()wine do you need for the party?A. How muchB. How littleC. How many
You have a server named Server1 that runs a custom application.You deploy the application to a small group of pilot users. You monitor the server performance and obtain the information shown in the exhibit. (Click the Exhibit button.)You need recommend a solution to resolve the performance issue. Your solution must minimize server downtime.What should you recommend? ()A. Rewrite the application.B. Upgrade the server memory.C. Upgrade the server processor.D. Create a scheduled task to reboot the server every four hours.
Which three pre-sales Smart Design documents are available to help you implement and install a solution?()A、 Design GuideB、 Cisco Configuration AssistantC、 Implementation GuideD、 Small Business Product GuideE、 Solution ProfileF、 Application Notes
Which of the following is a benefit of having a Solution Assurance?()A、The need to involve solution experts is removedB、Financial justification of the proposal is enhancedC、Time required to design a solution is decreasedD、Complex solutions are simplified considerably
Your company has a single Active Directory Domain Services (AD DS) domain and 1,000 Windows Vista computers. You are planning to deploy Windows 7 and a custom application. You have the following requirements: The application must be available to only a specific group of users. You must be able to monitor application usage. You need to design a deployment method for the custom application that meets the requirements. Which deployment method should you use in your design?()A、software installation in Group PolicyB、startup scripts in Group PolicyC、Microsoft Application Virtualization (App-V)D、baseline Windows 7 image that includes the custom application
You need to design the retrieval of advertising statistics without compromising security. What should you do?()A、Design a Notification Services solution that sends the advertising statistics to specified subscribers by e-mail.B、Design a SQL Server Web service that runs a stored procedure to return the statistics on a call from the advertisers application.C、Design a Database Mail solution that sends the advertising statistics to e-mail addresses that are specified in a table.D、Design a stored procedure to return the statistics on a call from the advertisers application.E、Design a user-defined function to return the statistics on a call from the advertisers application.
You design a Business Intelligence (BI) solution by using SQL Server 2008. The solution includes a SQL Server 2008 Reporting Services (SSRS) infrastructure in a scale-out deployment. All reports use a SQL Server 2008 relational database as the data source. You implement row-level security. You need to ensure that all reports display only the expected data based on the user who is viewing the report. What should you do?()A、 Store the credential of a user in the data source.B、 Configure the infrastructure to support Kerberos authentication.C、 Configure the infrastructure to support anonymous authentication by using a custom authentication extension.D、 Ensure that all report queries add a filter that uses the User.UserID value as a hidden parameter.
You need to design a method to standardize and deploy a baseline security configuration for servers. You solution must meet business requirements. What should you do?()A、Create a script that installs the Hisecdc.inf security templateB、Use a GPO to distribute and apply the Hisec.inf security templateC、Use the System Policy Editor to configure each server’s security settingsD、Use a GPO to distribute and apply a custom security template
You design a Business Intelligence (BI) solution by using SQL Server 2008. You plan to design the report strategy for a new report project that will be used by a financial application. The application uses five calculations that are implemented in Microsoft .NET Framework 3.5 assemblies. The assemblies are written in the C# language and use the static methods. You need to ensure that the calculations can be used by the expressions in all reports. You also need to ensure consistency within the reports by using the least amount of development effort. What should you do?()A、 Add a reference to the assemblies in the Report Properties References tab. B、 Write the calculation logic used by the calculations by using T-SQL functions. C、 Write the code of the calculation logic into the Report Properties Custom Code tab.D、 Write the calculation logic in each report by using the mathematical functions available natively to SQL Server 2008 Reporting Services (SSRS).
You have an Exchange Server 2010 organization. All users access their mailboxes by using Outlook Web App (OWA). You need to plan a solution to reduce the number of e-mail messages that are accidentally sent todistribution groups that contain company executives. What should you include in the plan?()A、custom MailTipsB、dynamic distribution groupsC、Outlook Protection RulesD、sharing policies
You are evaluating the implementation of two Hyper-V hosts for the Web servers. You need to design a solution that will move the Web servers automatically between the Hyper-V hosts based on the physical resources available. Which software should you include in the design?()A、Microsoft System Center Operations ManagerB、Microsoft System Center Virtual Machine ManagerC、Microsoft System Center Data Protection ManagerD、Microsoft System Center Configuration Manager
You are developing a Windows Forms Application by using the .NET Framework 3.5.You plan to design a composite custom control for the application. You include a ListBox control has a property that provides the item count of the ListBox control. You need to ensure that the property cannot be accessed at design time. Which attribute should you use?()A、[Bindable(false)]B、[DesignOnly(false)]C、[EditorBrowsable(EditorBrowsableState.Never)]D、[Browsable(false)]
You need to design a remote administration solution for servers on the internal network. Your solution must meet business and security requirements. What should you do?()A、Permit administrators to use an HTTP interface to manage servers remotelyB、Permit only administrators to connect to the servers’ Telnet serviceC、Permit administrators to manage the servers by using Microsoft NetMeetingD、Require administrators to use Remote Desktop for Administration connections to manage the servers
You need to recommend a solution for managing the service accounts for SQL1 and SQL2. The solution must meet the company’s security requirements. What should you include in the recommendation?()A、a custom password filterB、a Password Settings object (PSO)C、managed service accountsD、manual password changes
You need to design a method of communication between the IT and HR departments. Your solution must meet business requirements. What should you do?()A、Design a custom IPSec policy to implement Encapsulating Security Payload (ESP) for all IP traffic Design the IPSec policy to use certificate-based authentication between the two departments’ computersB、Design a customer IPSec policy to implement Authentication Header (AH) for all IP traffic. Desing the IPSec policy to use preshared key authentication between the two departments’ computersC、Design a customer IPSec policy to implement Encapsulating Payload (ESP) for all IP traffic. Desing the IPSec policy to use preshared key authentication between the two departments’ computersD、Design a customer IPSec policy to implement Authentication Header (AH) for all IP traffic. Desing the IPSec policy to use certificate-based authentication between the two departments’ computers
单选题You design a Business Intelligence (BI) solution by using SQL Server 2008. The solution includes a SQL Server 2008 Reporting Services (SSRS) infrastructure in a scale-out deployment. All reports use a SQL Server 2008 relational database as the data source. You implement row-level security. You need to ensure that all reports display only the expected data based on the user who is viewing the report. What should you do?()A Store the credential of a user in the data source.B Configure the infrastructure to support Kerberos authentication.C Configure the infrastructure to support anonymous authentication by using a custom authentication extension.D Ensure that all report queries add a filter that uses the User.UserID value as a hidden parameter.
单选题You are planning to deploy Windows 7. You have a custom line-of-business application that is not compatible with Windows 7. You need to design a solution that allows the application to run. What should you do?()AUse the Setup Analysis Tool.BUse the Compatibility Administrator.CUse the Update Compatibility Evaluator.DUse the Windows Compatibility Evaluator.
单选题You are developing a Windows Forms Application by using the .NET Framework 3.5.You plan to design a composite custom control for the application. You include a ListBox control has a property that provides the item count of the ListBox control. You need to ensure that the property cannot be accessed at design time. Which attribute should you use?()A[Bindable(false)]B[DesignOnly(false)]C[EditorBrowsable(EditorBrowsableState.Never)]D[Browsable(false)]
单选题You need to recommend a solution for deploying App1. The solution must support the company’s planned changes. What should you include in the recommendation?()AGroup Policy Software InstallationBMicrosoft Application Virtualization (App-V)CMicrosoft Enterprise Desktop Virtualization (MED-V)DMicrosoft System Center Configuration Manager
单选题Which of the following is a benefit of having a Solution Assurance?()AThe need to involve solution experts is removedBFinancial justification of the proposal is enhancedCTime required to design a solution is decreasedDComplex solutions are simplified considerably
多选题You are evaluating the implementation of two Hyper-V hosts for the application servers. You need to design a solution that will move the application servers automatically between the Hyper-V hosts based on the physical resources available. The solution must minimize the number of Microsoft System Center products deployed to the network. Which software should you include in the design?()AMicrosoft System Center Operations ManagerBMicrosoft System Center Virtual Machine ManagerCMicrosoft System Center Data Protection ManagerDMicrosoft System Center Configuration Manager
单选题You design a Business Intelligence (BI) solution by using SQL Server 2008. You plan to design the report strategy for a new report project that will be used by a financial application. The application uses five calculations that are implemented in Microsoft .NET Framework 3.5 assemblies. The assemblies are written in the C# language and use the static methods. You need to ensure that the calculations can be used by the expressions in all reports. You also need to ensure consistency within the reports by using the least amount of development effort. What should you do?()A Add a reference to the assemblies in the Report Properties References tab. B Write the calculation logic used by the calculations by using T-SQL functions. C Write the code of the calculation logic into the Report Properties Custom Code tab.D Write the calculation logic in each report by using the mathematical functions available natively to SQL Server 2008 Reporting Services (SSRS).
单选题You need to recommend a solution for deploying the custom Word dictionary. What should you include in the recommendation?()ADistributed File System (DFS)BGroup Policy preferencesCOffline servicingDWDS
单选题Which of the following is NOT one of the three details you need to fill in on the New Custom Control dialog?()AName of the custom controlBComments to describe the custom controlCList of the controls that will make up this custom controlDApplication that will contain the custom control
单选题You are the network administrator for your company. The network consists of a single Active Directory domain. The company has an internal network and a perimeter network. The internal network is protected by a firewall. Application servers on the perimeter network are accessible from the Internet. You are deploying 10 Windows Server 2003 computers in application server roles. The servers will be located in theperimeter network and will not be members of the domain. The servers will host only publicly available Web pages. The network design requires that custom security settings must be applied to the application servers. These custom security settings must be automatically refreshed every day to ensure compliance with the design. You create a custom security template named Baseline1.inf for the application servers. You need to comply with the design requirements. What should you do? ()A Import Baseline1.inf into the Default Domain Policy Group Policy object (GPO).B Create a task on each application server that runs Security and Configuration Analysis with Baseline1.inf every day.C Create a task on each application server that runs the secedit command with Baseline1.inf every day.D Create a startup script in the Default Domain Policy Group Policy object (GPO) that runs the secedit command with Baseline1.inf.
单选题You need to recommend a solution for promoting the RODC in the new branch office.What should you include in the recommendations?()AImplement the Windows Search service and implement a custom iFilter.BImplement File Server Resource Manager (FSRM) and configure file classifications.CImplement Microsoft SharePoint Foundation 2010 and create a custom workflow.DImplement a Distributed File System (DFS) namespace and configure folder targets.
单选题You need to recommend a solution for managing the service accounts for SQL1 and SQL2. The solution must meet the company’s security requirements. What should you include in the recommendation?()Aa custom password filterBa Password Settings object (PSO)Cmanaged service accountsDmanual password changes