单选题You need to allow the user to toggle between automatic query and no automatic query using a pop-up menu. Which built-in would you use in the menu item command to obtain the relationship name? ()AGET_RELATION_PROPERTY BSET_RELATION_PROPERTY CGET_BLOCK_PROPERTY DGET_FORM_PROPERTY

单选题
You need to allow the user to toggle between automatic query and no automatic query using a pop-up menu. Which built-in would you use in the menu item command to obtain the relationship name? ()
A

GET_RELATION_PROPERTY 

B

SET_RELATION_PROPERTY 

C

GET_BLOCK_PROPERTY 

D

GET_FORM_PROPERTY


参考解析

解析: 暂无解析

相关考题:

You are installing a MAG Series device for access control using an SRX Series device as the firewall enforcer. The MAG Series device resides in the same security zone as users. However, the users reside in different subnets and use the SRX Series device as an IP gateway.Which statement is true?()A. You must configure a security policy on the SRX Series device to allow traffic to flow from the user devices to the MAG Series device.B. No security policy is necessary on the SRX Series device to allow traffic to flow from the user devices to the MAG Series device.C. You must configure host-inbound traffic on the SRX Series device to allow SSL traffic between the MAG Series device and the user devices.D. You must configure host-inbound traffic on the SRX Series device to allow EAP traffic between the MAG Series device and the user devices.

You have a computer that runs Microsoft Windows XP. The computer has a custom application installed.You plan to upgrade the Windows XP computer to Windows Vista.You need to identify whether User Account Control (UAC) will allow the custom application to run without requiring elevated privileges.What should you do?()A.AB.BC.CD.D

You need to implement a high availability design in the Company routed network.  Which protocol  allows for the automatic selection and simultaneous use of multiple available gateways as well as  automatic failover between those gateways?()A、 VRRPB、 GLBPC、 IRDPD、 HSRPE、 None of the other alternatives apply

Which data dictionary table should you query to view the object privileges granted to the user on specific columns?()A、USER_TAB_PRIVS_MADEB、USER_TAB_PRIVSC、USER_COL_PRIVS_MADED、USER_COL_PRIVS

Which two statements are true about the relationship between static NAT and proxy ARP? ()(Choose two.)A、It is necessary to forward ARP requests to remote hosts.B、It is necessary when translated traffic belongs to the same subnet as the ingress interface.C、It is not automatic and you must configure it.D、It is enabled by default and you do not need to configure it.

You need to perform certain data manipulation operations through a view called EMP_DEPT_VU, which you previously created. You want to look at the definition of the view (the SELECT statement on which the view was create.) How do you obtain the definition of the view? ()A、Use the DESCRIBE command in the EMP_DEPT VU view.B、Use the DEFINE VIEW command on the EMP_DEPT VU view.C、Use the DESCRIBE VIEW command on the EMP_DEPT VU view.D、Query the USER_VIEWS data dictionary view to search for the EMP_DEPT_VU view.E、Query the USER_SOURCE data dictionary view to search for the EMP_DEPT_VU view.F、Query the USER_OBJECTS data dictionary view to search for the EMP_DEPT_VU view.

You are a database administrator for your company. The company uses a vendor company’s application that is based on a proprietary database. You query data from the application database and import the data into a SQL Server 2005 database. The application vendor provides you with a new OLE DB driver to be used when querying the application database. Company policy prohibits connections between the SQL Server database and the application database, except when querying this data. You need to provide a way to query data from the application database. What should you?()A、Configure a Linked Server connection to the application database.B、Write a query that uses an OPENDATASOURCE command.C、Write a query that uses an OPENQUERY command.D、Configure a Remote Server connection to the application database.

You are the network administrator for your company. Your network consists of a single Active   Directory domain. Three security groups named Accountants, Processors, and Management are located in an organizational unit (OU) named Accounting. All of the user accounts that belong to these three  groups are also in the Accounting OU. You create a Group Policy object (GPO) and link it to the  Accounting OU. You configure the GPO to disable the display options under the User Configuration  section of the GPO. You need to achieve the following goals: You need to ensure that the GPO applies to  all user accounts that are members of the Processors group. You need to prevent the GPO fromapplying  to any user account that is a member of the Accountants group. You need to prevent the GPO from  applying to any user account that is a member of the Management group, unless the user account is also  a member of the Processors group. What should you do?()A、 Modify the discretionary access control list (DACL) settings of the GPO to assign the Accountants and Management security groups the Deny - Read and the Deny - Apply Group Policy permissions. Modify the DACL of the GPO to assign the users who are in both the Accountants and Management security groups the Allow - Read and the Allow - Apply Group Policy permissions.B、 Modify the discretionary access control list (DACL) settings of the GPO to assign the Accountants and Management security groups the Deny - Read and the Deny - Apply Group Policy permissions. Create a new security group named Mixed that contains all the user accounts from the Processors group and the specific user accounts from the Management group to which you want the GPO to apply. Modify the DACL of the GPO to assign the Mixed security group the Allow - Read and the Allow - Apply Group Policy permissions.C、 Modify the discretionary access control list (DACL) settings of the GPO to assign the Accountants security group the Deny - Read and the Deny - Apply Group Policy permissions. Modify the DACL settings of the GPO to remove the Authenticated Users special group. Modify the DACL settings of the GPO to add the Processors group and assign the Allow - Read and the Allow - Apply Group Policy permissions.D、 Modify the discretionary access control list (DACL) settings of the GPO to assign the Accountants security group the Deny - Read and the Allow - Apply Group Policy permissions. Modify the DACL settings of the GPO to assign the Management security group the Deny - Read and the Deny - Apply Group Policy permissions.

You need to design a method to allow the new-ideas-testking.com Web site to function in accordance with security and business requirements.  What should you do?()A、Require a PPTP VPN for all connections to the Web serverB、Require that traffic between Web browsers and the Web server uses an L2TP/IPSec tunnelC、Require that traffic between Web browsers and the Web server uses SSLD、Require certificate mappings between the Web server and Active Directory

You are the domain administrator for your company's Active Directory domain. All client computers run Windows 2000 Professional. You recently deployed 10 new servers that run Windows Server 2003. You placed the servers in a new organizational unit (OU) named W2K3Servers. Anne is another network administrator. You need to configure the appropriate permissions to allow Anne to manage the new servers by using Terminal Services from her client computer. You need to assign Anne only the permissions she needs to perform her job. What should you do?()A、Add Anne's user account to the local Power Users group on each server that runs Windows Server 2003.B、Add Anne's user account to the Remote Desktop Users group on each server that runs Windows Server 2003.C、Assign Anne's user account the Allow - Read and the Allow - Write permissions for the W2K3Servers OU.D、Configure the Managed By property for the W2K3Servers OU to Anne's user account.

You need to configure the local security policy setting to request a user name and password when you make changes to the computer system.  What should you do?()A、Enable the Password must meet complexity requirements setting.B、Enable the User Account Control: Detect application installations and prompt for elevation setting.C、Configure the Interactive logon: Prompt user to change password before expiration setting to a value between 1 and 999.D、Configure the User Account Control: Behavior of the elevation prompt for administrators in Admin Approval mode setting to the Prompt for credentials option.

You use Microsoft .NET Framework 4 to create a Windows Presentation Foundation (WPF) application. The application has multiple data entry windows. Each window contains controls that allow the user to type different addresses for shipping and mailing. All addresses have the same format. You need to ensure that you can reuse the controls. What should you create?()A、a user controlB、a data templateC、a control templateD、a control that inherits the Canvas class

You need to recommend a solution for storing user documents. What should you include in the recommendation?()A、folder redirectionB、home foldersC、mandatory user profilesD、roaming user profiles

You are developing an ASP.NET Web application. The application must pass an object that contains user-specific data between multiple pages. The object ismore than 100 KB in size when serialized.You need to minimize the amount of data is sent to the user. What should you do?()A、Pass the object data in a hidden field.B、Store the object instance in a session variable.C、Use a cookie that contains the object data.D、Encode the object data and pass it in a query string parameter.

You have stored confidential financial data in a shared folder named AccSecured on your Windows 2000 Prfessional computer. Your company hires an intern named Richard.  You create a subfolder named intern, which Richard needs to access. You want to allow Richard access to the intern subfolder only. You create a user account named intern. You want to allow the intern user account the ability to update, create, and delete files within the intern folder. You need to prevent Richard from accessing any other files or folders within the AccSecured folder.  What should you do?()A、Map a network drive to the AccSecured/intern folder from Richard’s computer.B、Map a network drive to the AccSecured shared folder from Richard’s computer.C、Allow the intern user account modify permissions on the intern subfolder.D、Allow the intern user account traverse folder/execute file permission on the AccSecured folder.E、Allow the intern user account list folder content permission on the AccSecured folder. Removeread extended attributes and read permissions.

You are designing a Windows Azure application that will use Windows Azure Table storage. The application will allow teams of users to collaborate on projects.  Each user is a member of only one team. You have the following requirements:   - Ensure that each user can efficiently query records related to his or her team’s projects.  - Minimize data access latency.   You need to recommend an approach for partitioning table storage entities. What should you recommend? ()A、 Partition by user.B、 Partition by team.C、 Partition by project.D、 Partition by the current date.

You are the network administrator for The network consists of a single Active Directory domain named The functional level of the domain is Windows Server 2003. Some user accounts have expiring passwords and some do not. You need to identify all user accounts that do not have expiring passwords. You need to modify the password property to allow the passwords on these accounts to expire. You must complete this task by using the minimum amount of administrative effort. First, you create a saved query to obtain a list of all user accounts that do not have expiring passwords. What should you do next?()A、Export the query results to a comma-delimited file. Use a CSVDE script to modify the password property of each user account.B、From the Results pane of the query, select all user accounts and modify their password properties simultaneously.C、Export the query results to a comma-delimited file. Use an LDIFDE script to modify the password property of each user account.D、From the Results pane of the query, select each user account and modify the password property, one by one.

单选题You need to allow the user to toggle between automatic query and no automatic query using a pop-up menu. Which built-in would you use in the menu item command to obtain the relationship name? ()AGET_RELATION_PROPERTY BSET_RELATION_PROPERTY CGET_BLOCK_PROPERTY DGET_FORM_PROPERTY

单选题You perform a clean installation of Windows XP Professional on a computer. The computer is a member of a workgroup. You need to enable offline files on the computer. What should you do first?()ADisable Fast User Switching.BRun the Accessibility Wizard. CSet the Startup type of the Volume Shadow Copy Service (VSS) to Automatic.DSet the Startup type of the Network Location Awareness (NLA) service to Automatic.

单选题You are designing a Windows Azure application that will use Windows Azure Table storage. The application will allow teams of users to collaborate on projects.  Each user is a member of only one team. You have the following requirements:   - Ensure that each user can efficiently query records related to his or her team’s projects.  - Minimize data access latency.   You need to recommend an approach for partitioning table storage entities. What should you recommend? ()A Partition by user.B Partition by team.C Partition by project.D Partition by the current date.

单选题You received complaints about the degradation of SQL query performance. You identified top SQL queries that consume time. What would be your next step to find out recommendations about statistics collection and restructuring of the SQL statement to improve query performance?()Arun Segment AdvisorBrun SQL Tuning Advisor on top SQL statementsCrun the Automatic Workload Repository (AWR) reportDrun the Automatic Database Diagnostic Monitor (ADDM)on top SQL statements

单选题You and Stephen are the desktop administrators for your company. You install a printer on your Windows XP Professional computer. You share this printer on the company network. You want to ensure that only members of the DTAdmins local group can use this printer, and that only you and Stephen can manage the printer and all print jobs. You also want to ensure that members of the DTAdmins local group can manage only their own print jobs. How should you configure security on this printer?()AGrant Allow - Print permission to the DTAdmins group. Grant Allow - Manage Documents permission to your user account and to Stephen’s user account. BGrant Allow - Print permission to the DTAdmins group. Grant Allow - Manage Documents and Allow - Manage Printers permissions to your user account and to Stephen’s user account. CGrant Allow - Manage Documents permission to the DTAdmins group. Grant Allow - Manage Printers permission to your user account and to Stephen’s user account. DGrant Allow - Print permission to the DTAdmins group. Remove Allow - Manage Documents permission from the Creator Owner group. Grant Allow - Manage Printers permission to your user account and to Stephen’s user account.

单选题You are the network administrator for your company. The network consists of a single Active Directorydomain. The functional level of the domain is Windows Server 2003.Some user accounts have expiring passwords and some do not. You need to identify all user accounts that do not have expiring passwords. You need to modify the passwordproperty to allow the passwords on these accounts to expire. You must complete this task by using the minimum amount of administrative effort.First, you create a saved query to obtain a list of all user accounts that do not have expiring passwords.What should you do next? ()AExport the query results to a comma-delimited file. Use a CSVDE script to modify the password property of each user account.BFrom the Results pane of the query, select all user accounts and modify their password properties simultaneously.CExport the query results to a comma-delimited file. Use an LDIFDE script to modify the password property of each user account.DFrom the Results pane of the query, select each user account and modify the password property, one by one.

单选题You use Microsoft .NET Framework 4 to create a Windows Presentation Foundation (WPF) application. The application has multiple data entry windows. Each window contains controls that allow the user to type different addresses for shipping and mailing. All addresses have the same format. You need to ensure that you can reuse the controls. What should you create?()Aa user controlBa data templateCa control templateDa control that inherits the Canvas class

单选题Your network contains an Active Directory forest.   You set the Windows PowerShell execution policy to allow unsigned scripts on a domain controller in the  network.  You create a Windows PowerShell script named new-users.ps1 that contains the following lines:  new-aduser user1  new-aduser user2  new-aduser user3  new-aduser user4  new-aduser user5  On the domain controller, you double-click the script and the script runs. You discover that the script fails to create the user accounts.   You need to ensure that the script creates the user accounts.   Which cmdlet should you add to the script()AImport-ModuleBRegister-ObjectEventCSet-ADDomainDSet-ADUser

单选题You have a computer that runs Windows 7 and Windows Internet Explorer 8. A user named User1 attemptsto access a Web page. User1 fails to access the Web page and receives an error message stating that thepage does not have a rating. You need to configure Internet Explorer to allow User1 to access Web pagesthat do not have a rating.  Which settings should you modify?()AContent AdvisorBInPrivate FilteringCParental ControlsDRestricted sites

单选题You are installing a MAG Series device for access control using an SRX Series device as the firewall enforcer. The MAG Series device resides in the same security zone as users. However, the users reside in different subnets and use the SRX Series device as an IP gateway.Which statement is true?()AYou must configure a security policy on the SRX Series device to allow traffic to flow from the user devices to the MAG Series device.BNo security policy is necessary on the SRX Series device to allow traffic to flow from the user devices to the MAG Series device.CYou must configure host-inbound traffic on the SRX Series device to allow SSL traffic between the MAG Series device and the user devices.DYou must configure host-inbound traffic on the SRX Series device to allow EAP traffic between the MAG Series device and the user devices.

单选题You need to implement a high availability design in the Company routed network.  Which protocol  allows for the automatic selection and simultaneous use of multiple available gateways as well as  automatic failover between those gateways?()A VRRPB GLBPC IRDPD HSRPE None of the other alternatives apply