多选题You are configuring SQL1 so that the distributed query in the Sales database can access data in the CRM database on SQL2. You create a linked server for SQL2, and you create a linked server login that uses impersonation.Now, you need to ask the network administrator to configure SQL1. Which two tasks should you ask the administrator to perform?()AAdd the user account that is used by the SQL Server service to the local Administrators group.BEnable the Do not trust this user for delegation Active Domain property for the user account that is used by the SQL Server service.CCreate a Service Principal Name (SPN) for the user account that is used by the SQL Server service.DEnable the Trusted for delegation Active Domain property for the user account that is used by the SQL Server service.
多选题
You are configuring SQL1 so that the distributed query in the Sales database can access data in the CRM database on SQL2. You create a linked server for SQL2, and you create a linked server login that uses impersonation.Now, you need to ask the network administrator to configure SQL1. Which two tasks should you ask the administrator to perform?()
A
Add the user account that is used by the SQL Server service to the local Administrators group.
B
Enable the Do not trust this user for delegation Active Domain property for the user account that is used by the SQL Server service.
C
Create a Service Principal Name (SPN) for the user account that is used by the SQL Server service.
D
Enable the Trusted for delegation Active Domain property for the user account that is used by the SQL Server service.
参考解析
解析:
暂无解析
相关考题:
You are the administrator of a SQL Server 2000 database named Articles. A large city newspaper uses this database to store its archived newspaper articles. Journalists query the database as part of their research. You have created full-text indexes so that users can query the articles quickly.A hardware failure forces you to restore the entire database from backup. After you restore the database, the journalists report that they can no longer run queries without receiving errors.You want to ensure that the journalists can query the database. What should you do?A.Create a new full-text catalog for the Articles databaseB.Rebuild the full-text catalog for the Articles databaseC.Create a new full-text index on the table that holds the text for the articlesD.Repopulate the full-text index on the table that holds the text for the articles
You have an SQL query that takes one minute to execute. You use the following code segment to execute theSQL query asynchronously.Dim ar As IAsyncResult = cmd.BeginExecuteReader()You need to execute a method named DoWork() that takes one second to run while the SQL query is executing.DoWork() must run as many times as possible while the SQL query is executing.Which code segment should you use?()A.B.C.D.
Which two EIGRP options will limit a query domain?()A、configuring EIGRP stubsB、configuring a second EIGRP AS and redistributingC、configuring summary addressesD、configuring an offset-listE、configuring a prefix-listF、configuring unicast neighbors
You are configuring a JMS server with a need for load balancing the messages. To achieve the load balance you should ().A、use regular queues and topics B、use distributed queues and topicsC、not use subdeploymentsD、disable server affinityE、use message paging
You work as the exchange administrator at Company.com.the Company.com network contains an exchange server 2010 organization.Company.com has its headquarters in stockholm where you are located.you are responsible for an exchange 2010 edge transport server named -ex01.during the course of the week you receive an instruction from the cio to make sure that e-mail messages sent to unknown addresses in the organization is rejected automatically.What should you do?()A、You should consider configuring recipient filtering.B、You should consider configuring sender reputation.C、You should consider configuring content filtering.D、You should consider configuring sender filtering.
You need to recommend changes to the environment that meet the company’s user requirements. What should you include in the recommendation?()A、a BranchCache in Distributed Cache modeB、a BranchCache in Hosted Cache modeC、Distributed File System (DFS) namespacesD、Distributed File System (DFS) Replication
You work as the IT professional in an international company which is named wiikigo. You are experienced in implementing and administering a network operating system. You are specialized in configuring IP addressing and services, configuring name resolution and network access and so on. You are in charge of a domain controller that runs windows server 2008 and the DNS server role. The dns server hosts an active directory-integrated zone for your domain. You need to provide a user with the ability to manage records in the zone. But the user must not so what action should you perform?()A、The user permissions on the zone should be granted.B、The user permissions on the DNS zone should be granted.C、The user should be added to the DNSUpdateProxy Global security group.D、The user should be added to the DNSAdmins domain local security group.
TestKing.com has multiple servers in a distributed environment. You work with two SQL Server 2005 computers named SQL1 and SQL2. Each server uses SQL Server Authentication and they use different logins.You need to write a distributed query that joins the data on SQL1 with the data on SQL2. What should you do?()A、Ensure that both SQL1 and SQL2 use the same login name as the security context for each server.B、Configure SQL2 as a remote server. Write the query on SQL1.C、Configure SQL2 as a linked server to impersonate the remote login.D、Configure SQL2 as a distributed server. Use pass-through authentication.
You have a DNS server named Server1 that runs Windows Server 2003 Service Pack 2 (SP2). You create a primary zone on Server1 for contoso.com.You run the DNS simple query test and recursive query test. The simple query test completes successfully, but the recursive query test fails.You need to ensure that the recursive query test can complete successfully. What should you do on Server1?()A、Clear the cache.B、Disable recursion.C、Enable access to the Internet.D、Configure a reverse lookup zone.
You work as the IT professional in an international company which is named wikigo. You are experienced in implementing and administering a network operating system. You are specialized in configuring IP addressing and services, configuring name resolution and network access and so on. Your company has a server named printer a that runs windows server 2008. Printer a has the print services server role installed. You have to reduce the so what action should you perform?()A、After you open the print management console, you should open the properties of each individual printer on printer A and clear the enable advanced printing features option.B、After you open the event viewer console, a custom view for the system log should be created. Exclude the events that are notified by event ID 10 from the filter.C、After you open the print management console, you should open the properties of printer A and clear the log spooler information events option.D、After you open the print management console, you should open the properties of printer A and clear the show informational notifications for network printers option.
Company.com has employed you as their Exchange administrator.The Company.com network contains an Exchange Server 2010 Organization.You are responsible for managing the Company.com network.You receive an instruction from management to reject e-mail messages that have a spam confidence level (SCL) of 5.You thus decide to configure the organization to accomplish this task. What should you do?()A、You should consider configuring the sender reputation.B、You should consider configuring the sender filtering.C、You should consider configuring the content filtering.D、You should consider configuring the recipient filtering.
TestKing.com has two SQL Server 2005 computers named SQL1 and SQL2. Transaction log shipping occurs from SQL1 to SQL2 by using default SQL Server Agent schedule settings. You need to reconfigure transaction log shipping to provide minimum latency on SQL2. What should you do?()A、On SQL1, reschedule the transaction log backup job so that it occurs every minute. On SQL2, maintain default schedule settings for both the log shipping copy and the restore jobs.B、On SQL1,change the schedule type for the transaction log backup to Start automatically when SQL server Agent starts. On SQL2, change the schedule types for both the log shipping copy and the restore jobs to Start automatically when SQL Server gent starts.C、On SQL1, maintain default schedule settings for the transaction log backup job. On SQL2, change the schedule types for both the log shipping copy and the restore jobs to Start automatically when SQL server Agent starts.D、On SQL1, reschedule the transaction log backup job so that it occurs every minute. On SQL2, reschedule both the log shipping copy and the restore jobs so that they occur every minute.
You are a database administrator for your company. You are configuring a new SQL Server 2005 computer named SQL1. SQL1 will run Reporting Services. It will also be configured to automatically perform database backups and other maintenance tasks. There are no other SQL Server computers in the network environment. All access to SQL1 will be made by using SQL1s DNS name. You need to disable any unnecessary services on SQL1. Which service or services should you disable?()A、Internet Information ServicesB、SQL Server BrowserC、SQL Server AgentD、Microsoft Distributed Transaction Coordinator
You work as the IT professional in an international company which is named wiikigo. You are experienced in implementing and administering a network operating system. You are specialized in configuring IP addressing and services. Configuring name resolution and network access and so on.Your company is desigiing its network. The network will use an IPv6 prefix of 2001:DB8: BBCC:0000::/53. You have to identify an IPv6 addressing scheme that will support 2000 subnets. Which network mask should you use?()A、You should use /63.B、You should use /64.C、You should use /61.D、You should use /62.
单选题You work as the IT professional in an international company which is named wiikigo. You are experienced in implementing and administering a network operating system. You are specialized in configuring IP addressing and services. Configuring name resolution and network access and so on.Your company is desigiing its network. The network will use an IPv6 prefix of 2001:DB8: BBCC:0000::/53. You have to identify an IPv6 addressing scheme that will support 2000 subnets. Which network mask should you use?()AYou should use /63.BYou should use /64.CYou should use /61.DYou should use /62.
单选题You are a database administrator for your company. The company has two SQL Server 2005 computers named SQL1 and SQL2. SQL1 is located on the local network. SQL2 is located at a vendors site and is connected by using a VPN over the Internet. You need to write heterogeneous queries on SQL1 that access data from both SQL1 and SQL2. To ensure that your queries are functional, you must configure access to the vendors site. What should you do?()AConfigure an HTTP endpoint for SQL2 on SQL1.BConfigure SQL2 as a linked server on SQL1.CConfigure an HTTP endpoint for SQL1 on SQL2.DConfigure SQL1 as a linked server on SQL2.
多选题You are configuring a JMS server with a need for load balancing the messages. To achieve the load balance you should ().Ause regular queues and topicsBuse distributed queues and topicsCnot use subdeploymentsDdisable server affinityEuse message paging
单选题You want the ability to recovery any time within the last seven days and therefore you configured the recovery window retention policy using the command: RMAN CONFIGURE RETENTIOH POLICY TO RKCOVFRY WINDOW OF 7 DAYS; After configuring the recovery window, you performed the database backup as follows:()A Backup RB1 at log sequence number 12871 on 5th JanB Backup RB2 at log sequence number 15622 on 12th JanC Backup RB3 at log sequence 16721 on 15th JanD On 20th Jan when the log sequence number was 18112 you realize that there Is a need to a point in time at the beginning of the recovery window. You have all an hived redo log files to date.
单选题You need to recommend changes to the software deployment process that meet the company’s technical requirements. What should you include in the recommendation?()ABranchCache in Distributed Cache modeBBranchCache in Hosted Cache modeCdomain-based Distributed File System (DFS)Dstandalone Distributed File System (DFS)
单选题You created a tabular report for the sales department to display each customer and the sales person assign to the customer. The data is sorted by customer using the order by clause in this query. This is department manager asks you to alter the report so that data is sorted by sales person rather than by customer. What is the best way to make the needed change?()ARecreate the query and default the layout. BAlter the query, default the layout and redo the boiler plates. CQuery and manually change the layout to save the boiler plate. DAlter the query and make no further change.
单选题You are a database administrator of two SQL Server 2005 computers named SQL1 and SQL2. You have a Microsoft .NET application that has been modified so that it now accesses a database on SQL2 in addition to SQL1. You do not want the user application to connect directly to SQL2. You need to enable the data retrieval from SQL2 while maintaining the ability to assign different permissions to different users who use the .NET application. What should you do?()AChange the .NET application to define a new server connection to SQL2.BConfigure a linked server on SQL1 to point to SQL2.CConfigure a linked server on SQL2 to point to SQL1.DChange the stored procedures called by the .NET application to include the OPENXML command.
单选题You are creating an online catalog application that will display product information on the company Web site. The product data is stored in a SQL Server 2005 database. The data is stored as relational data but must be passed to the application as an XML document by using FOR XML. You test your application and notice that not all of the items matching your query appear in the XML document. Only those products that have values for all elements in the schema appear. You need to modify your Transact-SQL statement so that all products matching your query appear in the XML document. What should you do?()AAdd an XML index to the table that contains the product data.BAdd the XSINIL argument to the ELEMENTS directive in the query.CAdd a HAVING clause to the query.DAdd the replace value of clause to the query.
单选题You have a large amount of historical data in an operating system file. Some analysts in your organization need to query this data. The file is too large to load into your current database. Which is the most effective method to accomplish the task?()AUpgrade the hardware/memory to accommodate the data.BLoad the data into your database by using the PARALLEL clause.CGive analysts DBA privilege, so that they can query DBA_EXTERNAL_TABLES.DUse an external table so you can have the metadata available in your database, but leave the data in the operating system files.
单选题You work in a company which uses SQL Server 2008. You are the administrator of the company database. Now you are in charge of a SQL Server 2008 instance. Now according to the requirement of the company CIO, users on the SQL Server instance must be able to use the OPENROWSET() function to query remote data source. In the options below, which sp_configure configuration option should you configure?AAgent XPs Bremote access Cremote proc trans DAd Hoc Distributed Queries
单选题Your application must access data that is located on two SQL Server 2005 computers. One of these servers is named SQL1 and the other is SQL2. You have permissions to create a stored procedure on SQL1 to support your application. However,on SQL2 you only have permissions to select data. You write the stored procedure on SQL1. The stored procedure accesses SQL2 by using the OPENQUERY Transact-SQL statement. However,the query fails when executed.You need to troubleshoot the cause of the error. What should you do?()AJoin the two servers by using the four-part syntax of server.database.schema.table.BReference SQL2 by using an alias.CAdd SQL2 as a remote server to SQL1.DAdd SQL2 as a linked server to SQL1.
单选题You work as the IT professional in an international company which is named wiikigo. You are experienced in implementing and administering a network operating system. You are specialized in configuring IP addressing and services, configuring name resolution and network access and so on. You are in charge of a domain controller that runs windows server 2008 and the DNS server role. The dns server hosts an active directory-integrated zone for your domain. You need to provide a user with the ability to manage records in the zone. But the user must not so what action should you perform?()AThe user permissions on the zone should be granted.BThe user permissions on the DNS zone should be granted.CThe user should be added to the DNSUpdateProxy Global security group.DThe user should be added to the DNSAdmins domain local security group.
多选题You are configuring SQL1 so that the distributed query in the Sales database can access data in the CRM database on SQL2. You create a linked server for SQL2, and you create a linked server login that uses impersonation.Now, you need to ask the network administrator to configure SQL1. Which two tasks should you ask the administrator to perform?()AAdd the user account that is used by the SQL Server service to the local Administrators group.BEnable the Do not trust this user for delegation Active Domain property for the user account that is used by the SQL Server service.CCreate a Service Principal Name (SPN) for the user account that is used by the SQL Server service.DEnable the Trusted for delegation Active Domain property for the user account that is used by the SQL Server service.