移动端

  • 题王微信公众号

    微信搜“题王网”真题密题、最新资讯、考试攻略、轻松拿下考试

其他类 | 软件认证工程师考试

模式切换

0 0 0
我的错题 我的收藏 学习笔记

章节目录

单选题 You are a professional level SQL Sever 2008 Database Administrator in an international corporation named Wiikigo. You are experienced in managing databases in an enterprise-level organization, optimizing and sustaining the database life cycle. In the company, your job is to implement solutions on security, troubleshooting, deployment and optimization. A SQL Server 2008 instance is managed by you. The security requirements should be designed for a new database application. A code segment is utilized by the application, and the code segment includes the following components: A method that the registry is accessed on the SQL Server, a method that the file system is accessed on a network file server, and a class definition that public static fields are utilized. SQL CLR integration is utilized by the code segment, and the code segment is implemented as a single assembly. Since you are the technical support, you are required to make sure that the application should be successfully deployed to the instance.    Which action will you perform?()

A

The SAFE code access security should be utilized for the assembly.

B

All public static fields should be replaced with public fields.

C

All public static fields should be utilized with public static read-only fields. And then the assembly shouldbe registered by utilizing the regasm.exe utility before deployment.

D

All public static fields should be replaced with public static read-only fields. And then the EXTERNAL_ACCESS code access security should be utilized for the assembly.

单选题 You have a single Active Directory directory service domain. All domain controllers run Windows Server 2003. All client computers run Windows Vista. The computers in the sales department are located in an organizational unit (OU) named Sales. You use a Default Domain Policy to configure company user and computer settings. You configure a software restriction policy for the domain. The policy prevents users from running software that is not approved.  You need to allow computers in the Sales OU to run software that is not approved while maintaining other required settings.  What should you do?()

A

 Configure the Sales OU to block inheritance.

B

 Create a new software restriction policy that reverses the settings in the Default Domain Policy. Link the new software restriction policy to the Sales OU.

C

 Link the software restriction policy to the Sales OU. Disable the user configuration settings of this policy.

D

 Link the software restriction policy to the Sales OU. Disable the computer configuration settings of this policy.

单选题 You have a Windows 7Windows image (WIM) that is mounted. You need to view the list of third-partydrivers installed in the image.  What should you do?()

A

Run Dism.exe and specify /get-drivers parameter.

B

Run Driverquery.exe and specify the /si parameter.

C

From Device Manager, view all hidden devices.

D

From Windows Explorer, open the /Windows/System32/Drivers folder from the mount folder.

单选题 You need to recommend a strategy to ensure that the administration of AD LDS is encrypted.  What should you include in the recommendation?()

A

a server authentication certificate

B

client authentication certificates

C

Digest authentication

D

Windows Integrated authentication

最新资讯

1 2 3 4 5 下一页 尾页 /

到第