In a Java EE messaging application, one MDB is consuming a lot of memory at high traffic.    What configuration should you use to prevent possible out-of-memory error at high traffic and at the same time not losing messages?()A、Configure a Work Manager for the MDB with a Maximum Thread Constraint.B、Configure a Work Manager for the MDB with a Minimum Thread Constraint.  C、Configure a Work Manager for the MDB with a Maximum Thread Constraint and a Capacity Constraint. D、Configure a Work Manager for the MDB with a Minimum Thread Constraint and a Capacity Constraint. E、Configure a Work Manager for the MDB with both a Maximum Thread Constraint and Minimum Thread Constraint.

In a Java EE messaging application, one MDB is consuming a lot of memory at high traffic.    What configuration should you use to prevent possible out-of-memory error at high traffic and at the same time not losing messages?()

  • A、Configure a Work Manager for the MDB with a Maximum Thread Constraint.
  • B、Configure a Work Manager for the MDB with a Minimum Thread Constraint.  
  • C、Configure a Work Manager for the MDB with a Maximum Thread Constraint and a Capacity  Constraint. 
  • D、Configure a Work Manager for the MDB with a Minimum Thread Constraint and a Capacity Constraint. 
  • E、Configure a Work Manager for the MDB with both a Maximum Thread Constraint and Minimum Thread Constraint.

相关考题:

Users at the Charleville Company began experiencing high network delays when Internet connectivity was enabled for all users. After investigating the traffic flow, you determine that peerto-peer traffic from a music download site is consuming a large amount of bandwidth. Which QoS mechanism can you implement to improve the network response time?()A. Use CBWFQ to queue the peer-to-peer traffic into the default traffic class.B. Use class-based WRED to randomly drop the peer-to-peer traffic during network congestions.C. Use class-based policing to limit the peer-to-peer traffic rate.D. Use class-based shaping to delay any excessive peer-to-peer traffic. Answer: C

An airline is building a booking system for its premium and general customers. The goal is to ensure premium members are given higher access priority when user traffic is high.    What configuration will achieve this goal?()A、Configure a Work Manager for premium users with a Minimum Thread Constraint.B、Configure a Work Manager for premium users with a higher fair-share-request-class.C、Configure a Work Manager for premium users with a higher response-time-request-class.D、Configure a Work Manager general users with a Maximum Thread Constraint.E、Configure a Work Manager for premium users with a custom request-class.

You work as a Web Developer at Certkiller.com. You are in the process of creating a Webapplication using Microsoft ASP.NET 3.5.  You host the Web application in Microsoft Internet Information Services (IIS) 6.0. You browse theapplication and receive the following error message:  Server Application Unavailable  The web application you are attempting to access on this web server is currently unavailable.Please hit the "Refresh" button in your web browser to retry your request.  You view the Application event log and discover the following message:  It is not possible to run two different versions of ASP.NET in the same IIS process. Please use theIIS Administration Tool to reconfigure your server to run the application in a separate process.  To ensure productivity you need to solve this problem as quick as possible.  What should you do?()A、You should change the IIS isolation mode.B、You should assign the application to another application pool.C、You should configure all applications that are part of your application's application pool in orderto use the same version of ASP.NET.D、You should run the Aspnet_regiis.exe Tool.E、You should restart the application pool that hosts the application.

You work as an application developer at Certkiller .com. You are developing an application that makes use of a Queue class object named MyQueue. This Queue class object will be used to store messages sent by the user during application run time.You would like to access the message at the beginning of the queue, prior to processing the user messages, without removing it. What should you do?()A、 Use the Enqueue method of the MyQueue object.B、 Use the Contains method of the MyQueue object.C、 Use the Dequeue method of the MyQueue object.D、 Use the Peek method of the MyQueue object.

You work as an application developer at Certkiller .com. You are developing an application that makes use of a Queue class object named MyQueue. This Queue class object will be used to store messages sent by the user during application run time. The application that you are developing provides an interface for administrators and an interface for users to create message reports.You want to ensure that all user messages stored in the MyQueue object are removed when an administrator selects the reset option.What should you do?()A、 Use the Enqueue method of the MyQueue object.B、 Use the Clear method of the MyQueue object.C、 Use the Dequeue method of the MyQueue object.D、 Use the TrimToSize method of the MyQueue object.

A customer needs to ensure that the number of threads servicing an application does not exceed the number of database connections available to the application. What step must you take to address this situation?()A、Configure a Max Threads Constraint and add your application to the list of applications for the  Constraint.B、Configure a Work Manager with a Maximum Threads Constraint tied to the Connection Pool and  configuration your application to use the Work Manager.C、Configure a Work Manager with a Minimum Threads Constraint tied to the Connection Pool and  configure your application to use the Work Manager.D、Configure a global MaxThreads constraint and target it to the server or clusters where your  application is deployed.E、Configure the startup parameter "-Dwls-maxThreads" to be the same as the number of  database connections configured.

You work as a database administrator at Certkiller .com. In your production database, you observe that users’ transactions are consuming a lot of resource and you plan to impose resource restrictions by using Resource Manager. For which three resources can you enable usage restrictions by using Resource Manager? ()A、 CPU usageB、 degree of parallelismC、 number of open cursorsD、 number of sorts performedE、 idle time for blocking sessionsF、 number of disk I/O operations performedG、 number of memory I/O operations performed

You need to design an access control strategy for the marketing application. You solution must minimize impact on server and network performance. What should you do?()A、Require client computers to connect to the marketing application by using a VPN connectionB、Use IPSec to encrypt communications between the servers in the New York and Atlanta officesC、Require the high security setting on Terminal Services connections to the marketing applicationD、Configure all marketing application Web pages to require SSL

You recently installed an application on your computer. The application is configured to automatically start. This application might cause your computer to run slower.  You need to prevent the application from auto starting without uninstalling the application.  What should you do?()A、Use the Microsoft Windows Task Manager application to end the task for the application.B、Use the Control Panel application to uninstall the application. Reboot the computer.C、Use the Software Explorer application to disable the application. Reboot the computer.D、Use the Services application to disable the Application Experience service, and then launch the application.

A Windows Communication Foundation (WCF) application exposes a service as a SOAP endpoint for consumption by cross-platform clients.During integration testing, you find that one of the clients is not generating the correct messages to the WCF application.In order to debug the issue and fix the communication, you need to configure the service to log messages received from the client.What should you do?()A、Set an etwTracking behavior on the service and configure a listener for the System.ServiceModel trace source.B、Set an etwTracking behavior on the service and configure a listener for the System.ServiceModel.MessageLogging trace source.C、Enable messageLogging in the System.ServiceModel diagnostics element configuration and configure a listener for the System.ServiceModel.MessageLogging trace source.D、Enable messageLogging in the System.ServiceModel diagnostics element configuration and configure a listener for the System.ServiceModel trace source.

You create a Microsoft ASP.NET Web application by using the Microsoft .NET Framework version 3.5.  You deploy the application on a Microsoft IIS 6.0 Web server. The server runs on a worker process isolation mode, and it hosts the .NET Framework version 1.1 Web applications. When you attempt to browse the application, the following error message is received:  "It is not possible to run different versions of ASP.NET in the same IIS process. Please use the IIS Administration Tool to reconfigure your server to run the application in a separate process."    You need to ensure that the following requirements are met: all the applications run on the server  all the applications remain in process isolation mode all the applications do not change their configuration.   Which two actions should you perform?()A、Create a new application pool and add the new application to the pool. B、Configure the IIS 6.0 to run the WWW service in the IIS 5.0 isolation mode. C、Configure the new application to use the .NET Framework version 2.0 in the IIS 6.0 Manager. D、Set autoConfig="false" on the processModel property in the machine.config file. E、Disable the Recycle worker processes option in the Application Pool Properties dialog box.

You work as the IT professional in an international company which is named Wiikigo. You are experiencedin implementing and administering a network operating system. You are specialized in deploying servers,configuring Windows Server 2008 Terminal services and network application services, and configuring aweb services infrastructure. You are in charge of a server that runs Windows Server 2008. The server hasthe Web Server (IIS) server role installed. The server contains a Web site that is configured to use onlyWindows Authentication. You have a security group named Group1 that contains several user accounts.Now you receive an order from the company management. According to the company requirement, youhave to prevent the members of Group1 from accessing a Web site. But you are not allowed prevent otherusers from accessing the Web site. Which Web site feature should you configure?()A、You should configure SSL SettingsB、You should configure AuthenticationC、You should configure Authorization RulesD、You should configure IIS Manager Permissions

Your portable computer is in sleep mode. When you resume work on the portable computer, you are not prompted for a password.  You need to ensure that you are prompted for a password each time the portable computer recovers from sleep mode.  What should you do?()A、Configure the computer to hibernate when not in use.B、In the current power plan settings, configure the computer to require a password when recovering from sleep mode.C、Configure the computer to use the High Performance power plan.D、Configure the screen saver settings to require a password on resumption of work.

You use Microsoft Windows Mail to download e-mail messages to your Inbox.  You need to minimize the receipt of e-mail messages that attempt to acquire private financial information.  What should you do?()A、Create an Inbox rule that moves potentially malicious email to the Junk Mail folder. B、Configure the Parental Controls Web restriction setting to High.C、Configure the phishing filter to move the e-mail messages to the Junk Mail folder. D、Configure Windows Defender to perform a custom scan of potentially malicious email.

You add a particular e-mail address to the Blocked Senders list in the Microsoft Windows Mail application. You still receive messages from this e-mail address.  You need to prevent the receipt of all e-mail messages from this e-mail address.  What should you do?()A、Configure the junk e-mail filtering setting to High.B、Remove the senders e-mail address from the Safe Senders list.C、Add the senders e-mail domain name to the Blocked Senders list.D、Configure the Microsoft Windows Mail application to delete suspected junk e-mail permanently.

You work as the IT professional in an international company which is named Wiikigo. You are experiencedin implementing and administering a network operating system. You are specialized in deploying servers,configuring Windows Server 2008 Terminal services and network application services, and configuring aweb services infrastructure. You are in charge of a member server which runs Windows Server 2008. The Terminal Services serverrole has been installed on the server. Microsoft Windows System Resource Manager (WSRM) is installedon the server. Now you receive report from users saying about performance degradation on the TerminalServer. You monitor the server and notice that one user is consuming 100 percent of the processor time.You create a resource-allocation policy named Policy1 that limits each user to 30 percent of the totalprocessor time. But you do not see any performance improvement. WSRM needs to be configured toenforce Policy1. What action should you perform?()A、The Terminal Services Configuration service should be restarted.B、Use the user context of the Terminal Server System account to launch the WSRM application.C、Set Policy1 should be set as the Profiling Policy.D、Set Policy1 should be set as the Managing Policy.

Your network has 1,000 client computers that run Windows 7.   You plan to deploy a new application.   You need to ensure that the application deploys only during non-business hours.   What should you do?()A、Use Group Policy.B、Use Windows Deployment Services with a schedule cast.C、Use Microsoft System Center Configuration Manager.D、Use a logon script.

You work as a Web Developer at Certkiller.com. You create a Web application using MicrosoftASP.NET 3.5.  Certkiller.com hosts the application in Microsoft Internet Information Services 7.0. You attempt tobrowse the application and receive the following error message:  Service Unavailable    HTTP Error 503. The service is unavailable.   You check and discover that you are able to browse successfully to other application that formspart of the same IIS Web site. The hosted applications on the network make use of ASP.NET 3.5.There are not previous versions of ASP.NET is installed. You need to resolve this error as soon aspossible.  What should you do?()A、You should run the ServiceModel Metadata Utility tool (Svcutil.exe).B、You should change the pipeline mode associated with the application pool that hosts theapplication.C、You should run the ASP.NET Registration Tool (Aspnet_regiis.exe).D、You should make sure that the application pool that hosts the application is initiated.

You work in a company which uses SQL Server 2008. You are the administrator of the company database. Now you are in charge of a SQL Server 2008 instance. There is a single Database Mail profile. Reports are sent to all the company employees by using the Mail profile. During office hours, a large volume of reports are sent by the sp_send_dbmail stored procedure. Now you notice that it takes a long time for the reports to be sent to the company manager. As the technical support, you have to speed up the delivery. So what action should you perform to achieve this goal?()  A、Another SMTP account should be added to the existing Database Mail profile B、When you send the reports to the manager, you should use the @importance = high parameter. C、You should change the Account Retry Attempts option of the Database Mail system properties D、You should configure a new Database Mail profile. The new one will be used for sending the reports to the manager.

单选题You work as a Web Developer at Certkiller.com. You create a Web application using MicrosoftASP.NET 3.5.  Certkiller.com hosts the application in Microsoft Internet Information Services 7.0. You attempt tobrowse the application and receive the following error message:  Service Unavailable    HTTP Error 503. The service is unavailable.   You check and discover that you are able to browse successfully to other application that formspart of the same IIS Web site. The hosted applications on the network make use of ASP.NET 3.5.There are not previous versions of ASP.NET is installed. You need to resolve this error as soon aspossible.  What should you do?()AYou should run the ServiceModel Metadata Utility tool (Svcutil.exe).BYou should change the pipeline mode associated with the application pool that hosts theapplication.CYou should run the ASP.NET Registration Tool (Aspnet_regiis.exe).DYou should make sure that the application pool that hosts the application is initiated.

单选题A customer needs to ensure that the number of threads servicing an application does not exceed the number of database connections available to the application. What step must you take to address this situation?()AConfigure a Max Threads Constraint and add your application to the list of applications for the  Constraint.BConfigure a Work Manager with a Maximum Threads Constraint tied to the Connection Pool and  configuration your application to use the Work Manager.CConfigure a Work Manager with a Minimum Threads Constraint tied to the Connection Pool and  configure your application to use the Work Manager.DConfigure a global MaxThreads constraint and target it to the server or clusters where your  application is deployed.EConfigure the startup parameter -Dwls-maxThreads to be the same as the number of  database connections configured.

单选题You work in a company which uses SQL Server 2008. You are the administrator of the company database. Now you are in charge of a SQL Server 2008 instance. There is a single Database Mail profile. Reports are sent to all the company employees by using the Mail profile. During office hours, a large volume of reports are sent by the sp_send_dbmail stored procedure. Now you notice that it takes a long time for the reports to be sent to the company manager. As the technical support, you have to speed up the delivery. So what action should you perform to achieve this goal?()AAnother SMTP account should be added to the existing Database Mail profile BWhen you send the reports to the manager, you should use the @importance = high parameter. CYou should change the Account Retry Attempts option of the Database Mail system properties DYou should configure a new Database Mail profile. The new one will be used for sending the reports to the manager.

单选题You are the network administrator for your company. The network contains an application server running Windows Server 2003.   Users report that the application server intermittently responds slowly. When the application server is responding slowly, requests that normally take 1 second to complete take more than 30 seconds to complete. You suspect that the slow server response is because of high broadcast traffic on the network.   You need to plan how to monitor the application server and to have a message generated when broadcast traffic is high. You also want to minimize the creation of false alarms when nonbroadcast traffic is high.   What should you do?  ()A Use the Alerts option in the Performance Logs and Alerts snap-in to configure an alert to trigger when the Datagrams/sec counter in the UDPv4 object is high.B Use System Monitor and configure it to monitor the Segments/sec counter in the TCPv4 object.  C Use System Monitor and configure it to monitor the Datagrams/sec counter in the UDPv4 object.D Use the Alerts option in the Performance Logs and Alerts snap-in to configure an alert to trigger when the Datagrams/sec counter in the TCPv4 object is high.

单选题An airline is building a booking system for its premium and general customers. The goal is to ensure premium members are given higher access priority when user traffic is high.    What configuration will achieve this goal?()AConfigure a Work Manager for premium users with a Minimum Thread Constraint.BConfigure a Work Manager for premium users with a higher fair-share-request-class.CConfigure a Work Manager for premium users with a higher response-time-request-class.DConfigure a Work Manager general users with a Maximum Thread Constraint.EConfigure a Work Manager for premium users with a custom request-class.

单选题Your portable computer is in sleep mode. When you resume work on the portable computer, you are not prompted for a password.  You need to ensure that you are prompted for a password each time the portable computer recovers from sleep mode.  What should you do?()AConfigure the computer to hibernate when not in use.BIn the current power plan settings, configure the computer to require a password when recovering from sleep mode.CConfigure the computer to use the High Performance power plan.DConfigure the screen saver settings to require a password on resumption of work.

多选题You work as a Web Developer at Certkiller.com. You are in the process of creating a Webapplication using Microsoft ASP.NET 3.5.  You host the Web application in Microsoft Internet Information Services (IIS) 6.0. You browse theapplication and receive the following error message:  Server Application Unavailable  The web application you are attempting to access on this web server is currently unavailable.Please hit the "Refresh" button in your web browser to retry your request.  You view the Application event log and discover the following message:  It is not possible to run two different versions of ASP.NET in the same IIS process. Please use theIIS Administration Tool to reconfigure your server to run the application in a separate process.  To ensure productivity you need to solve this problem as quick as possible.  What should you do?()AYou should change the IIS isolation mode.BYou should assign the application to another application pool.CYou should configure all applications that are part of your application's application pool in orderto use the same version of ASP.NET.DYou should run the Aspnet_regiis.exe Tool.EYou should restart the application pool that hosts the application.

单选题In a Java EE messaging application, one MDB is consuming a lot of memory at high traffic.    What configuration should you use to prevent possible out-of-memory error at high traffic and at the same time not losing messages?()AConfigure a Work Manager for the MDB with a Maximum Thread Constraint.BConfigure a Work Manager for the MDB with a Minimum Thread Constraint.  CConfigure a Work Manager for the MDB with a Maximum Thread Constraint and a Capacity Constraint. DConfigure a Work Manager for the MDB with a Minimum Thread Constraint and a Capacity Constraint. EConfigure a Work Manager for the MDB with both a Maximum Thread Constraint and Minimum Thread Constraint.