You want to enable users of a Web application to modify the Web application's UI and behavior. These modifications must be maintained at the user level so that when users return to the Web application, the changes are still in effect. You need to achieve this goal by using the minimum amount of custom code. What should you do?()A、Persist control data by using view state.B、Use Web Part controls.C、Maintain a profile for each user.D、Enable session state on the Web application.

You want to enable users of a Web application to modify the Web application's UI and behavior. These modifications must be maintained at the user level so that when users return to the Web application, the changes are still in effect. You need to achieve this goal by using the minimum amount of custom code. What should you do?()

  • A、Persist control data by using view state.
  • B、Use Web Part controls.
  • C、Maintain a profile for each user.
  • D、Enable session state on the Web application.

相关考题:

You create a Web application for your company‘s intranet. You want to enable users to customize their versions of the intranet home page. You create sections of content as Web Parts. You need to ensure that users can customize content at any time.Which two code segments should you use?()A.B.C.D.

You want to enable users of a Web application to modify the Web application‘s UI and behavior. These modifications must be maintained at the user level so that when users return to the Web application, the changes are still in effect. You need to achieve this goal by using the minimum amount of custom code.What should you do?()A. Persist control data by using view state.B. Use Web Part controls.C. Maintain a profile for each user.D. Enable session state on the Web application.

You are creating a mobile Web Form that dynamically displays news items. You want to display news items by using an instance of a mobile TextView control named TextViewNews. You need to configure the Web Form that contains TextViewNews. The Web Form must enable pagination in casea users device does not display the full text of a news item.Which code segment should you use? ()A.B.C.D.

You are the administrator of a Windows 2000 Server computer named Ezonexam1. A printer named PrinterColor is configured on Ezonexam1.You want to allow only users in the Administrators group and users in the Managers group to print to PrinterColor. You also want to allow users in the Managers group to pause and resume their print jobs, and you want to ensure that users in the Administrators group have full control permission for PrinterColor.What should you do?To answer, click the Simulation button and then perform. the appropriate actions in the simulation of the Printers folder.

You have created a Host Checker policy that contains multiple rules. You want to inform end users which rule specifically has failed.In the admin GUI, which configuration setting would you enable?() A. Enable Custom InstructionsB. Pre-auth notificationC. Remediation messageD. Send reason strings

You work as a database administrator for Certkiller .com. Client connection requests are failing because the listener is not responding. You want to forward client connect requests to another listener if one listener is not responding. How do you achieve this?()A、Enable instance failoverB、Configure shared serverC、Enable database failoverD、Enable connect-time failoverE、Enable Transparent Application Failover (TAF)

You use a shared Windows 2000 Professional Computer. You notice, that some of your Microsoft Word documents that were on the local hard drive have been deleted. You restore the documents from a recent backup. Now, you want to be able to track all users who access your Word documents in the future. What should you do? ()A、Enable the local Group Policy for auditing object access events that are successful.B、Enable the local Group Policy for auditing object access events that are unsuccessful.C、Enable the local Group Policy for auditing process tracking events that are successful.D、Enable the local Group Policy for auditing process tracking events that are unsuccessful. E、Use Windows 2000 Explorer, to enable auditing for your files.F、Run the diskperf - y command. Use System Monitor to examine the logical I/O counter.  Restart the Computer.

You are an administrator of a small business network. You have one dial-up account at an ISP and want all computers on your network connect to the Internet.  You have enabled Internet connection sharing. You do not want to initiate this connection automatically when a request for Internet reaches your computer. What should you do? ()A、You should uncheck “Enable on demand dialingB、Enable on-demand dialingC、Enable sharing a modem on one computer on the networkD、Configure a DHCP ServerE、Disable Internet Connection Sharing

You have created a Host Checker policy that contains multiple rules. You want to inform end users which rule specifically has failed.In the admin GUI, which configuration setting would you enable?()A、Enable Custom InstructionsB、Pre-auth notificationC、Remediation messageD、Send reason strings

You have many users complaining about slow inserts into a large table. While investigating the reason, you find that the number of indexes on the table is high. You want to find out which indexes are not being used.  Which method would you follow to achieve this?()A、enable index monitoring and query the DBA_OBJECTS viewB、enable index monitoring and query the DBA_INDEXES viewC、enable index monitoring and query the V$OBJECT_USAGE viewD、enable index monitoring and view the DBA_INDEXTYPE_COMMENTS view

You are a network administrator for ExamSheet.net's Windows 2000 network.  The purchasing department has recently purchased 10 new computers. Each computer has a fax modem. You create an NTFS volume and install Windows 2000 Professional on the computers. You then install the Fax service with the default values and settings. Users report that when they attempt to fax a document by using the fax printer that is installed, the document does not fax. You want users to be able to fax documents.  What should you do?()A、Enable the Print Spooler service on the computers.B、Apply the Basicwk.inf security template on the computer.C、Apply the Hisecws.inf security template on the computer.D、Enable the Fax service in the Computer Management on the computers.E、Grant their user account theWriteNTFS permission on the MSFax folder.

You are an IIS Web server administrator implementing authentication settings for a new Web site.According to the requirements for the Human Resources Web site, users should be prompted forauthentication information when they attempt to access the site. The site will be accessed only by userswho have accounts in your organization’s Active Directory domain. You have already configured the filesystem permissions for the content based on the appropriate settings. You also want to maximize securityof the site. Which two actions should you take to meet these requirements?()A、Enable Windows authentication.B、Enable basic authentication.C、Disable anonymous authentication.D、Enable anonymous authentication.

You are the administrator of Company’s network.You install 50 new Windows 2000 Professional computers in the marketing department. Two weeks later,users report that five of the computers have stopped responding. You troubleshoot the five computers.You find that some users have installed unsigned device drivers that are not supported by Windows 2000Professional.You want to determine which drivers were installed by users.What should you do?()A、Run the chkdsk /f command on all drives on the computers.B、Configure Windows 2000 Professional to enable driver signing verification.C、Run the File Signature Verification tool on the computers.D、Run the System File Checker utility on the computers.

You use a Windows 2000 Professional computer.You are responsible for maintaining Company’s client contact list. You want other users on the networkto be able to read the client contact list. You use Windows Explorer to share the client contact list folderon the network.You want users touse the most current available information when contacting clients. You want toprevent users from enabling offline access for the network share that contains the client contact list.What should you do?()A、Use Synchronization Manager to configure synchronization not to occur when users are connected to the LAN connection.B、Use Windows Explorer to grant users Special access for the reports on the network share.C、Use Windows Explorer to disable caching for the reports on the network share.D、Use Windows Explorer to disable Offline files.

Your network consists of an Active Directory domain. The domain controllers run Windows Server 2008 R2. Client computers run Windows 7.   You need to implement Encrypting File System (EFS) for all client computers. You want to achieve this goal while meeting the following requirements:   èYou must minimize the amount of data that is transferred across the network when a user logs on to or off from a client computer.   èUsers must be able to access their EFS certificates on any client computers. èIf a client computer s disk fails, EFS certificates must be accessible    What should you do?()A、Enable credential roaming.B、Enable roaming user profiles.C、Enable a Data Recovery Agent.D、Issue smart cards to all users.

You are the administrator of a Windows 2000 network. You need to store secured files for your company’s Accounting and Legal departments on a Windows 2000 Professional computer. You want to accomplish the following goals:  • Enable users in both departments to access their own files from the network  • Enable users in the Accounting department to view the Legal department’s documents  • Prevent users in the Legal department from being able to view the Accounting department’s    documents  • Enable managers within the company to access and modify both the Accounting and the Legal   department’s files You take the following actions:   • Create two shared folders named Accounting and Legal  • Create three groups named Accounting, Legal, and Management  • Allow the Accounting group Modify permission on the Accounting folder  • Allow the Accounting group Read permissions on the Legal folders.  • Allow the Management group Modify permission on both the Accounting and Legal folders.   Which result or results do these actions produce?()A、Users in both departments can access to their own files from the network.B、Users in the Accounting department can view the Legal department’s documents.C、Users in the Legal department cannot view the Accounting department’s documents.D、Company managers can access and modify both departments’ files.

You are the administrator of your company’s network. The software department is preparing to rewrite an accounting application so that it will run on Windows 2000 Professional computers. All of the computers in the software department currently use Windows 98.  You want to configure the computers in the software department so that the users can use both Windows 98 and Windows 2000 Professional during the project. You also want to ensure that the computers are configured for optimal disk performance. In addition you want to ensure that users in the software department can access all of the files on their computers by using either operating system.  What should you do? ()A、 Create and format a FAT 32 partition.B、 Create and format an NTFS volume.C、 Configure Windows 2000 Professional to enable disk compression.D、 Configure Windows 2000 Professional to enable dynamic volume

You share your computer with two users who belong to the Users group. You need to ensure that all users are informed of new updates.  What should you do?()A、Enable the Turn on recommended updates via Automatic Updates option.B、Enable the Allow non-administrators to receive update notifications option.C、Enable the Enable client-side targeting option and specify the target group.D、Disable the Do not display "Install Updates and Shut Down" option in Shut Down Windows Dialog box option.

单选题You have created a Host Checker policy that contains multiple rules. You want to inform end users which rule specifically has failed.In the admin GUI, which configuration setting would you enable?()AEnable Custom InstructionsBPre-auth notificationCRemediation messageDSend reason strings

单选题You are configuring five computers for Windows NT Workstation 4.0 and Windows 2000 Professional. Each computer has an 8 GB hard disk. You configure the hard disk on each computer to have two 4 GB partitions.  Windows NT Workstation is installed on drive C and Windows 2000 Professional on drive D. In Windows 2000 Professional, you configure a disk quota on drive D to prevent users from saving work files on the disk. You restart your computer and load Windows NT Workstation. You notice that users can save files to drive D.  You want to prevent users from saving the files to drive D in either operating system. You also want to ensure that users can access both drives while using either operating system.  What should you do?()AUse Windows 2000 Professional to configure drive D as a dynamic partitionBUse Windows 2000 Professional to enable encrypting file system on drive DCUse Windows NT workstation to configure NTFS permissions on drive D to deny the users  write permissionDReinstall Windows NT Workstation after configuring disk quotas

单选题You are using Windows 2000 Professional on your desktop computer. You are working on the company’s financial report and you want other users on the network to able to modify your documents for the report. You want users to share the financial report folder on the network. Because the network contains confidential information you want to prevent users from the enabling off line access for the network share that contains the financial report. What should you do?()AUse Windows Explorer to receive the offline filesBUsing the Windows Explorer, disable the cache for the reports on the network shareCUse the Windows NT explorer to grant the special access for the reports on the network  shareDUse the synchronization manager to configure synchronization not to occur when users are  connected to the LAN connection.

单选题You use a Windows 2000 Professional desktop computer. The corporate product information is stored on this computer. You want other users on the network to be able to read the product information on your computer. You use Windows Explorer to share the product information folder on the network. You want Sales staff to be able to keep a copy of the product information on their portable computers when they travel. Other users should not be able to synchronize the product information.  What should you do?()AUse Synchronization manager to configure synchronization to occur when users are connected to the LAN connection.BUse Windows Explorer to grant Sales Staff Special access for the reports on the network share.CUse Windows Explorer to enable automatic caching for documents on the network share.DCreate a new share for the Sales users only and enable caching on that share only.

单选题You configure the hard disk on each computer to have two 4-GB partitions. Windows NT  Workstation is installed on driver C.  Windows 2000 Professional is installed on drive D.   In Windows 2000 Professional, you configure a disk quota on drive D to prevent users from saving work files on the disk. You restart the computers and load Windows NT Workstation. You notice that users can still save files to drive D.   You want t prevent users from saving files to drive D in either operating system. You also want to ensure that users can access both drives while using either operating system.   What should you do on each computer?()AUse Windows 2000 Professional to configure drive D as a dynamic partitionBUse Windows 2000 Professional to enable Encrypting File System (EFS) on drive DCUse Windows NT Workstation to configure NTFS permissions on drive D to deny the users write permissionDReinstall Windows NT Workstation after configuring the disk quotas

单选题You are a systems administrator troubleshooting a problem with accessing a Web server running WindowsServer 2008. Previously, another administrator created and installed a server certificate on the computer.Users report that they are able to connect to the site using HTTP but that they receive a warning in InternetExplorer when trying to connect by HTTPS. You want to enable users to connect using both HTTP andHTTPS. You attempt to access the site by using an instance of Internet Explorer on the server itself, andyou receive the same warning message for HTTPS connections. How can you resolve this issue?()AChange the site binding for the Web site to enable connections on port 443.BChange the SSL settings for the Web site to enable the Require SSL option.CObtain and install an Internet Certificate on the Web server.DExport and re import the existing security certificate.

单选题You want to enable users of a Web application to modify the Web application's UI and behavior. These modifications must be maintained at the user level so that when users return to the Web application, the changes are still in effect. You need to achieve this goal by using the minimum amount of custom code. What should you do?()APersist control data by using view state.BUse Web Part controls.CMaintain a profile for each user.DEnable session state on the Web application.

单选题You administer a Windows 2000 Professional computer that is shared by multiple users. You receive a phone call from one of the users of the shared computer that tells you that the computer is reporting a kernel stop error. You notice that a user has tried to install video drivers that have caused the computer to become unstable. You want to ensure that users can install only the drivers that are approved by the manufacturer.  What should you do? ()AConfigure File signature verification to block driver installation, and set driver signing as a system default.BRemove all users from the Power User group.CCreate a Local Computer Policy to prevent users from installing drivers.DCreate a Local Computer Policy to enable Windows File Protection.

单选题You are the administrator of 15 Windows XP Professional portable computers in the sales department of your ompany. The company network uses DHCP to configure the IP addresses of the portable computers when the computers are used in the office. Company policy allows the company portable computers to be connected to users' home networks. The sales department reports that users who use home networks that have manually configured IP addresses are unable to connect the portable computers to their home networks. You want to ensure that users can connect portable computers to their home networks when they are at home and to the company network when they are in the office. You do not want to change the configuration of home computers on users' home networks. You do not want to change the administrative privileges of the sales department users. What should you do?()AConfigure the network adapters of the portable computers to enable Internet Connection Sharing (ICS). BConfigure the network adapters of the portable computers to enable Automatic Private IP Addressing (APIPA).CAdd a script to the users' desktops that changes the IP configuration between dynamic and manual.DConfigure the IP properties of the portable computers so that they have an alternate configuration.

单选题You are the Exchange administrator of the Xxx Corporation’s Exchange 2010 organization.You create a public folder named PublicFolder1 on a Mailbox server named MBX55 to enable users to post messages.You want your assistant, Josh, to configure PublicFolder1 to replicate with the Mailbox servers in other offices.To achieve this, you want Josh to run the Set-PublicFolder cmdlet to configure the replication schedule.You must delegate appropriate permissions to Josh to enable him to run the Set-PublicFolder cmdlet.What should you do?()AAdd Josh to the local Server Operators group.BDelegate the Exchange Recipient Administrators role to Josh.CDelegate the Exchange Public Folder Administrators role to Josh.DDelegate the Exchange View-Only Administrators role to Josh.