单选题In a Java EE messaging application, one MDB is consuming a lot of memory at high traffic. What configuration should you use to prevent possible out-of-memory error at high traffic and at the same time not losing messages?()AConfigure a Work Manager for the MDB with a Maximum Thread Constraint.BConfigure a Work Manager for the MDB with a Minimum Thread Constraint. CConfigure a Work Manager for the MDB with a Maximum Thread Constraint and a Capacity Constraint. DConfigure a Work Manager for the MDB with a Minimum Thread Constraint and a Capacity Constraint. EConfigure a Work Manager for the MDB with both a Maximum Thread Constraint and Minimum Thread Constraint.
单选题
In a Java EE messaging application, one MDB is consuming a lot of memory at high traffic. What configuration should you use to prevent possible out-of-memory error at high traffic and at the same time not losing messages?()
A
Configure a Work Manager for the MDB with a Maximum Thread Constraint.
B
Configure a Work Manager for the MDB with a Minimum Thread Constraint.
C
Configure a Work Manager for the MDB with a Maximum Thread Constraint and a Capacity Constraint.
D
Configure a Work Manager for the MDB with a Minimum Thread Constraint and a Capacity Constraint.
E
Configure a Work Manager for the MDB with both a Maximum Thread Constraint and Minimum Thread Constraint.
参考解析
解析:
暂无解析
相关考题:
Users at the Charleville Company began experiencing high network delays when Internet connectivity was enabled for all users. After investigating the traffic flow, you determine that peerto-peer traffic from a music download site is consuming a large amount of bandwidth. Which QoS mechanism can you implement to improve the network response time?()A. Use CBWFQ to queue the peer-to-peer traffic into the default traffic class.B. Use class-based WRED to randomly drop the peer-to-peer traffic during network congestions.C. Use class-based policing to limit the peer-to-peer traffic rate.D. Use class-based shaping to delay any excessive peer-to-peer traffic. Answer: C
An airline is building a booking system for its premium and general customers. The goal is to ensure premium members are given higher access priority when user traffic is high. What configuration will achieve this goal?()A、Configure a Work Manager for premium users with a Minimum Thread Constraint.B、Configure a Work Manager for premium users with a higher fair-share-request-class.C、Configure a Work Manager for premium users with a higher response-time-request-class.D、Configure a Work Manager general users with a Maximum Thread Constraint.E、Configure a Work Manager for premium users with a custom request-class.
You work as a Web Developer at Certkiller.com. You are in the process of creating a Webapplication using Microsoft ASP.NET 3.5. You host the Web application in Microsoft Internet Information Services (IIS) 6.0. You browse theapplication and receive the following error message: Server Application Unavailable The web application you are attempting to access on this web server is currently unavailable.Please hit the "Refresh" button in your web browser to retry your request. You view the Application event log and discover the following message: It is not possible to run two different versions of ASP.NET in the same IIS process. Please use theIIS Administration Tool to reconfigure your server to run the application in a separate process. To ensure productivity you need to solve this problem as quick as possible. What should you do?()A、You should change the IIS isolation mode.B、You should assign the application to another application pool.C、You should configure all applications that are part of your application's application pool in orderto use the same version of ASP.NET.D、You should run the Aspnet_regiis.exe Tool.E、You should restart the application pool that hosts the application.
You work as an application developer at Certkiller .com. You are developing an application that makes use of a Queue class object named MyQueue. This Queue class object will be used to store messages sent by the user during application run time.You would like to access the message at the beginning of the queue, prior to processing the user messages, without removing it. What should you do?()A、 Use the Enqueue method of the MyQueue object.B、 Use the Contains method of the MyQueue object.C、 Use the Dequeue method of the MyQueue object.D、 Use the Peek method of the MyQueue object.
You work as an application developer at Certkiller .com. You are developing an application that makes use of a Queue class object named MyQueue. This Queue class object will be used to store messages sent by the user during application run time. The application that you are developing provides an interface for administrators and an interface for users to create message reports.You want to ensure that all user messages stored in the MyQueue object are removed when an administrator selects the reset option.What should you do?()A、 Use the Enqueue method of the MyQueue object.B、 Use the Clear method of the MyQueue object.C、 Use the Dequeue method of the MyQueue object.D、 Use the TrimToSize method of the MyQueue object.
A customer needs to ensure that the number of threads servicing an application does not exceed the number of database connections available to the application. What step must you take to address this situation?()A、Configure a Max Threads Constraint and add your application to the list of applications for the Constraint.B、Configure a Work Manager with a Maximum Threads Constraint tied to the Connection Pool and configuration your application to use the Work Manager.C、Configure a Work Manager with a Minimum Threads Constraint tied to the Connection Pool and configure your application to use the Work Manager.D、Configure a global MaxThreads constraint and target it to the server or clusters where your application is deployed.E、Configure the startup parameter "-Dwls-maxThreads" to be the same as the number of database connections configured.
You work as a database administrator at Certkiller .com. In your production database, you observe that users’ transactions are consuming a lot of resource and you plan to impose resource restrictions by using Resource Manager. For which three resources can you enable usage restrictions by using Resource Manager? ()A、 CPU usageB、 degree of parallelismC、 number of open cursorsD、 number of sorts performedE、 idle time for blocking sessionsF、 number of disk I/O operations performedG、 number of memory I/O operations performed
In a Java EE messaging application, one MDB is consuming a lot of memory at high traffic. What configuration should you use to prevent possible out-of-memory error at high traffic and at the same time not losing messages?()A、Configure a Work Manager for the MDB with a Maximum Thread Constraint.B、Configure a Work Manager for the MDB with a Minimum Thread Constraint. C、Configure a Work Manager for the MDB with a Maximum Thread Constraint and a Capacity Constraint. D、Configure a Work Manager for the MDB with a Minimum Thread Constraint and a Capacity Constraint. E、Configure a Work Manager for the MDB with both a Maximum Thread Constraint and Minimum Thread Constraint.
You need to design an access control strategy for the marketing application. You solution must minimize impact on server and network performance. What should you do?()A、Require client computers to connect to the marketing application by using a VPN connectionB、Use IPSec to encrypt communications between the servers in the New York and Atlanta officesC、Require the high security setting on Terminal Services connections to the marketing applicationD、Configure all marketing application Web pages to require SSL
A Windows Communication Foundation (WCF) application exposes a service as a SOAP endpoint for consumption by cross-platform clients.During integration testing, you find that one of the clients is not generating the correct messages to the WCF application.In order to debug the issue and fix the communication, you need to configure the service to log messages received from the client.What should you do?()A、Set an etwTracking behavior on the service and configure a listener for the System.ServiceModel trace source.B、Set an etwTracking behavior on the service and configure a listener for the System.ServiceModel.MessageLogging trace source.C、Enable messageLogging in the System.ServiceModel diagnostics element configuration and configure a listener for the System.ServiceModel.MessageLogging trace source.D、Enable messageLogging in the System.ServiceModel diagnostics element configuration and configure a listener for the System.ServiceModel trace source.
Your portable computer is in sleep mode. When you resume work on the portable computer, you are not prompted for a password. You need to ensure that you are prompted for a password each time the portable computer recovers from sleep mode. What should you do?()A、Configure the computer to hibernate when not in use.B、In the current power plan settings, configure the computer to require a password when recovering from sleep mode.C、Configure the computer to use the High Performance power plan.D、Configure the screen saver settings to require a password on resumption of work.
You use Microsoft Windows Mail to download e-mail messages to your Inbox. You need to minimize the receipt of e-mail messages that attempt to acquire private financial information. What should you do?()A、Create an Inbox rule that moves potentially malicious email to the Junk Mail folder. B、Configure the Parental Controls Web restriction setting to High.C、Configure the phishing filter to move the e-mail messages to the Junk Mail folder. D、Configure Windows Defender to perform a custom scan of potentially malicious email.
You add a particular e-mail address to the Blocked Senders list in the Microsoft Windows Mail application. You still receive messages from this e-mail address. You need to prevent the receipt of all e-mail messages from this e-mail address. What should you do?()A、Configure the junk e-mail filtering setting to High.B、Remove the senders e-mail address from the Safe Senders list.C、Add the senders e-mail domain name to the Blocked Senders list.D、Configure the Microsoft Windows Mail application to delete suspected junk e-mail permanently.
You work as the IT professional in an international company which is named Wiikigo. You are experiencedin implementing and administering a network operating system. You are specialized in deploying servers,configuring Windows Server 2008 Terminal services and network application services, and configuring aweb services infrastructure. You are in charge of a member server which runs Windows Server 2008. The Terminal Services serverrole has been installed on the server. Microsoft Windows System Resource Manager (WSRM) is installedon the server. Now you receive report from users saying about performance degradation on the TerminalServer. You monitor the server and notice that one user is consuming 100 percent of the processor time.You create a resource-allocation policy named Policy1 that limits each user to 30 percent of the totalprocessor time. But you do not see any performance improvement. WSRM needs to be configured toenforce Policy1. What action should you perform?()A、The Terminal Services Configuration service should be restarted.B、Use the user context of the Terminal Server System account to launch the WSRM application.C、Set Policy1 should be set as the Profiling Policy.D、Set Policy1 should be set as the Managing Policy.
You work as a Web Developer at Certkiller.com. You create a Web application using MicrosoftASP.NET 3.5. Certkiller.com hosts the application in Microsoft Internet Information Services 7.0. You attempt tobrowse the application and receive the following error message: Service Unavailable HTTP Error 503. The service is unavailable. You check and discover that you are able to browse successfully to other application that formspart of the same IIS Web site. The hosted applications on the network make use of ASP.NET 3.5.There are not previous versions of ASP.NET is installed. You need to resolve this error as soon aspossible. What should you do?()A、You should run the ServiceModel Metadata Utility tool (Svcutil.exe).B、You should change the pipeline mode associated with the application pool that hosts theapplication.C、You should run the ASP.NET Registration Tool (Aspnet_regiis.exe).D、You should make sure that the application pool that hosts the application is initiated.
You work in a company which uses SQL Server 2008. You are the administrator of the company database. Now you are in charge of a SQL Server 2008 instance. There is a single Database Mail profile. Reports are sent to all the company employees by using the Mail profile. During office hours, a large volume of reports are sent by the sp_send_dbmail stored procedure. Now you notice that it takes a long time for the reports to be sent to the company manager. As the technical support, you have to speed up the delivery. So what action should you perform to achieve this goal?() A、Another SMTP account should be added to the existing Database Mail profile B、When you send the reports to the manager, you should use the @importance = high parameter. C、You should change the Account Retry Attempts option of the Database Mail system properties D、You should configure a new Database Mail profile. The new one will be used for sending the reports to the manager.
单选题A Windows Communication Foundation (WCF) application exposes a service as a SOAP endpoint for consumption by cross-platform clients.During integration testing, you find that one of the clients is not generating the correct messages to the WCF application.In order to debug the issue and fix the communication, you need to configure the service to log messages received from the client.What should you do?()ASet an etwTracking behavior on the service and configure a listener for the System.ServiceModel trace source.BSet an etwTracking behavior on the service and configure a listener for the System.ServiceModel.MessageLogging trace source.CEnable messageLogging in the System.ServiceModel diagnostics element configuration and configure a listener for the System.ServiceModel.MessageLogging trace source.DEnable messageLogging in the System.ServiceModel diagnostics element configuration and configure a listener for the System.ServiceModel trace source.
单选题You work as a Web Developer at Certkiller.com. You create a Web application using MicrosoftASP.NET 3.5. Certkiller.com hosts the application in Microsoft Internet Information Services 7.0. You attempt tobrowse the application and receive the following error message: Service Unavailable HTTP Error 503. The service is unavailable. You check and discover that you are able to browse successfully to other application that formspart of the same IIS Web site. The hosted applications on the network make use of ASP.NET 3.5.There are not previous versions of ASP.NET is installed. You need to resolve this error as soon aspossible. What should you do?()AYou should run the ServiceModel Metadata Utility tool (Svcutil.exe).BYou should change the pipeline mode associated with the application pool that hosts theapplication.CYou should run the ASP.NET Registration Tool (Aspnet_regiis.exe).DYou should make sure that the application pool that hosts the application is initiated.
单选题A customer needs to ensure that the number of threads servicing an application does not exceed the number of database connections available to the application. What step must you take to address this situation?()AConfigure a Max Threads Constraint and add your application to the list of applications for the Constraint.BConfigure a Work Manager with a Maximum Threads Constraint tied to the Connection Pool and configuration your application to use the Work Manager.CConfigure a Work Manager with a Minimum Threads Constraint tied to the Connection Pool and configure your application to use the Work Manager.DConfigure a global MaxThreads constraint and target it to the server or clusters where your application is deployed.EConfigure the startup parameter -Dwls-maxThreads to be the same as the number of database connections configured.
单选题You work in a company which uses SQL Server 2008. You are the administrator of the company database. Now you are in charge of a SQL Server 2008 instance. There is a single Database Mail profile. Reports are sent to all the company employees by using the Mail profile. During office hours, a large volume of reports are sent by the sp_send_dbmail stored procedure. Now you notice that it takes a long time for the reports to be sent to the company manager. As the technical support, you have to speed up the delivery. So what action should you perform to achieve this goal?()AAnother SMTP account should be added to the existing Database Mail profile BWhen you send the reports to the manager, you should use the @importance = high parameter. CYou should change the Account Retry Attempts option of the Database Mail system properties DYou should configure a new Database Mail profile. The new one will be used for sending the reports to the manager.
单选题Users at the Charleville Company began experiencing high network delays when Internetconnectivity was enabled for all users. After investigating the traffic flow, you determine that peer-to-peer traffic from a music download site is consuming a large amount of bandwidth. Which QoSmechanism can you implement to improve the network response time?()A Use CBWFQ to queue the peer-to-peer traffic into the default traffic class.B Use class-based WRED to randomly drop the peer-to-peer traffic during network congestions. C Use class-based policing to limit the peer-to-peer traffic rate.D Use class-based shaping to delay any excessive peer-to-peer traffic.
单选题You work as an application developer at Certkiller .com. You are developing an application that makes use of a Queue class object named MyQueue. This Queue class object will be used to store messages sent by the user during application run time. The application that you are developing provides an interface for administrators and an interface for users to create message reports.You want to ensure that all user messages stored in the MyQueue object are removed when an administrator selects the reset option.What should you do?()A Use the Enqueue method of the MyQueue object.B Use the Clear method of the MyQueue object.C Use the Dequeue method of the MyQueue object.D Use the TrimToSize method of the MyQueue object.
单选题You work as an application developer at Certkiller .com. You are developing an application that makes use of a Queue class object named MyQueue. This Queue class object will be used to store messages sent by the user during application run time.You would like to access the message at the beginning of the queue, prior to processing the user messages, without removing it. What should you do?()A Use the Enqueue method of the MyQueue object.B Use the Contains method of the MyQueue object.C Use the Dequeue method of the MyQueue object.D Use the Peek method of the MyQueue object.
单选题You are the network administrator for your company. The network contains an application server running Windows Server 2003. Users report that the application server intermittently responds slowly. When the application server is responding slowly, requests that normally take 1 second to complete take more than 30 seconds to complete. You suspect that the slow server response is because of high broadcast traffic on the network. You need to plan how to monitor the application server and to have a message generated when broadcast traffic is high. You also want to minimize the creation of false alarms when nonbroadcast traffic is high. What should you do? ()A Use the Alerts option in the Performance Logs and Alerts snap-in to configure an alert to trigger when the Datagrams/sec counter in the UDPv4 object is high.B Use System Monitor and configure it to monitor the Segments/sec counter in the TCPv4 object. C Use System Monitor and configure it to monitor the Datagrams/sec counter in the UDPv4 object.D Use the Alerts option in the Performance Logs and Alerts snap-in to configure an alert to trigger when the Datagrams/sec counter in the TCPv4 object is high.
单选题An airline is building a booking system for its premium and general customers. The goal is to ensure premium members are given higher access priority when user traffic is high. What configuration will achieve this goal?()AConfigure a Work Manager for premium users with a Minimum Thread Constraint.BConfigure a Work Manager for premium users with a higher fair-share-request-class.CConfigure a Work Manager for premium users with a higher response-time-request-class.DConfigure a Work Manager general users with a Maximum Thread Constraint.EConfigure a Work Manager for premium users with a custom request-class.
单选题Your portable computer is in sleep mode. When you resume work on the portable computer, you are not prompted for a password. You need to ensure that you are prompted for a password each time the portable computer recovers from sleep mode. What should you do?()AConfigure the computer to hibernate when not in use.BIn the current power plan settings, configure the computer to require a password when recovering from sleep mode.CConfigure the computer to use the High Performance power plan.DConfigure the screen saver settings to require a password on resumption of work.
多选题You work as a Web Developer at Certkiller.com. You are in the process of creating a Webapplication using Microsoft ASP.NET 3.5. You host the Web application in Microsoft Internet Information Services (IIS) 6.0. You browse theapplication and receive the following error message: Server Application Unavailable The web application you are attempting to access on this web server is currently unavailable.Please hit the "Refresh" button in your web browser to retry your request. You view the Application event log and discover the following message: It is not possible to run two different versions of ASP.NET in the same IIS process. Please use theIIS Administration Tool to reconfigure your server to run the application in a separate process. To ensure productivity you need to solve this problem as quick as possible. What should you do?()AYou should change the IIS isolation mode.BYou should assign the application to another application pool.CYou should configure all applications that are part of your application's application pool in orderto use the same version of ASP.NET.DYou should run the Aspnet_regiis.exe Tool.EYou should restart the application pool that hosts the application.
单选题In a Java EE messaging application, one MDB is consuming a lot of memory at high traffic. What configuration should you use to prevent possible out-of-memory error at high traffic and at the same time not losing messages?()AConfigure a Work Manager for the MDB with a Maximum Thread Constraint.BConfigure a Work Manager for the MDB with a Minimum Thread Constraint. CConfigure a Work Manager for the MDB with a Maximum Thread Constraint and a Capacity Constraint. DConfigure a Work Manager for the MDB with a Minimum Thread Constraint and a Capacity Constraint. EConfigure a Work Manager for the MDB with both a Maximum Thread Constraint and Minimum Thread Constraint.