adapters
B . Use two Fibre Channel host bus adapters
C . Place the physical host servers on the same TCP/IP subnet
D . Place the physical host servers on different TCP/IP subnet
-
You are going to read a magazine article about the popularity of activity holidays. Choose the most suitable heading from the list A-I for each part (1-7) of the article. There is one extra heading which you de net need to use.
A A false sense of security
B Remote destinations
C Too risky for some
D Holidays that don't quite work
E New findings
F Very little real danger
G Too much routine
H Second-hand experiences
I Available to all
Activity Holidays
Whether it's bungee-jumping, climbing or sky-diving, we want to test ourselves on holiday. Peter Jones tries to find out why.
Risk-taking for pleasure is on the increase. Adventure activities and "extreme" sports are becoming very popular and attracting everyone from the young and fit to people who, until recently, were more likely to prefer walking round museums at weekends. Grandmothers are white-water rafting, secretaries are bungee-jumping, and accountants are climbing cliffs.
【B1】__________
Well-planned summer expeditions to tropical locations are now fashionable for European university students. As they wander over ancient rocks or canoe past tiny villages, away from it all, it ]s quite possible to feel "in tune with nature", a real explorer or adventurer.
【B2】__________ A whole blanch of the travel industry is now developing around controlled risks. Ordinary trippers, too, are met off a plane, strapped into rafts or boats and are given the sort of adventure that they will remember for years. They pay their money and they trust their guides, and the wetter' they get the better. Later, they buy the photograph of themselves "risking all in the wild".
【B3】__________
But why the fashion for taking risks, real or simulated? The point that most people make ix that city lie is tame, with little variety, and increasingly corrtroled. Physical exercise is usually restricted to aerobics in the gym on a Thursday, and a game of football or tennis in the park or a short walk at the weekend.
【B4】__________
Says Trish Malcolm, an independent tour operator: "People want a sense of immediate achievement and the social element of shared physical experience is also important.' Other operators say that people find the usual type of breaks-such as a week on the beach-Loo slow. They say that participation in risk sports is a reflection of the restlessness in people. They are always on the go in their lives and want to keep up the momentum on holiday.
【B5】__________ But psychologists think it's even deeper than this. Culturally, we are being separated from the physical, outside world. Recent research suggests that the average person spends less and less time out of doors per day.
【B6】__________ Nature and the great outdoors are mostly encountered through wildlife films or cinema, or seen rushing past the windows of a fast car. In a society where people are continually invited to watch rather than to participate, a two-hour ride down a wild and fast- flowing river can be incredibly exciting.
【B7】__________ One psychologist believes that it is all part of our need to corrtrol nature. Because we have developed the technology to make unsinkable boats, boots that can stop us getting frostbite or rackets that allow us to survive in extreme temperatures, we are beginning to believe that nothing will harm us and that we are protected from nature. That is until nature shows us her true power in the form. of a storm, flood or avalanche.
【B1】______
-
In order to prove or disprove the balancing-act theory of whale migration, what question needs to be answered?
A.Whether or not whales have good eyesight
B.How long baleen whales are able to survive without food
C.How fast baleen whales can swim compared with other kinds of whales
D.Whether moving south saves whales more energy than staying north
此题为多项选择题。