单选题Certkiller.com has employed you as a system administrator. Your job function encompassescreating an ASP.NET application for the network. You make use of Microsoft .NET Frameworkv3.5 to creaste the application.  You receive a request from management to capture the timing and performance data of the newlycreated application. For security purposes you need to make sure that he data is only availablewhen a Certkiller user is logged on to the Web server and not on individual Web pages.  What should you do?()AYou should consider adding trace enabled=true writeToDiagnosticsTrace=truepageOutput=true localOnly=true / to the Web.config file.BYou should consider adding compilation debug=false urlLinePragmas=true / to theWeb.config file.CYou should consider adding trace enabled=true pageOutput=false localOnly=true / tothe Web.config file.DYou should consider adding compilation debug=true / to the Web.config file.

单选题
Certkiller.com has employed you as a system administrator. Your job function encompassescreating an ASP.NET application for the network. You make use of Microsoft .NET Frameworkv3.5 to creaste the application.  You receive a request from management to capture the timing and performance data of the newlycreated application. For security purposes you need to make sure that he data is only availablewhen a Certkiller user is logged on to the Web server and not on individual Web pages.  What should you do?()
A

You should consider adding <trace enabled=true writeToDiagnosticsTrace=truepageOutput=true localOnly=true /> to the Web.config file.

B

You should consider adding <compilation debug=false urlLinePragmas=true /> to theWeb.config file.

C

You should consider adding <trace enabled=true pageOutput=false localOnly=true /> tothe Web.config file.

D

You should consider adding <compilation debug=true /> to the Web.config file.


参考解析

解析: 暂无解析

相关考题:

— How long _____ at this job? — Since 2000.A、were you employedB、have you been employedC、had you been employedD、will you be employed

Certkiller.com has given you the task of serializing an object and writing it to a data file using binary serialization.You need to ensure that you meet these requirements.What should you do?() A.B.C.D.

You are a network administrator for Ezonexam.com's Windows 2000 network.Your network has 200 Windows 2000 Professional computers and 15 Windows 2000 Server computers.Users on the network save their work files in home folders on a network server. The NTFS partition that contains the home folders has Encrypting File System (EFS) enabled. A user named Jack Bauer leaves the company. You grant her manager the Full Control NTFS permission to Jack's home folder. When the manager attempts to open any of the files, she receives the following error message: "Access is denied."What should you do?A.Use System File Checker (SFC) to decrypt the file.B.Log on the network as the Recovery Agent. Decrypt the files for the manager.C.Log on the network as the administrator. Use the cipher command to decrypt the files.D.Log on the network as a member of the Backup Operators group. Decrypt the files for the manager.

Have you ever been employed?

Certkiller.com has asked you to create an application to display all of the top directories based on the drive path.You need to ensure that the application displays the number of files within top-level directories.What should you do?()A.B.C.D.

Certkiller .com has asked you to develop an application that displays the properties for all Certkiller.com‘s network drives.The information generated by this application will be utilized by Certkiller .com‘s network administrators to verify client setups.You need to ensure that these requirements are fully satisfied.What should you do?()A.B.C.D.

Your company has an Active Directory domain that has two domain controllers named DC1 and DC2.You prepare both servers to support event subscriptions. On DC1, you create a new default subscription for DC2. You need to review system events for DC2. Which event log should you select?()A、system log on DC1B、application log on DC2C、Forwarded Events log on DC1D、Forwarded Events log on DC2

Certkiller.com has employed you as a system administrator. You are in the process of creating anASP.NET application using Microsoft.NET Framework v3.5. This application will be hosted on aserver named CERTKILLER-SR01. CERTKILLER-SR01 is configured to run Microsoft IIS 5.0.  You are assigned a computer named CERTKILLER-WS02. You make use of CERTKILLER-WS02to log on to the companies domain with an account named CKUser. CERTKILLER-SR01 andCERTKILLER-WS02 are both members of the Certkiller.com domain. To ensure productivity youneed to establish the necessary permissions to allow remote debugging.  What should you do?()A、Your best option would be to ensure that the Remote Debugging Monitor is set to make use of Windows Authentication.B、Your best option would be to ensure that the CKUser account is added to the domainAdministrators group.C、Your best option would be to ensure that the ASP.NET worker process is changed onCERTKILLER-SR01 to run as the local Administrator account.D、Your best option would be to ensure that the CKUser account is added to the localAdministrators group on CERTKILLER-SR01.

You were recently hired by Certkiller .com as a database administrator. You are asked to find out whether the currently functional listener process, named L1, has been password protected or not. You are not familiar with the file system of the new organization. How would you accomplish the task?()A、 by using the STATUS command of the Listener control utilityB、 by using the STATUS L1 command of the Listener control utilityC、 by using the SHOW RULES command of the Listener control utilityD、 by using the SET PASSWORD command of the Listener control utilityE、 by searching for the PASSWORD_LISTENER entry in the listener.ora file

You have been recently hired as a database administrator. Your senior manager asks you to study the production database server and submit a report on the settings done by the previous DBA.  While observing the server settings, you find that the following parameter has been set in the parameter file of the database:  REMOTE_OS_AUTHENT = TRUE  What could have been the reason to set this parameter as TRUE?()A、to enable operating system authentication for a remote clientB、to restrict the scope of administration to identical operating systemsC、to allow the start up and shut down of the database from a remote clientD、to enable the administration of the operating system from a remote clientE、to disable the administration of the operating system from a remote client

Certkiller.com has employed you as a system administrator. You are in the process of creating anASP.NET AJAX application using .NET Framework v3.5.  You receive an instruction from management to debug the JavaScript code in the application. Youthen attach Microsoft Visual Studio 2008 debugger to the Microsoft Internet Explorer instance. Youneed to make sure that the details of the client side object on the debugger console is displayedon the application.  What should you do?()A、This can be achieved using the Sys.Debug.fail method.B、This can be achieved using the Sys.Debug.traceDump method.C、This can be achieved using the Sys.Debug.trace method.D、This can be achieved using the Sys.Debug.assert method.

Your company has a network that has 100 servers. You install a new server that runs Windows Server 2008. The server has the Web Server (IIS) role installed. You discover that the Reliability Monitor has no data, and that the system stablitiy chare has never been updated. You nede to configure the server to collect the reliability monitor data.  What should you do()?  A、Run the perfmon.exe /sys command on the serverB、Configure the Task schduler service to start automaticallyC、configuyre the Remote Registry serice to start automaticallyD、configure the Secondary Login service to start automatically.

TestKing.com has employed you as their Exchange Administrator. The TestKing.com network contains an Exchange Server 2010 Organization. The Exchange organization contains multiple Hub TransportServers. On of the Hub Transport servers named TESTKING-EX01 is used by a line of business application that retries e-mail messages. The application is configured to only send e-mail messages to a single SMTPserver. You receive an instruction from the CIO to ensure that the application is able to retry e-mailmessages of TESTKING-EX01 tabs. What should you do?()A、You should consider having failover clustering installed and configuring on the Hub Transport servers.B、You should consider having Windows network load balancing implementing on the Hub Transport servers.C、You should consider having log transactions implemented.D、You should consider having multiple MX records created for the Hub Transport servers in the internal DNS zone.

Your company has a main office and 10 branch offices. You have an Exchange Server 2010 organization.  All Exchange servers are installed on virtual machines.  You need to create a monitoring plan for the Exchange servers that meets the following requirements:.Identify Exchange server errors .Provide alerts when Exchange services are stopped .Produce statistical analysis and reporting Which tool should you include in the plan?()A、Microsoft System Center Service ManagerB、Microsoft System Center Operations ManagerC、Microsoft System Center Configuration ManagerD、Microsoft System Center Virtual Machine Manager

Certkiller.com has an active directory forest on a single domain.  Certkiller needs a distributed application that employs a custom application. The application is directory partition software named PARDAT. You need to implement this application for data replication.  Which two tools should you use to achieve this task()A、Dnscmd.B、Ntdsutil.C、IpconfigD、DnsutilE、All of the above

Certkiller.com has employed you as a system administrator. Your job function encompassescreating an ASP.NET application for the network. You make use of Microsoft .NET Frameworkv3.5 to creaste the application.  You receive a request from management to capture the timing and performance data of the newlycreated application. For security purposes you need to make sure that he data is only availablewhen a Certkiller user is logged on to the Web server and not on individual Web pages.  What should you do?()A、You should consider adding trace enabled="true" writeToDiagnosticsTrace="true"pageOutput="true" localOnly="true" / to the Web.config file.B、You should consider adding compilation debug="false" urlLinePragmas="true" / to theWeb.config file.C、You should consider adding trace enabled="true" pageOutput="false" localOnly="true" / tothe Web.config file.D、You should consider adding compilation debug="true" / to the Web.config file.

Your company has a domain controller server that runs the Windows Server 2008 R2 operating  system. The server is a backup server. The server has a single 500-GB hard disk that has three  partitions for the operating system, applications, and data. You perform daily backups of the  server.     The hard disk fails. You replace the hard disk with a new hard disk of the same capacity. You  restart the computer on the installation media. You select the Repair your computer option.     You need to restore the operating system and all files.     What should you do()A、Select the System Image Recovery option.B、Run the Imagex utility at the command prompt.C、Run the Wbadmin utility at the command prompt.D、Run the Rollback utility at the command prompt.

You are employed as the Exchange administrator at Company.com.You are in the process of  installing a new Exchange Server 2010 Organization.After the installation you send a text message to an external client and receive the subsequent non-delivery report (NDR): "Delivery has failed to these recipients or groups: User1@Company.com (user1@Company.com).The recipient’s e-mail system isn’t accepting messages now.Please try resending this message later or contact the recipient directly." You attempt to e-mail the user from an external e-mail system with great success.To ensure productivity you need to make sure e-mails can be sent to external clients from within the organization. What should you do?()A、Your best option would be to create an MX record.B、Your best option would be to create a Send connector.C、Your best option would be to create an SMTP site link.D、Your best option would be to create an accepted domain.

You have a computer that runs Windows 7. You need to capture the operating system and all the computerconfigurations to a Windows image (WIM) file.  What should you do before you capture the image?()A、Run Oscdimg.exe.B、Run Windows System Image Manager (Windows SIM).C、Open a command prompt that has elevated privileges.D、Start the computer by using Windows Preinstallation Environment (Windows PE).

Your company has a domain controller that runs Windows Server 2008. The server is a backup server. The server has a single 500-GB hard disk that has three partitions for the operating system, applications, and data. You perform daily backups of the server. The hard disk fails. You replace the hard disk with a new hard disk of the same capacity. You restart the computer on the installation media. You select the Repair your computer option. You need to restore the operating system and all files. What should you do()A、Select the Startup repair option.B、Select the System restore option.C、Run the Rollback utility at the command prompt.D、Run the Wbadmin utility at the command prompt.

单选题You were recently hired by an organization as a database administrator. You are asked to find out whether the currently functional listener process, named L1, has been password protected or not. You are not familiar with the file system of the new organization. How would you accomplish the task?()Aby using the STATUS command of the Listener control utilityBby using the STATUS L1 command of the Listener control utilityCby using the SHOW RULES command of the Listener control utilityDby using the SET PASSWORD command of the Listener control utilityEby searching for the PASSWORD_LISTENER entry in the listener.ora file

单选题You have a computer that runs Windows 7. The computer has System Protection enabled. You need toretain only the last System Protection snapshot of the computer. All other snapshots must be deleted.  Whatshould you do?()ARun Disk Cleanup for Programs and Features.BRun Disk Cleanup for System Restore and Shadow Copies.CFrom the System Protection Restore settings, select Turn off System Restore.DFrom the System Protection Restore settings, select Only restore previous versions of files.

单选题You have been recently hired as a database administrator. Your senior manager asks you to study the production database server and submit a report on the settings done by the previous DBA.  While observing the server settings, you find that the following parameter has been set in the parameter file of the database:  REMOTE_OS_AUTHENT = TRUE  What could have been the reason to set this parameter as TRUE?()Ato enable operating system authentication for a remote clientBto restrict the scope of administration to identical operating systemsCto allow the start up and shut down of the database from a remote clientDto enable the administration of the operating system from a remote clientEto disable the administration of the operating system from a remote client

单选题Certkiller.com has employed you as a system administrator. You are in the process of creating anASP.NET AJAX application using .NET Framework v3.5.  You receive an instruction from management to debug the JavaScript code in the application. Youthen attach Microsoft Visual Studio 2008 debugger to the Microsoft Internet Explorer instance. Youneed to make sure that the details of the client side object on the debugger console is displayedon the application.  What should you do?()AThis can be achieved using the Sys.Debug.fail method.BThis can be achieved using the Sys.Debug.traceDump method.CThis can be achieved using the Sys.Debug.trace method.DThis can be achieved using the Sys.Debug.assert method.

多选题Certkiller.com has an active directory forest on a single domain.  Certkiller needs a distributed application that employs a custom application. The application is directory partition software named PARDAT. You need to implement this application for data replication.  Which two tools should you use to achieve this task()ADnscmd.BNtdsutil.CIpconfigDDnsutilEAll of the above

单选题Your company has a network that has 100 servers. You install a new server that runs windows server 2008. The server has the web server (IIS) role installed. You discover that the reliability monitor has no data, and that the system stablitiy share has never been updated. You need to configure the server to collect the reliability monitor data. What should you do?()ARun the perfmon.exe /sys command on the server.BConfigure the task scheduler service to start automatically.CConfigure the remote registry serice to start automatically.DConfigure the secondary login service to start automatically.

单选题Your network has 200 Windows 2000 Professional computers and 15 Windows 2000 Server computers. Users on the network save their work files in home folders on a network server. The NTFS partition that contains the home folders has Encrypting File System (EFS) enabled. A user named Tess King leaves the company. You grant her manager the Full Control NTFS permission to Tess's home folder. When the manager attempts to open any of the files, she receives the follo wing error message: "Access is denied." What should you do?()AUse System File Checker (SFC) to decrypt the file.BLog on the network as the Recovery Agent. Decrypt the files for the manager.CLog on the network as the administrator. Use theciphercommand to decrypt the files.DLog on the network as a member of the Backup Operators group. Decrypt the files for the manager.