单选题You are creating an assembly named Assembly1.Assembly1 contains a public method. The global cache contains a second assembly named Assembly2.You must ensure that the public method is only called from Assembly2.Which permission class should you use?()AGacIdentity PermissionBPublisher Identity PermissionCData Protection PermissionDStrong Name Identity Permission

单选题
You are creating an assembly named Assembly1.Assembly1 contains a public method. The global cache contains a second assembly named Assembly2.You must ensure that the public method is only called from Assembly2.Which permission class should you use?()
A

GacIdentity Permission

B

Publisher Identity Permission

C

Data Protection Permission

D

Strong Name Identity Permission


参考解析

解析: 暂无解析

相关考题:

You are writing an application that uses isolated storage to store user preferences.The application uses multiple assemblies.Multiple users will use this application on the same computer.You need to create a directory named Preferences in the isolated storage area that is scoped to the current Microsoft Windows identity and assembly.Which code segment should you use?()A.B.C.D.

You are creating a class that performs complex financial calculations.The class contains a method named GetCurrentRate that retrieves the current interest rate and a variable named currRate that stores the current interest rate.You write serialized representations of the class.You need to write a code segment that updates the currRate variable with the current interest ratewhen an instance of the class is deserialized.Which code segment should you use?()A.B.C.D.

Certkiller.com is currently using a performance counter named HitCounter.You are required to increment each time a user accesses the UI classes within the application.To do this, you start by creating performance counters using the following code:GRAFIK - wird nicht fr Antwort ben?tigt !!!You have to adjust the HitCounter performance counter when a hit occurs.What should you do?()A.B.C.D.

You have recently completely creating a new application for Certkiller .com.This new application has to load an instance of the Inventory class from a large file named Inventory.dat.You need to ensure that the application executes the loading process in as little time as possible.What should you do?()A.B.C.D.

You work as a network Exchange administrator at Company.com.The Company.com network currently consists of a single Active Directory forest containing a single domain named Company.com.The Company.com organization makes use of Microsoft Exchange Server 2010 as their messaging solution.you are responsible for managing a mailbox server named -ex01 that contains one mailbox database.A Company.com user named kara lang informs you that her mailbox contains a number of corrupted e-mail messages.you are in the process of recovering the e-mail messages of kara lang; however, other e-mail messages in the mailbox database should not be deleted.What should you do?()A、You should consider creating a database availability group (DAG). Then a backup of the mailbox database file should be restored. Thereafter the Export-Mailbox cmdlet should be run.B、You should consider creating a new Mailbox Recovery Database. Then a backup of the database file should be restored. Thereafter the Export-Mailbox cmdlet should be run.C、You should consider creating a new Mailbox Recovery Database. Then a backup of the database file should be restored. Thereafter the Restore-Mailbox cmdlet should be run.D、You should consider creating a database availability group (DAG). Then a backup of the mailbox database file should be restored. Thereafter the Restore-Mailbox cmdlet should be run.

You work as an administrator at ABC.com.The ABC.com network consists of a single domain named ABC.com. All servers on the ABC.com network have Windows Server 2012 R2 installed. ABC.com has a server, named ABC-SR13, which is configured as the primary DNS server in the ABC.com domain. ABC.com has another server, named ABC-SR14, which makes use of ABCSR13 for DNS queries.You want to make sure that running nslookup.exe from ABC-SR14 produces a result that shows the proper name of the default server.  Which of the following actions should you take?()A、You should consider creating a reverse lookup zone on ABC-SR14.B、You should consider creating a forward lookup zone on ABC-SR14.C、You should consider creating a reverse lookup zone on ABC-SR13.D、You should consider creating a forward lookup zone on ABC-SR13.

You are employed as the exchange administrator at Company.com.the Company.com network contains an exchange 2010 organization.you are responsible for managing an exchange server 2010 mailbox server named -ex01.You are in the process of implementing a policy that deletes e-mail messages automatically after 60 days.You receive an instruction from management to identify another location where users can store their messages after 60 days.However, administrators need to locate the e-mail messages in both locations when executing multi- mailbox searches. What should you do?()A、You should consider creating a Retention Policy.B、You should consider creating a.pst file for each user that is stored in a shared folder.C、You should consider creating a Personal Archive for each user.D、You should consider creating a journal rule.

You are creating a Windows Communication Foundation (WCF) service that implements the following service contract.[ServiceContract]public interface IOrderProcessing { [OperationContract] void ApproveOrder(int id);}You need to ensure that only users with the Manager role can call the ApproveOrder method. What should you do?()A、In the method body, check the Rights PosessesProperty property to see if it contains ManagerB、Add a PrincipalPermission attribute to the method and set the Roles property to ManagerC、Add a SecurityPermission attribute to the method and set the SecurityAction to DemandD、In the method body, create a new instance of WindowsClaimSet. Use the FindClaims method to locate a claimType named Role with a right named Manager

You are maintaining a Microsoft ASP.NET Web Application that was created by using the Microsoft .NET Framework version 3.5.  You obtain the latest version of the project from the source control repository. You discover that an assembly reference is missing when you attempt to compile the project on your computer.You need to compile the project on your computer.  What should you do?()A、Add a reference path in the property pages of the project to the location of the missing assembly.B、Add a working directory in the property pages of the project to the location of the missing assembly.C、Change the output path in the property pages of the project to the location of the missingassembly.D、Delete the assembly reference. Add a reference to the missing assembly by browsing for it on your computer.

You are creating an assembly named Assembly1.Assembly1 contains a public method. The global cache contains a second assembly named Assembly2.You must ensure that the public method is only called from Assembly2.Which permission class should you use?()A、GacIdentity PermissionB、Publisher Identity PermissionC、Data Protection PermissionD、Strong Name Identity Permission

You work as a Web Developer at Certkiller.com. You are in the process of creating a Webapplication using Microsoft ASP.NET 3.5.  A third-party assembly contains custom server controls. This assembly does not contain a strongname and it’s not part of the application’s Microsoft Visual Studio 2008 solution. You have to makesure that the other users are able to use the custom controls. You decide to configure theapplications project.  What should you do?()A、You should add a project reference to the project.B、You should add a Web reference to the project.C、You should add a service reference to the project.D、You should add an assembly reference to the project.

You are a professional level SQL Sever 2008 Database Administrator in an international corporation named Wiikigo. You are experienced in managing databases in an enterprise-level organization, optimizing and sustaining the database life cycle. In the company, your job is to implement solutions on security, troubleshooting, deployment and optimization. A SQL Server 2008 instance is managed by you. The security requirements should be designed for a new database application. A code segment is utilized by the application, and the code segment includes the following components: A method that the registry is accessed on the SQL Server, a method that the file system is accessed on a network file server, and a class definition that public static fields are utilized. SQL CLR integration is utilized by the code segment, and the code segment is implemented as a single assembly. Since you are the technical support, you are required to make sure that the application should be successfully deployed to the instance.    Which action will you perform?()A、The SAFE code access security should be utilized for the assembly.B、All public static fields should be replaced with public fields.C、All public static fields should be utilized with public static read-only fields. And then the assembly shouldbe registered by utilizing the regasm.exe utility before deployment.D、All public static fields should be replaced with public static read-only fields. And then the EXTERNAL_ACCESS code access security should be utilized for the assembly.

You are maintaining a Microsoft ASP.NET Web Application that was created by using the Microsoft .NET Framework version 3.5.  You obtain the latest version of the project from the source control repository. You discover that an assembly reference is missing when you attempt to compile the project on your computer. You need to compile the project on your computer.  What should you do?()A、Add a reference path in the Property Pages of the project to the location of the missing assembly. B、Add a working directory in the Property Pages of the project to the location of the missing assembly. C、Change the output path in the Property Pages of the project to the location of the missing assembly. D、Delete the assembly reference. Add a reference to the missing assembly by browsing for it on your computer.

You are implementing an ASP.NET Web site that uses a custom server control named Task. Task is defined as shown in the following list.    Class name: Task   Namespace: DevControls   Assembly: TestServerControl.dll   Base class: System.Web.UI.WebControls.WebControl    You copy TestServerControl.dll to the Web site‟s Bin folder.  You need to allow the Task control to be declaratively used on site pages that do not contain an explicit @ Register directive.  Which configuration should you add to the web.config file?()A、appSettings add key="Dev:Task" value="DevControls, DevControls.Task"/ /appSettings  B、compilation targetFramework="4.0" explicit="false" assemblies add assembly="TestServerControl" /      /assemblies /compilationC、pages controls add assembly="TestServerControl" namespace="DevControls" tagPrefix="Dev"/      /controls /pagesD、pages tagMapping add tagType="System.Web.UI.WebControls.WebControl" mappedTagType="DevControls /tagMapping /pages

You work as a network Exchange administrator at Company.com.The Company.com network currently consists of a single Active Directory forest containing a single domain named Company.com.The Company.com organization makes use of Microsoft Exchange Server 2010 as their messaging solution.During the course of the week you receive an instruction from the CIO to stop internal users from sending e-mail messages containing the words "Classified Data" to users outside the organization. What should you do?()A、You should consider creating a message classification.B、You should consider creating a Transport rule.C、You should consider creating a Send connector.D、You should consider creating a managed folder mailbox policy.

You work as the enterprise exchange administrator at Company.com.The Company.com network consists of a single Active Directory domain named Company.com.Company.com has an Exchange Server 2010 organization.You have received instructions from the CIO to support Autodiscover from the Internet by creating a resource record in DNS.What should you do?()A、You should consider creating a Host (A) resource record.B、You should consider creating a Text (TXT) resource record.C、You should consider creating a Pointer (PTR) resource record.D、You should consider creating a Mail exchange (MX) resource record.

You work as the application developer at Certkiller .com. Certkiller .com uses Visual Studio.NET 2005 as its application development platform.You have recently finished development of a class named TestReward and package the class in a .NET 2.0 assembly named TestObj.dll. After you ship the assembly and it is used by client applications, you decide to move the TestReward class from TestObj.dll assembly to the TestRewardObj.dll Assembly. You are to ensure when you ship the updated TestObj.dll and TestRewardObj.dll assemblies that the client applications continue to work and do not require recompiling.What should you do?()A、 The TypeForwardedTo attribute should be usedB、 The TypeConvertor.ConvertTo method should be usedC、 The InternalsVisibleTo attribute should be usedD、 The Type Convertor.ConvertFrom method should be used

单选题You are developing an application that dynamically loads assemblies from an application directory. You need to write a code segment that loads an assembly named Company1.dll into the current application domain. Which code segment should you use?()A AB BC CD D

单选题You work as a network Exchange administrator at Company.com.The Company.com network currently consists of a single Active Directory forest containing a single domain named Company.com.The Company.com organization makes use of Microsoft Exchange Server 2010 as their messaging solution.During the course of the week you receive an instruction from the CIO to stop internal users from sending e-mail messages containing the words "Classified Data" to users outside the organization. What should you do?()AYou should consider creating a message classification.BYou should consider creating a Transport rule.CYou should consider creating a Send connector.DYou should consider creating a managed folder mailbox policy.

单选题You work as the enterprise exchange administrator at Company.com.The Company.com network consists of a single Active Directory domain named Company.com.Company.com has an Exchange Server 2010 organization.You have received instructions from the CIO to support Autodiscover from the Internet by creating a resource record in DNS.What should you do?()AYou should consider creating a Host (A) resource record.BYou should consider creating a Text (TXT) resource record.CYou should consider creating a Pointer (PTR) resource record.DYou should consider creating a Mail exchange (MX) resource record.

单选题You work as an application developer at Certkiller .com. You are currently in the process of creating a shared assembly.  You are required to perform many integration tests to make sure the assembly works properly with multiple applications. You want to avoid constantly updating each application’s reference when the assembly is updated.  You have set the DEVPATH environmental variable to the default build location for the shared assembly.  You need to ensure that the Common Language Runtime (CLR) uses DEVPATH to locate the shared assembly. What should you do?()A AB BC CD D

单选题You are employed as the exchange administrator at Company.com.the Company.com network contains an exchange 2010 organization.you are responsible for managing an exchange server 2010 mailbox server named -ex01.You are in the process of implementing a policy that deletes e-mail messages automatically after 60 days.You receive an instruction from management to identify another location where users can store their messages after 60 days.However, administrators need to locate the e-mail messages in both locations when executing multi- mailbox searches. What should you do?()AYou should consider creating a Retention Policy.BYou should consider creating a.pst file for each user that is stored in a shared folder.CYou should consider creating a Personal Archive for each user.DYou should consider creating a journal rule.

单选题ou are the newly appointed system administrator at Certkiller.com. A former administratorcreated a Microsoft ASP.NET Web application using Microsoft .NET Framework v3.5.  You are responsible for maintaining the Web application. You use the source control repository toacquire the most recent version of the project. As soon as you attempt to compile the project onyour workstation you notice that the assembly reference is missing. To ensure productivity youneed to make sure that you are able to compile the project on your workstation. What should you do?()AYour best option would be to ensure that the assembly reference is deleted.Thereafter you need to add a reference to the missing assembly.BYour best option would be to ensure that a reference path in the property pages of the project is added to the location of the missing assembly.CYour best option would be to ensure that a working directory in the property pages of theproject is added to the location of the missing assembly.DYour best option would be to ensure that the output path in the property pages of the project is changed to the location of the missing assembly.

单选题You work as an administrator at ABC.com.The ABC.com network consists of a single domain named ABC.com. All servers on the ABC.com network have Windows Server 2012 R2 installed. ABC.com has a server, named ABC-SR13, which is configured as the primary DNS server in the ABC.com domain. ABC.com has another server, named ABC-SR14, which makes use of ABCSR13 for DNS queries.You want to make sure that running nslookup.exe from ABC-SR14 produces a result that shows the proper name of the default server.  Which of the following actions should you take?()AYou should consider creating a reverse lookup zone on ABC-SR14.BYou should consider creating a forward lookup zone on ABC-SR14.CYou should consider creating a reverse lookup zone on ABC-SR13.DYou should consider creating a forward lookup zone on ABC-SR13.

单选题You work as a network Exchange administrator at Company.com.The Company.com network currently consists of a single Active Directory forest containing a single domain named Company.com.The Company.com organization makes use of Microsoft Exchange Server 2010 as their messaging solution.you are responsible for managing a mailbox server named -ex01 that contains one mailbox database.A Company.com user named kara lang informs you that her mailbox contains a number of corrupted e-mail messages.you are in the process of recovering the e-mail messages of kara lang; however, other e-mail messages in the mailbox database should not be deleted.What should you do?()AYou should consider creating a database availability group (DAG). Then a backup of the mailbox database file should be restored. Thereafter the Export-Mailbox cmdlet should be run.BYou should consider creating a new Mailbox Recovery Database. Then a backup of the database file should be restored. Thereafter the Export-Mailbox cmdlet should be run.CYou should consider creating a new Mailbox Recovery Database. Then a backup of the database file should be restored. Thereafter the Restore-Mailbox cmdlet should be run.DYou should consider creating a database availability group (DAG). Then a backup of the mailbox database file should be restored. Thereafter the Restore-Mailbox cmdlet should be run.

单选题You use Microsoft .NET Framework 4 to create an application. The application contains a partially trusted client assembly and a server assembly. You create a custom sandboxed application domain. You need to ensure that the application can be executed in a partial-trust environment. What should you do?()AApply the following attribute to the server assembly. [assembly: AllowPartiallyTrustedCallers(PartialTrustVisibilityLevel=VisibleToAllHosts)]BApply the following attribute to the server assembly. [assembly: AllowPartiallyTrustedCallers(PartialTrustVisibilityLevel=NotVisibleByDefault)]CApply the following attribute to the client assembly. [assembly: AllowPartiallyTrustedCallers(PartialTrustVisibilityLevel=VisibleToAllHosts)]DApply the following attribute to the client assembly. [assembly: AllowPartiallyTrustedCallers(PartialTrustVisibilityLevel=NotVisibleByDefault)]

单选题You are loading a new assembly into an application. You need to override the default evidence for the assembly. You require the common language runtime (CLR) to grant the assembly a permission set,as if the assembly were loaded from the local intranet zone.  You need to build the evidence collection. Which code segment should you use?()A AB BC CD D

单选题You work as a Web Developer at Certkiller.com. You are in the process of creating a Webapplication using Microsoft ASP.NET 3.5.  A third-party assembly contains custom server controls. This assembly does not contain a strongname and it’s not part of the application’s Microsoft Visual Studio 2008 solution. You have to makesure that the other users are able to use the custom controls. You decide to configure theapplications project.  What should you do?()AYou should add a project reference to the project.BYou should add a Web reference to the project.CYou should add a service reference to the project.DYou should add an assembly reference to the project.