多选题You are developing an application to create a new file on the local file system.You need to define specific security settings for the file. You must deny the file inheritance of any default security settings during creation.What should you do?()ACreate the file by using a new FileStream object by passing the FileSecurity object as a parameter to the FileStream constructor.BCreate a new FileSecurity object.CApply the permissions by using the File class.DCreate a new FileSystem Access Rule object for each permission that you need,and add each rule to the FileSecurity object.ECreate a new FileSystem Audit Rule object and add it to the FileSecurity object.

多选题
You are developing an application to create a new file on the local file system.You need to define specific security settings for the file. You must deny the file inheritance of any default security settings during creation.What should you do?()
A

Create the file by using a new FileStream object by passing the FileSecurity object as a parameter to the FileStream constructor.

B

Create a new FileSecurity object.

C

Apply the permissions by using the File class.

D

Create a new FileSystem Access Rule object for each permission that you need,and add each rule to the FileSecurity object.

E

Create a new FileSystem Audit Rule object and add it to the FileSecurity object.


参考解析

解析: 暂无解析

相关考题:

Windows Communication Foundation (WCF) service will be hosted in Microsoft Internet Information Services (IIS).You create a new application in IIS to host this service and copy the service DLL to the bin directory of the application.You need to complete the deployment of this service to IIS. What should you do next?()A. Create an asmx file and add a @ServiceHost directive to this file. Copy the file to the root of the application directory.B. Create an .asmx file and add a @Register directive to this file. Copy the file to the bin directoyy of the application.C. Create a svc file and add a @ServiceHost directive to this file. Copy the file to the root of the application directory.D. Create a .svc file and add a @Register directive to this file. Copy the file to the bin directory of the application.

You are developing a Windows Presentation Foundation (WPF) application. All of the application styles are in the file name Themes.dllYou have the followiing markup segment.BlueBackground is defined in a XAML file named BlueTheme.xaml. The XAML markup is compiled into the Themes.dll file.You need to ensure that the XAML file is referenced so that the application can apply the settings in the BlueBackground style.()A.B.C.D.

You are in the process of creating a new application.This new application has to be able to read all data from a text file.What should you do?() A.B.C.D.

You have recently completed the creation of a new application.Certkiller .com requires you to ensure that this new application creates a file that contains an array of bytes.What should you do?() A.B.C.D.

Your company purchases a new application to deploy on 200 computers. The application requires that you modify the registry on each target computer before you install the application. The registry modifications are in a file that has an .adm extension. You need to prepare the target computers for the application. What should you do()A、Import the .adm file into a new Group Policy Object (GPO). Edit the GPO and link it to an organizational unit that contains the target computers.B、Create a Microsoft Windows PowerShell script to copy the .adm file to the startup folder of each target computer.C、Create a Microsoft Windows PowerShell script to copy the .adm file to each computer. Run the REDIRUsr CONTAINER-DN command on each target computer.D、Create a Microsoft Windows PowerShell script to copy the .adm file to each computer. Run the REDIRCmp CONTAINER-DN command on each target computer.

Your company has a server that runs Windows Server 2008 R2.You have a new application that locates remote resources by name. The new application requires IPv6.You need to ensure that the application can locate remote resources by using IPv6.What should you do?()A、Create a new Pointer (PTR) DNS record.B、Create a new Quad-A (AAAA) DNS record.C、Create a new Signature (SIG) DNS record.D、Create a new Route Through (RT) DNS record.

You use Microsoft .NET Framework 4 to create a Windows Presentation Foundation (WPF) application named MyApp.exe. You use Microsoft Windows Installer to package the application. You create an icon file named Application.ico. You need to associate Application.ico with MyApp.exe when it is deployed. What should you do?()A、Use the File Types Editor tool.B、Rename the icon file to MyApp.exe .ico.C、Set the AddRemoveProgramsIcon property to Application.ico.D、Use the File System Editor tool to set the Icon property to Application.ico.

You work as an application developer at Certkiller .com. You are in the process of creating an application for Certkiller .com’s Human Resources department that tracks employee benefits. You have to store current employee data without recompiling the application. You elect to store this employee data as a custom section in the application configuration file. The relevant portion of the application configuration file is shown in the following exhibit: ?xml version="1.0" encoding="utf-8" ?         You want to use the .NET 2.0 Configuration API to access the custom section. You need to ensure that programmatic access of the EmployeeSection element is enabled. What should you do?()A、 Create a custom section handler class that inherits the ConfigurationSection interface.B、 Add a section element to the EmployeeSection element of the application configuration file.C、 Create a custom section handler class that implements the IConfigurationSectionHandler interface.D、 Add an EmployeeSection element to the configSections element of the application configuration file.E、 Create a custom section handler class that implements the IApplicatioSettingsProvider interface.F、 Add a section element to the configSections element of the application configuration file.

tony wants to create a duplicate of the video application. He wants to keep a version of the data on the same server as the production application but does not want any new documents or documents modifications to be replicated into his new database once he creates it. Which one of the following should tony do to create his archive?()A、create a new copy of the databaseB、create a replica of the databaseC、Use the windows explorer to create a copy of the database file.D、Create a replica copy of the database and disable replication on the database file.

You have a server that runs Windows Server 2008. You install the Windows Media Services server role on the server.  You plan to publish an audio file to the Internet by using Media Server. You need to create a license for the audio file. What should you do first?()A、Publish the audio file to a new Web site.B、Publish the audio file to the Windows Media Services server.C、Package the audio file as a Windows Installer application.D、Package the audio file by using Windows Media Rights Manager.

You have recently created and distributed RDP files for a certain RemoteApp program. However,you findthat the application performs poorly and needs to be migrated to a more powerful server. What should youdo to ensure that users can connect to the RemoteApp program after it is migrated?()A、Create a new TS Web Access site for the new terminal server and publish the application to the newsite.B、Re-create an RDP file for the RemoteApp program after the migration and distribute the file to users.C、Modify the properties of the existing RDP file and re-distribute the file to users.D、In TS RemoteApp Manager on the old terminal server, change the Terminal Server settings so that the server name listed is the new terminal server.

You.create Windows.Forms.applications.by.using.the .NET Framework 3.5. You plan to use the Windows Installer to deploy a new application.   The application must meet the following requirements:  (1)Support deployment to 32bit and 64bit operating systems   (2)Use the 64bit Program Files folder when deployed to 64bit platforms    You need to ensure that the application is deployed appropriately.    What should you do?()A、Create a single MSI file.Add a launch condition that is set to Version NT64B、Create a single MSI file.Add a launch condition that is set to NOT Version NT64C、Create an MSI file that is targeted to 64bit platforms.Create an MSI file that is targeted to 32bit platformsD、Create a single MSI file.Create a merge module that contains the 32bit and 64bit code

You create Windows Forms applications by using the .NET Framework 3.5.You plan to deploy a new application by using the ClickOnce deployment technology.  The application is signed by using a certificate obtained from a trustworthy authority. You need to ensure that the application can be deployed as a trusted application to Windows Vista client computers on a corporate network.What should you do?()A、Create a manifest and set the RequestedExecutionLevel level attribute to AsInvoker.B、Create a manifest and set the RequestedExecutionLevel level attribute to AsAdministrator.C、Create a new certificatetrust list (CTL).Install the CTL on the server that has the ClickOnce application published.D、Create a new certificate trust list (CTL).Request the network administrator to deploy the CTL by using Group Policy.

You are a desktop administrator for your company. You are responsible for deploying a new application. The application is packaged in an .msi file. You need to deploy the application to only three users in the company. The .msi file contains all of the information necessary to correctly install the application. You need to install the application so that users see information about the installation progress, but no other user interface is displayed during the installation. What should you do?()A、Use the Msiexec.exe program to perform a quiet installation of the application.B、Use the Msiexec.exe program to perform a passive installation of the application. C、Create a Group Policy object (GPO) that assigns the application. Link the GPO to the site containing the users who will use the application. D、Create a Group Policy object (GPO) that advertises the application. Link the GPO to the domain.

You need to recommend a solution that meets the company’s application provsioning requirements. What should you recommend?()A、Create a new MED-V workspace.B、Publish a new RemoteApp program.C、Create an application compatibility shim.D、Package a new application by using the App-V Sequencer.

Your company has an Active Directory Domain Services (AD DS) domain. All servers run Windows Server 2008 R2. All client computers run Windows 7. You virtualize applications by using Microso ft Application Virtualization (App - V). You are deploying servers to five new branch offices. Each branch office will stream virtual applications from a local file server and perform application sequencing locally. You need to replicate application packages to all file servers and minimize bandwidth usage. What should you do?()A、Create a Distributed File System (DFS) root on each file server.B、On each file server, add the BranchCache for network files role service.C、Create an Active Directory Distributed Fi le System (DFS) root target folder.D、Create a Distributed File System Replication (DFSR) full mesh replication group.

Your company has an Active Directory Domain Services (AD DS) domain. All servers run Windows Server 2008 R2. All client computers run Windows 7. You virtualize applications by using Microsoft Application Virtualization (App-V). You are deploying servers to five new branch offices. Each branch office will stream virtual applications from a local file server and perform application sequencing locally. You need to replicate application packages to all file servers and minimize bandwidth usage. What should you do?()A、Create a Distributed File System (DFS) root on each file server.B、On each file server, add the BranchCache for network files role service.C、Create an Active Directory Distributed File System (DFS) root target folder.D、Create a Distributed File System Replication (DFSR) full mesh replication group.

You work as an application developer at Cer-Tech.com.You are in the process of creating an application for Cert-Tech.com’s Human Resources department that tracks employee benefits You have to store current employee data without recompiling the application. You elect to store this employee data as a custom section in the application configuration file. The relevant portion of the application configuration file is shown in the following exhibit: What should you do?()A、 Create a custom section handler class that inherits the ConfigurationSection interfaceB、 Add a section element to the EmployeeSection element of the application configuration fileC、 Create a custom section handler class that implements the IConfigurationSectionHandler interface.D、 Add an EmployeeSection element to the configSections element of the application confguration fileE、 Create a custom section handler class that implements the IApplicationSettingsProvider interfaceF、 Add a section element to the configSections element of the application configuration file

Your company purchases a new application to deploy on 200 computers. The application requires  that you modify the registry on each target computer before you install the application.     The registry modifications are in a file that has an .adm extension.     You need to prepare the target computers for the application.     What should you do()A、Import the .adm file into a new Group Policy Object (GPO). Edit the GPO and link it to an organizational unit that computer.B、Create a Microsoft Windows PowerShell script to copy the .adm file to the startup folder of each target computer.C、Create a Microsoft Windows PowerShell script to copy the .adm file to each computer. Run the REDIRUsr CONTAID、Create a Microsoft Windows PowerShell script to copy the .adm file to each computer. Run the REDIRCmp CONTA

You perform a security audit on a server named server1. You install the Microsoft network monitor 3.0 application on server1. You find that only some of the captured frames dsplay host mnemonic names in the source column and the destination column. All other frames display ip addresses. You need to display mnemonic host names instead of ip addresses for all the frames what should you do?()A、Create a new display filter and apply the filter to the capture.B、Create a new capture filter and apply the filter to the capture.C、Populate the aliases table and apply the aliases to the capture.D、Configure the network monitor application to enable the enable converstations option, recapture the data to a new file.

You are developing an application to create a new file on the local file system.You need to define specific security settings for the file. You must deny the file inheritance of any default security settings during creation.What should you do?()A、Create the file by using a new FileStream object by passing the FileSecurity object as a parameter to the FileStream constructor.B、Create a new FileSecurity object.C、Apply the permissions by using the File class.D、Create a new FileSystem Access Rule object for each permission that you need,and add each rule to the FileSecurity object.E、Create a new FileSystem Audit Rule object and add it to the FileSecurity object.

You are implementing an ASP.NET Web application. Users will authenticate to the application with an ID. The application will allow new users to register for an account. The application will generate an ID for the user based on the users full name. You need to implement this registration functionality. Which two actions should you perform?()A、Configure the SqlMembershipProvider in the web.config file.B、Configure the SqlProfileProvider in the web.config file.C、Create an ASP.NET page that contains a default CreateUserWizard control to create a new user account.D、Create an ASP.NET page that contains a custom form that collects the user information and then uses the Membership.CreateUser method to create a new user account.

单选题You work as an application developer at Certkiller .com. You are currently in the process of developing a business logic component that requires long calculations. You have identified numerous tasks within this application that can be done asynchronously. You notice that these tasks are mutually dependent and require complex synchronization techniques so that it can manage efficiently. You decide to use Microsoft .NET 2.0 to take advantage of its new thread management features. You need to create and start the application threads. What should you do?()A AB BC CD D

单选题Windows Communication Foundation (WCF) service will be hosted in Microsoft Internet Information Services (IIS).You create a new application in IIS to host this service and copy the service DLL to the bin directory of the application.You need to complete the deployment of this service to IIS. What should you do next?()ACreate an asmx file and add a @ServiceHost directive to this file. Copy the file to the root of the application directory.BCreate an .asmx file and add a @Register directive to this file. Copy the file to the bin directoyy of the application.CCreate a svc file and add a @ServiceHost directive to this file. Copy the file to the root of the application directory.DCreate a .svc file and add a @Register directive to this file. Copy the file to the bin directory of the application.

多选题You are implementing an ASP.NET Web application. Users will authenticate to the application with an ID. The application will allow new users to register for an account. The application will generate an ID for the user based on the users full name. You need to implement this registration functionality. Which two actions should you perform?()AConfigure the SqlMembershipProvider in the web.config file.BConfigure the SqlProfileProvider in the web.config file.CCreate an ASP.NET page that contains a default CreateUserWizard control to create a new user account.DCreate an ASP.NET page that contains a custom form that collects the user information and then uses the Membership.CreateUser method to create a new user account.

多选题You are developing an application to create a new file on the local file system.You need to define specific security settings for the file. You must deny the file inheritance of any default security settings during creation.What should you do?()ACreate the file by using a new FileStream object by passing the FileSecurity object as a parameter to the FileStream constructor.BCreate a new FileSecurity object.CApply the permissions by using the File class.DCreate a new FileSystem Access Rule object for each permission that you need,and add each rule to the FileSecurity object.ECreate a new FileSystem Audit Rule object and add it to the FileSecurity object.

单选题You.create Windows.Forms.applications.by.using.the .NET Framework 3.5. You plan to use the Windows Installer to deploy a new application.   The application must meet the following requirements:  (1)Support deployment to 32bit and 64bit operating systems   (2)Use the 64bit Program Files folder when deployed to 64bit platforms    You need to ensure that the application is deployed appropriately.    What should you do?()ACreate a single MSI file.Add a launch condition that is set to Version NT64BCreate a single MSI file.Add a launch condition that is set to NOT Version NT64CCreate an MSI file that is targeted to 64bit platforms.Create an MSI file that is targeted to 32bit platformsDCreate a single MSI file.Create a merge module that contains the 32bit and 64bit code

多选题You have recently created and distributed RDP files for a certain RemoteApp program. However,you findthat the application performs poorly and needs to be migrated to a more powerful server. What should youdo to ensure that users can connect to the RemoteApp program after it is migrated?()ACreate a new TS Web Access site for the new terminal server and publish the application to the newsite.BRe-create an RDP file for the RemoteApp program after the migration and distribute the file to users.CModify the properties of the existing RDP file and re-distribute the file to users.DIn TS RemoteApp Manager on the old terminal server, change the Terminal Server settings so that the server name listed is the new terminal server.