You set the recovery window to seven days and the backup optimization to ON using the CONFIGURE command of Recovery Manager (RMAN). The most recent backup of the TOOLS tablespace to disk was taken on January 3. The TOOLS tablespace is read/x7fonly. On February 21, when you execute a command to back up all the tablespaces to disk, you find that RMAN backs up the TOOLS tablespace also, even though the contents of the tablespace have not changed after the backup on January 3. Because there are no changes made to the TOOLS tablespace, you decide that the tablespace should not be backed up by RMAN. What can you to do skip backing up the TOOLS tablespace without changing the current backup optimization setting?()
第1题:
You work as the enterprise exchange administrator at Xxx .Xxx is using Microsoft Exchange Server 2010 as their messaging solution.A new Xxx usage policy prohibits the employees from using certain words in internal e-mail messaging.What actions must you take to have the policy implemented?()
第2题:
You have an Exchange Server 2010 organization that contains 20 mailbox databases. You configure each database to retain all deleted items for 30 days.You need to ensure that all items that pass the retention period are permanently deleted daily between 02:00 and 06:00. Which cmdlet should you use?()
第3题:
You are configuring an 802.1Q trunk between a Layer 2 switch and a firewall. You read in the documentation that the best way to set up a trunk is to set the port as dynamic desirable. The trunk is not coming up. Which one of these options would be a valid explanation? ()
第4题:
You work as a database administrator for Certkiller .com. You want to create your database with the automatic undo management feature enable.Which two tasks must you perform to achieve this?()
第5题:
You are developing a Windows Communication Foundation (WCF) service. You need to enable security auditing for all events. What should you do?()
第6题:
You develop a Web application that contains two master pages. You need to dynamically set the master page when a user views pages in the application. What should you do? ()
第7题:
You are developing a class library. Portions of your code need to access system environment variables. You need to force a runtime SecurityException only when callers that are higher in the call stack do not have the necessary permissions. Which call method should you use?()
第8题:
You are debugging a Windows Communication Foundation (WCF) service. The service uses signed and encrypted messages.You need to configure logging so that you can read the contents of the messages. What should you do?()
第9题:
You work as the enterprise exchange administrator at Xxx .The Xxx network consists of a domain named xxx .What actions must you take to use administrative delegation on a series of cmdlets?()
第10题:
Your organization has Exchange Server 2010.You need to ensure that users in the organization are notified before they send e-mail messages to external recipients. Which cmdlet should you run?()
第11题:
Create a custom action and set the NoImpersonate property to true
Create a custom action and set the NoImpersonate property to false
Create a manifest and set the RequestedExecutionLevel level attribute to AsInvoker
Create a manifest and set the RequestedExecutionLevel level attribute to AsAdministrator
第12题:
You should set query governor cost limit
You should set cost threshold for parallelism
You should set priority boost
You should set precompute rank
第13题:
You set up scheduled tasks to run and notify you of any failures. 3 days later you see that none of the tasks ran and you received no notifications. What should you do?()
第14题:
You plan to use Windows PowerShell scripts to configure system settings when you deploy Windows 7. You need to ensure that Windows PowerShell scripts will run on the client computers during initial setup. What should you do?()
第15题:
A new switch is being installed and you have been assigned the task of connecting it to an existing switch. In doing this, you want to set up the VLAN Trunking Protocol so that VLAN information can be passed between the switches. Which of the following must you do to accomplish this?()
第16题:
Which of the following would you use to enable automatic media recovery for a database?()
第17题:
You work in a company which uses SQL Server 2008. You are the administrator of the company database. Now you are in charge of a SQL Server 2008 instance. There are queries that have an estimated execution cost less than 3. You intend to configure the instance, make it use a single thread for these queries. In the options below, which sp_configure configuration option should you set?()
第18题:
You have a secured Windows Communication Foundation (WCF) service. You need to track unsuccessful attempts to access the service. What should you do?()
第19题:
You are creating a Windows Forms application by using the .NET Framework 3.5.You have resource files in five different languages.You need to test the application in each language. What should you do?()
第20题:
You are developing an ASP.NET Web page. You add a data-bound GridView control. The GridView contains a TemplateField that includes a DropDownList. You set the GridViews ClientIDMode property to Static, and you set the ClientIDRowSuffix property to ProductID. You need to be able to reference individual DropDownList controls from client-side script by using the ProductID. What should you set the ClientIDMode property of the DropDownList to? ()
第21题:
You are developing an application that will perform mathematical calculations.You need to ensure that the application is able to perform multiple calculations simultaneously. What should you do?()
第22题:
When you configure access to the wired network at home, set the wired network adapter location type to Public.
When you configure access to the wired network at home, set the wired network adapter location type to Private.
When you configure access to the public wireless access points, set the wireless network adapter location type to Public.
When you configure access to the public wireless access points, set the wireless network adapter location type to Private.
第23题:
Configure the resource-allocation policy and set the maximum working set limit option to half the available memory on the server. Set the new policy as a Profiling Policy.
Configure the resource-allocation policy and set the maximum working set limit option to half the available memory on the server. Set the new policy as a Managing Policy.
Configure the resource-allocation policy and set the maximum committed memory option to half the available memory on the server. Set the new policy as a Profiling Policy.
Configure the resource-allocation policy and set the maximum committed memory option to half the available memory on the server. Set the new policy as a Managing Policy.
第24题:
Create a custom action and set the NoImpersonate property to true
Create a custom action and set the NoImpersonate property to false
Create a manifest and set the RequestedExecutionLevel level attribute to AsInvoker.
Create a manifest and set the RequestedExecutionLevel level attribute to AsAdministrator.