Certkiller has an Active Directory forest with six domains. The company has 5 sites. The company requires a new distributed application that uses a custom application directory partition named ResData for data replication.  The application is installed on one member server in five sites.  You need to configure the five member servers to receive the ResData application directory partition for data replication. What should you do()A、Run the Dcpromo utility on the five member servers.B、Run the Regsvr32 command on the five member serversC、Run the Webadmin command on the five member serversD、Run the RacAgent utility on the five member servers

Certkiller has an Active Directory forest with six domains. The company has 5 sites. The company requires a new distributed application that uses a custom application directory partition named ResData for data replication.  The application is installed on one member server in five sites.  You need to configure the five member servers to receive the ResData application directory partition for data replication. What should you do()

  • A、Run the Dcpromo utility on the five member servers.
  • B、Run the Regsvr32 command on the five member servers
  • C、Run the Webadmin command on the five member servers
  • D、Run the RacAgent utility on the five member servers

相关考题:

Certkiller.com has given you the task of serializing an object and writing it to a data file using binary serialization.You need to ensure that you meet these requirements.What should you do?() A.B.C.D.

YouareworkingontheCertkillerdatabase.Whatisthedefaultnameofthealertlogfileinthisdatabase?() A.alert_Certkiller.logB.alertlog_Certkiller.logC.alert_log_Certkiller.logD.Certkiller_alert_log.logE.log_alert_:Certkiller.logF.trace_alert_Certkiller.log

Certkiller .com has a file server named Certkiller -SR07 that stores old inventory files. Certkiller .com has given you the task of creating an application to archive these old inventory files.The inventory files have to be compressed prior to being uploaded to Certkiller .com‘s Web server.You are currently writing a method that will receive a byte array and compress it into a new file.You need to ensure that a data corruption check takes place during the decompression process.What should you do?()A.B.C.D.

You work as an application developer at Certkiller .com. You are currently in the process of creating a new application for Certkiller .com. You are required to read compressed data files that has been sent by Certkiller .com‘s sales offices.These data files are less than 4 GB in size, but was compressed without cyclic redundancy. You want to write a method that receives the compressed files and return the uncompressed data as a byte array.What should you do?()A.B.C.D.

Certkiller .com has asked you to create a file management application to monitor the hosts file.Certkiller .com has instructed you to change the hosts file if it has been changed.You, therefore, need to display the size and whether the hosts file is set to read-only.What should you do?()A.B.C.D.

Certkiller.com has asked you to create an application to display all of the top directories based on the drive path.You need to ensure that the application displays the number of files within top-level directories.What should you do?()A.B.C.D.

Certkiller .com has asked you to develop an application that displays the properties for all Certkiller.com‘s network drives.The information generated by this application will be utilized by Certkiller .com‘s network administrators to verify client setups.You need to ensure that these requirements are fully satisfied.What should you do?()A.B.C.D.

Certkiller .com has a server named Certkiller -SR05 that has numerous processors installed.You have been given the task of developing an application that displays certain clock speed statisticson all processors installed on Certkiller -SR05.You need to ensure that this requirement is fully satisfied.What should you do?()A.B.C.D.

You work as an application developer at Certkiller .com. Certkiller .com has been hired by a small local private school to develop a class library that will be used in an application named ManageAttendance for the purpose of managing student records.You are responsible for developing this class library. Certkiller .com has instructed you to create a collection in the application to store learners’ results. The school has informed you that they currently only have seven learners, but that this value will triple in the following year. Due to the limited resources, you need to ensure that the collection you create consumes a minimum amount of resources. What should you use to create the collection?()A、 The HybridDictionary collection class.B、 The HashTable collection class.C、 The ListDictionary collection class.D、 The StringCollection collection class.

You work as an application developer at Certkiller .com. Certkiller .com has asked you to develop an application that monitors and controls the activities of a Windows service.You need to use the appropriate class to meet Certkiller .com’s requirements. What should you do?()A、 Use the ServiceBase class.B、 Use the ServiceInstaller class.C、 Use the ServiceManager class.D、 Use the ServiceController class.

Certkiller.com has employed you as a system administrator. You are in the process of creating anASP.NET application using Microsoft.NET Framework v3.5. This application will be hosted on aserver named CERTKILLER-SR01. CERTKILLER-SR01 is configured to run Microsoft IIS 5.0.  You are assigned a computer named CERTKILLER-WS02. You make use of CERTKILLER-WS02to log on to the companies domain with an account named CKUser. CERTKILLER-SR01 andCERTKILLER-WS02 are both members of the Certkiller.com domain. To ensure productivity youneed to establish the necessary permissions to allow remote debugging.  What should you do?()A、Your best option would be to ensure that the Remote Debugging Monitor is set to make use of Windows Authentication.B、Your best option would be to ensure that the CKUser account is added to the domainAdministrators group.C、Your best option would be to ensure that the ASP.NET worker process is changed onCERTKILLER-SR01 to run as the local Administrator account.D、Your best option would be to ensure that the CKUser account is added to the localAdministrators group on CERTKILLER-SR01.

You are working on the Certkiller database.  What is the default name of the alert log file in this database?()A、alert_ Certkiller .logB、alertlog_ Certkiller .logC、alert_log_ Certkiller .logD、Certkiller _alert_log.logE、log_alert_: Certkiller .logF、trace_alert_ Certkiller .log

Certkiller .com has a main office and a branch office. Certkiller .com’s network consists of a single Active Directory forest. Some of the servers in the network run Windows Server 2008 and the rest run Windows server 2003.  You are the administrator at Certkiller .com. You have installed Active Directory Domain Services (AD DS) on a computer that runs Windows Server 2008. The branch office is located in a physically insecure place. It has not IT personnel onsite and there are no administrators over there. You need to setup a Read-Only Domain Controller (RODC) on the Server Core installation computer in the branch office. What should you do to setup RODC on the computer in branch office()A、Execute an attended installation of AD DSB、Execute an unattended installation of AD DSC、Execute RODC through AD DSD、Execute AD DS by using deploying the image of AD DSE、none of the above

You work as a Web Developer at Certkiller.com. You are in the process of creating a Webapplication using Microsoft ASP.NET 3.5.  The configuration below exists in the Web.config file:           Certkiller.com hosts the Web application in Microsoft Internet Information Services (IIS) 6.0. TheIntegrated Windows Authentication is enabled in IIS and anonymous access disabled. The application pool is configured to run as the identity Certkiller/WebApp. The IIS anonymous accountis Certkiller/Anonymous.  The following code exists in the code-behind file for a web form:  stringname = WindowsIdentity.GetCurrent().Name;  Response.Write(name); A Certkiller.com employee named RoryAllen has a domain user account named Certkiller/RAllen.He uses this account to access the page. However, Rory Allen logs in to the Web application withthe user name FormsUser. You need to determine the output of this code when Rory Allenaccesses the page. What will the output of this code be?()A、The output will be FormsUser.B、The output will be Certkiller/RAllen.C、The output will be Certkiller/Anonymous.D、The output will be Certkiller/WebApp

Certkiller .com has organizational units in the Active Directory domain. There are 10 servers in the organizational unit called Security. As an administrator at Certkiller .com, you generate a Group Policy Object (GPO) and link it to the Security organizational unit. What should you do to monitor the network connections to the servers in Security organizational unit()A、Start the Audit Object Access optionB、Start the Audit System Events optionC、Start the Audit Logon Events optionD、Start the Audit process tracking optionE、All of the above

Certkiller.com has an active directory forest on a single domain.  Certkiller needs a distributed application that employs a custom application. The application is directory partition software named PARDAT. You need to implement this application for data replication.  Which two tools should you use to achieve this task()A、Dnscmd.B、Ntdsutil.C、IpconfigD、DnsutilE、All of the above

You recently developed a Web application that accesses an external Web service to retrieve current exchange rates for Certkiller .com's e-Commerce Web site. The Web service converts USD prices to the customer's local currency. You have stored the URL to the external Web service's endpoint in the section of the Web.config file. The Web application has been successfully deployed to a Certkiller .com Web server named Certkiller -SR14. A few months later the vendor of the Web service changes the port that is used to access the Web service. You need to update the section of the Web application's Web.config file from Certkiller -WS528. You need to ensure that your solution has a minimal impact on customers that may be connected to the e-Commerce Web site. What should you do?()A、Create a Host entry in the Lmhosts file on Certkiller -SR14. Point the Host entry to the new end point.B、Use the Copy Web Site function in Visual Studio 2005 to deploy the Web.config file from Certkiller -WS528 to Certkiller -SR14.C、Create a Web Setup project in Visual Studio 2005 to deploy the Web.config file from Certkiller -WS528 to Certkiller -SR14.D、Use the Web Site Administration Tool to change the appSettings section of the Web.config file.

The corporate network of Certkiller consists of a Windows Server 2008 single Active Directory domain. The domain has two servers named Certkiller 1 and Certkiller 2.  To ensure central monitoring of events you decided to collect all the events on one server, Certkiller 1. To collect events from Certkiller  2. and transfer them to Certkiller 1, you configured the required event subscriptions.  You selected the Normal option for the Event delivery optimization setting by using the HTTP protocol. However, you discovered that none of the subscriptions work.  Which of the following actions would you perform to configure the event collection and event forwarding on the two servers()A、Through Run window execute the winrm quickconfig command on Certkiller 2.B、Through Run window execute the wecutil qc command on Certkiller 2.C、Add the Certkiller 1 account to the Administrators group on Certkiller 2.D、Through Run window execute the winrm quickconfig command on Certkiller 1.E、Add the Certkiller 2 account to the Administrators group on Certkiller 1.F、Through Run window execute the wecutil qc command on Certkiller 1.

Certkiller .com has a network that consists of a single Active Directory domain. A technician has accidently deleted an Organizational unit (OU) on the domain controller. As an administrator of Certkiller .com, you are in process of restoring the OU. You need to execute a non-authoritative restore before an authoritative restore of the OU. Which backup should you use to perform non-authoritative restore of Active Directory Domain Services (AD DS) without disturbing other data stored on domain controller()A、Critical volume backupB、Backup of all the volumesC、Backup of the volume that hosts Operating systemD、Backup of AD DS foldersE、all of the above

单选题You work as an application developer at Certkiller .com. Certkiller .com has asked you to create a multi-threaded application, which executes a critical database  backup operation on an hourly basis. You define this operation with the following code:  public void BackupDB () {  //Implementation code }  You then create a Thread object for the purpose of invoking this method.  You need to ensure that the thread is scheduled for execution before any other thread at runtime.What should you do?()A AB BC CD D

单选题You work as a database administrator for Certkiller .com. Users in the Certkiller .com PROD database complain about the slow response of transactions. While investigating the reason you find that the transactions are waiting for the undo segments to be available, and undo retention has been set to zero. What would you do to overcome this problem?()AIncrease the undo returnBCreate more undo segmentsCCreate another undotablespaceDIncrease the size of the undotablespace

单选题Two database users, Jack and Bill, are accessing the Certkiller STAFF table of the Certkiller DB database. When Jack modifies a value in the table, the new value is invisible to Bill.  Which is the modified value invisible to Bill?()AThe modified data are not available on disk.BThe modified data have been flushed out from memory.CThe modified rows of the Certkiller STAFF table have been locked.DJack has not committed the changes after modifying the value.EBoth users are accessing the database from two different machines.

单选题You are working on the Certkiller database.  What is the default name of the alert log file in this database?()Aalert_ Certkiller .logBalertlog_ Certkiller .logCalert_log_ Certkiller .logDCertkiller _alert_log.logElog_alert_: Certkiller .logFtrace_alert_ Certkiller .log

单选题Certkiller .com has a remote data center with servers connected to a local datacenter through a high-speed network. Which of the following methods is the most convenient to use to install and upgrade the servers in the remote center using locally managed install images?()ANIMBHAGEO/HACMPCNFSDftp, rsh and rexec

多选题Certkiller.com has an active directory forest on a single domain.  Certkiller needs a distributed application that employs a custom application. The application is directory partition software named PARDAT. You need to implement this application for data replication.  Which two tools should you use to achieve this task()ADnscmd.BNtdsutil.CIpconfigDDnsutilEAll of the above

单选题You work as an application developer at Certkiller .com. Certkiller .com has asked you to develop an application that monitors and controls the activities of a Windows service.You need to use the appropriate class to meet Certkiller .com’s requirements. What should you do?()A Use the ServiceBase class.B Use the ServiceInstaller class.C Use the ServiceManager class.D Use the ServiceController class.

单选题Certkiller .com has a network that consists of a single Active Directory domain. A technician has accidently deleted an Organizational unit (OU) on the domain controller. As an administrator of Certkiller .com, you are in process of restoring the OU. You need to execute a non-authoritative restore before an authoritative restore of the OU. Which backup should you use to perform non-authoritative restore of Active Directory Domain Services (AD DS) without disturbing other data stored on domain controller()ACritical volume backupBBackup of all the volumesCBackup of the volume that hosts Operating systemDBackup of AD DS foldersEall of the above

单选题You work as a Web Developer at Certkiller.com. You are in the process of creating a Webapplication using Microsoft ASP.NET 3.5.  The configuration below exists in the Web.config file:           Certkiller.com hosts the Web application in Microsoft Internet Information Services (IIS) 6.0. TheIntegrated Windows Authentication is enabled in IIS and anonymous access disabled. The application pool is configured to run as the identity Certkiller/WebApp. The IIS anonymous accountis Certkiller/Anonymous.  The following code exists in the code-behind file for a web form:  stringname = WindowsIdentity.GetCurrent().Name;  Response.Write(name); A Certkiller.com employee named RoryAllen has a domain user account named Certkiller/RAllen.He uses this account to access the page. However, Rory Allen logs in to the Web application withthe user name FormsUser. You need to determine the output of this code when Rory Allenaccesses the page. What will the output of this code be?()AThe output will be FormsUser.BThe output will be Certkiller/RAllen.CThe output will be Certkiller/Anonymous.DThe output will be Certkiller/WebApp