Which item is the most important factor during deployment of high-availability features?()A、Test major changes before deployment and defer minor changes until during deployment. B、Document and verify rollback procedures.C、Ensure consistency of code versions across the network.D、Progressively modify procedures and documentation during implementation.

Which item is the most important factor during deployment of high-availability features?()

  • A、Test major changes before deployment and defer minor changes until during deployment. 
  • B、Document and verify rollback procedures.
  • C、Ensure consistency of code versions across the network.
  • D、Progressively modify procedures and documentation during implementation.

相关考题:

When making changes to a server, which of the following is the BEST way to troubleshoot a problem?() A. Perform root cause analysis and then test the theory to determine the cause.B. Make changes to the system and document everything once the problem is resolved.C. Make multiple changes to all affected areas to resolve all potential issues.D. Make a change and if the problem is not resolved, reverse the change.

The helpdesk is receiving calls about the corporate web server being down. Which of the followingshould be taken NEXT after verifying that the server is unreachable?() A. Escalate the call to a technicianB. Document any changes in the web server configuration.C. Implement and test a solution.D. Continuously ping the server until a ping response is obtained

( ) is an important concept since it allows reuse of a class definition without requiring major code changes.A. InheritanceB. PolymorphismC. EncapsulationD. Data hiding

All of followings should be done by the project manager during project control except ().A.Determine the a change has occurredB.Ensure that a change is agreedC.Make sure all changes are approveD.by managementD.Manage changes as they occur

( ) is an important concept since it allows reuse of a class definition without requiring major code changes.A.InheritanceB.PolymorphismC.EncapsulationD.DatA.hiding

Which of the following steps in the troubleshooting and repair process is MOST effectivereduce redundant effort? ()A、Discuss the problem with the user and identify any recent changes.B、Identify the root cause of the failure.C、Verify the problem resolution.D、Document activities and outcomes of repair steps.

You need to recommend changes to Web1 that meet the company’s application requirements for the WebApp2 deployment.   What should you recommend?()A、Add a second IP address.B、Configure request filtering.C、Create separate application pools.D、Add worker processes to the DefaultAppPool.

The helpdesk is receiving calls about the corporate web server being down. Which of the followingshould be taken NEXT after verifying that the server is unreachable?()A、Escalate the call to a technicianB、Document any changes in the web server configuration.C、Implement and test a solution.D、Continuously ping the server until a ping response is obtained

An administrator will replace five current servers. Which of the following is the MOST important to review before installing new servers?()A、 Verify uninterruptible power supply (UPS) loadB、 Verify if server consumes 220VC、 Verify CPU loadD、 Verify if server consumes 110V

When making changes to a server, which of the following is the BEST way to troubleshoot a problem?()A、 Perform root cause analysis and then test the theory to determine the cause.B、 Make changes to the system and document everything once the problem is resolved.C、 Make multiple changes to all affected areas to resolve all potential issues.D、 Make a change and if the problem is not resolved, reverse the change.

Which of the following statements is true when the database is in ARCHIVELOG mode and tablespaces are in hot backup mode?()A、 Archive log generation is suspended until the tablespaces are taken out of hot backup mode. B、 Datafiles are not written to during hot backups.C、 Changes to the database are cached during the backup and not written to the datafiles to ensure that the datafiles are consistent when recovered.D、 The datafile headers are not updated during the backup.E、 The way data is written to the online redo logs is unchanged during the backup.

You are developing a Windows Presentation Foundation (WPF) application The application is for commercial use and requires a valid license key to be entered. You create a project type of Class Library code to validate license keys You need to ensure that the user enters a valid license key during installation of the software. Which deployment should reference the class library?()A、Click OnceB、Setup ProjectC、XBAPD、XCopy

As the administrator of your company’s network, you will be installing Windows 2000 Professional on 10 new Pentium III computers. Your company does business with a horde of countries and accepts many currencies. You must ensure that international currency options are set for 5 of the 10 computers. The remaining 5 computers must be configured to support different input locales.   How can you most efficiently set the correct international currency options and configure different input locales on each specified group of computers? ()A、 During the unattended installation of Windows 2000 Professional.B、 Make the appropriate changes in the regional settings dialogue box during the installation of Windows 2000 Professional.C、 After Windows 2000 Professional is installed, logon and make the changes through thecontrol panel.D、 Make the appropriate changes in the date and time settings dialogue box during theinstallation of Windows 2000 Professional.

You administer a SQL Server 2008 instance. You plan to deploy a third-party database application to the instance. The application uses stored procedures that are developed by using SQL CLR integration. The application must be configured to enable the EXTERNAL_ACCESS code access security setting. You need to ensure that the application is deployed to the instance without loss of functionality. What should you do first?()A、Replace read write non-static fields in the code with static fields.B、Replace read-only static fields in the code with read write static fields. C、Use the peverify.exe PEVerify tool to verify whether the code meets the type-safety requirements.D、Use the regasm.exe assembly registration tool to register the assembly on the server before deployment.

You are designing a Windows 7 deployment image.   You plan to partition the hard disk of each client computer during deployment.  You need to modify the unattended answer file by using a text editor.   Where should you add the disk information?()A、to the Specialize configuration passB、to the Generalize configuration passC、to the WindowsPE configuration passD、to the AuditSystem configuration pass

Your company has a single Active Directory Domain Services (AD DS) domain with Windows Server 2008 R2 member servers and 1,000 Windows 7 client computers. You are designing the deployment of a custom application.   You have the following requirements:   The application must be available to only users who need it. Minimize network traffic during deployment.   You need to design a deployment strategy that meets the requirements.   Which deployment method should you use?()A、RemoteApp and Desktop ConnectionsB、software installation in Group PolicyC、Microsoft Application Virtualization (App-V)D、Microsoft System Center Configuration Manager 2007

You are designing a Windows Azure application that will execute long-running business processes.  Applying a configuration change requires role instances to recycle. You must not recycle until processing is finished.  You need to recommend an approach for applying configuration changes.  What should you recommend?()A、 Apply the service configuration changes to the role instance and then recycle the role instance.B、 Suspend each role instance and then apply the service configuration changes to the role instance.C、 Before a change to the service configuration is applied to the role instance, defer recycling until processing is complete.D、 After a change to the service configuration is applied to the role instance, defer recycling until processing is complete.

An administrator named Admin1 plans to implement the planned App-V deployment. You need to recommend which protocol to use for the App-V deployment. Which protocol should you recommend?()A、SMBB、HTTPSC、CIFSD、RTSPS

All client computers in your network run Windows XP. Some of the computers are part of a secure network. Some of the computers connect to the network by using virtual private networking (VPN). You are planning to deploy Windows 7.   You have the following requirements:   Use a dedicated server for deployment.  Use a single operating system image for deployment.   Ensure that you can use removable media to deploy the image.   Ensure that you can select which applications are installed onto a client computer at the time of deployment.   You need to design a deployment strategy that meets the requirements.   What should you do?()A、 Using a Windows PE boot media, use ImageX to apply the image from a network share to the client computers.B、 Use System Center Configuration Manager 2007 R2 to perform a zero-touch installation.C、 Use the Microsoft Deployment Toolkit to perform a lite-touch installation.D、 Use Windows Deployment Services on a network server to deploy Windows 7 by using an install image.

You are developing and XBAP application for your company intranet. During several development iterations, you manually executable, application, and deployement manifest to the test Web Server. You create an HTML file that has a manifest that you use for testing. During the next iteration, you enchance the XBAP application by making changes. When you use the hyperlink to the deployment manifest to test the deployment, you do not see the changes. You need to ensure that the changes you make are visible when you test the deployment from your machine. What should you do ?()A、Restart Microsoft Internet Information Services (IIS). Then click the Install hyperlink again.B、Open Visual Studio command prompt and run mage -cc. Then click the Install hyperlink again.C、Delete the application, deployment, and executable files from Web Server. Then rebuild the XBAP solution files from the project bin directory to the Web Server and click the Install hyperlink againD、Delete the application, deployment, and executable files from Web Server. Then recopy the same files to the Web Server, restart IIS and click the Install hyperlink again

单选题You need to recommend changes to Web1 that meet the company’s application requirements for the WebApp2 deployment.   What should you recommend?()AAdd a second IP address.BConfigure request filtering.CCreate separate application pools.DAdd worker processes to the DefaultAppPool.

单选题When making changes to a server, which of the following is the BEST way to troubleshoot a problem?()APerform root cause analysis and then test the theory to determine the cause.BMake changes to the system and document everything once the problem is resolved.CMake multiple changes to all affected areas to resolve all potential issues.DMake a change and if the problem is not resolved, reverse the change.

单选题You are designing a Windows 7 deployment image.   You plan to partition the hard disk of each client computer during deployment.  You need to modify the unattended answer file by using a text editor.   Where should you add the disk information?()Ato the Specialize configuration passBto the Generalize configuration passCto the WindowsPE configuration passDto the AuditSystem configuration pass

单选题You are developing and XBAP application for your company intranet. During several development iterations, you manually executable, application, and deployement manifest to the test Web Server. You create an HTML file that has a manifest that you use for testing. During the next iteration, you enchance the XBAP application by making changes. When you use the hyperlink to the deployment manifest to test the deployment, you do not see the changes. You need to ensure that the changes you make are visible when you test the deployment from your machine. What should you do ?()ARestart Microsoft Internet Information Services (IIS). Then click the Install hyperlink again.BOpen Visual Studio command prompt and run mage -cc. Then click the Install hyperlink again.CDelete the application, deployment, and executable files from Web Server. Then rebuild the XBAP solution files from the project bin directory to the Web Server and click the Install hyperlink againDDelete the application, deployment, and executable files from Web Server. Then recopy the same files to the Web Server, restart IIS and click the Install hyperlink again

单选题Which item is the most important factor during deployment of high-availability features?()ATest major changes before deployment and defer minor changes until during deployment. BDocument and verify rollback procedures.CEnsure consistency of code versions across the network.DProgressively modify procedures and documentation during implementation.

单选题Which of the following statements is true when the database is in ARCHIVELOG mode and tablespaces are in hot backup mode?()A Archive log generation is suspended until the tablespaces are taken out of hot backup mode. B Datafiles are not written to during hot backups.C Changes to the database are cached during the backup and not written to the datafiles to ensure that the datafiles are consistent when recovered.D The datafile headers are not updated during the backup.E The way data is written to the online redo logs is unchanged during the backup.

单选题When making changes to a server, which of the following is the BEST way to troubleshoot a problem?()A Perform root cause analysis and then test the theory to determine the cause.B Make changes to the system and document everything once the problem is resolved.C Make multiple changes to all affected areas to resolve all potential issues.D Make a change and if the problem is not resolved, reverse the change.