Certkiller .com has asked you to create a file management application to monitor the hosts file.Certkiller .com has instructed you to change the hosts file if it has been changed.You, therefore, need to display the size and whether the hosts file is set to read-only.What should you do?()A.B.C.D.
Certkiller .com has asked you to create a file management application to monitor the hosts file.Certkiller .com has instructed you to change the hosts file if it has been changed.You, therefore, need to display the size and whether the hosts file is set to read-only.What should you do?()
A.
B.
C.
D.
相关考题:
You have developed an application that simplifies hard drive management for Certkiller .com‘s administrators.The application that you created logs all modifications made to physical hard drives on an hourly basis.You now need to create an EventQuery object for this application.What should you do?()A.B.C.D.
Certkiller .com has a file server named Certkiller -SR07 that stores old inventory files. Certkiller .com has given you the task of creating an application to archive these old inventory files.The inventory files have to be compressed prior to being uploaded to Certkiller .com‘s Web server.You are currently writing a method that will receive a byte array and compress it into a new file.You need to ensure that a data corruption check takes place during the decompression process.What should you do?()A.B.C.D.
You work as an application developer at Certkiller .com. You are currently in the process of creating a new application for Certkiller .com. You are required to read compressed data files that has been sent by Certkiller .com‘s sales offices.These data files are less than 4 GB in size, but was compressed without cyclic redundancy. You want to write a method that receives the compressed files and return the uncompressed data as a byte array.What should you do?()A.B.C.D.
You have recently completed the creation of a new application.Certkiller .com requires you to ensure that this new application creates a file that contains an array of bytes.What should you do?() A.B.C.D.
Certkiller.com has asked you to create an application to display all of the top directories based on the drive path.You need to ensure that the application displays the number of files within top-level directories.What should you do?()A.B.C.D.
Certkiller .com has asked you to develop an application that displays the properties for all Certkiller.com‘s network drives.The information generated by this application will be utilized by Certkiller .com‘s network administrators to verify client setups.You need to ensure that these requirements are fully satisfied.What should you do?()A.B.C.D.
You have recently completely creating a new application for Certkiller .com.This new application has to load an instance of the Inventory class from a large file named Inventory.dat.You need to ensure that the application executes the loading process in as little time as possible.What should you do?()A.B.C.D.
Certkiller.com has hired you as a system administrator for their network. The previousadministrator created a Microsoft ASP.NET Web application. Microsoft .NET Framework v3.5 wasused to create this application. You detect an unexpected increase in the value of the Application Restarts counter whilstmonitoring the application performance counters. You receive an instruction from management toidentify the reasons for the increase. What should you identify?()A、The increase occurred due to changes made to the Web.config file in the system.web sectionfor debugging the application.B、The increase occurred due to the Microsoft IIS 6.0 host being restarted.C、The increase occurred due to an additional code fragment that needs recompilation to theASP.NET Web application.D、The increase occurred due to the Microsoft Windows Server 2003 that hosts the Webapplication being restarted.E、The increase occurred due to an additional new assembly in the Bin directory of the application.F、The increase occurred due to HTTP compression being enabled in the Microsoft IIS 6.0manager for the application
You work as an application developer at Certkiller .com. Certkiller .com has been hired by a small local private school to develop a class library that will be used in an application named ManageAttendance for the purpose of managing student records.You are responsible for developing this class library. Certkiller .com has instructed you to create a collection in the application to store learners’ results. The school has informed you that they currently only have seven learners, but that this value will triple in the following year. Due to the limited resources, you need to ensure that the collection you create consumes a minimum amount of resources. What should you use to create the collection?()A、 The HybridDictionary collection class.B、 The HashTable collection class.C、 The ListDictionary collection class.D、 The StringCollection collection class.
You work as an application developer at Certkiller .com. Certkiller .com has asked you to develop an application that monitors and controls the activities of a Windows service.You need to use the appropriate class to meet Certkiller .com’s requirements. What should you do?()A、 Use the ServiceBase class.B、 Use the ServiceInstaller class.C、 Use the ServiceManager class.D、 Use the ServiceController class.
You work as an application developer at Certkiller .com. You are in the process of creating an application for Certkiller .com’s Human Resources department that tracks employee benefits. You have to store current employee data without recompiling the application. You elect to store this employee data as a custom section in the application configuration file. The relevant portion of the application configuration file is shown in the following exhibit: ?xml version="1.0" encoding="utf-8" ? You want to use the .NET 2.0 Configuration API to access the custom section. You need to ensure that programmatic access of the EmployeeSection element is enabled. What should you do?()A、 Create a custom section handler class that inherits the ConfigurationSection interface.B、 Add a section element to the EmployeeSection element of the application configuration file.C、 Create a custom section handler class that implements the IConfigurationSectionHandler interface.D、 Add an EmployeeSection element to the configSections element of the application configuration file.E、 Create a custom section handler class that implements the IApplicatioSettingsProvider interface.F、 Add a section element to the configSections element of the application configuration file.
You work as a database administrator for Certkiller .com. You have been asked to use a centralized administrative tool to administer your database servers and application servers. In order to achieve the objective, which component would you configure on each database server?()A、Database ControlB、Management ServerC、Management RepositoryD、Application Server ControlE、Oracle Management Agent
You are designing an application for Certkiller .com and you have been asked to design a database table to facilitate monthly bill generation. The bill would include details of customer calls, listed in chronological order.Which method would you follow to achieve this objective without increasing the overhead of sorting the rows?()A、 create a hash cluster to store the dataB、 create an index cluster to store the dataC、 create a partitioned table to store the dataD、 create a sorted hash cluster to store the dataE、 create a heap table with rowid to store the data
You work as a Web Developer at Certkiller.com. You are in the process of creating a Webapplication using Microsoft ASP.NET 3.5. The configuration below exists in the Web.config file: Certkiller.com hosts the Web application in Microsoft Internet Information Services (IIS) 6.0. TheIntegrated Windows Authentication is enabled in IIS and anonymous access disabled. The application pool is configured to run as the identity Certkiller/WebApp. The IIS anonymous accountis Certkiller/Anonymous. The following code exists in the code-behind file for a web form: stringname = WindowsIdentity.GetCurrent().Name; Response.Write(name); A Certkiller.com employee named RoryAllen has a domain user account named Certkiller/RAllen.He uses this account to access the page. However, Rory Allen logs in to the Web application withthe user name FormsUser. You need to determine the output of this code when Rory Allenaccesses the page. What will the output of this code be?()A、The output will be FormsUser.B、The output will be Certkiller/RAllen.C、The output will be Certkiller/Anonymous.D、The output will be Certkiller/WebApp
You recently developed a Web application that accesses an external Web service to retrieve current exchange rates for Certkiller .com's e-Commerce Web site. The Web service converts USD prices to the customer's local currency. You have stored the URL to the external Web service's endpoint in the section of the Web.config file. The Web application has been successfully deployed to a Certkiller .com Web server named Certkiller -SR14. A few months later the vendor of the Web service changes the port that is used to access the Web service. You need to update the section of the Web application's Web.config file from Certkiller -WS528. You need to ensure that your solution has a minimal impact on customers that may be connected to the e-Commerce Web site. What should you do?()A、Create a Host entry in the Lmhosts file on Certkiller -SR14. Point the Host entry to the new end point.B、Use the Copy Web Site function in Visual Studio 2005 to deploy the Web.config file from Certkiller -WS528 to Certkiller -SR14.C、Create a Web Setup project in Visual Studio 2005 to deploy the Web.config file from Certkiller -WS528 to Certkiller -SR14.D、Use the Web Site Administration Tool to change the appSettings section of the Web.config file.
Certkiller.com has employed you as a system administrator. Your job function encompassescreating an ASP.NET application for the network. You make use of Microsoft .NET Frameworkv3.5 to creaste the application. You receive a request from management to capture the timing and performance data of the newlycreated application. For security purposes you need to make sure that he data is only availablewhen a Certkiller user is logged on to the Web server and not on individual Web pages. What should you do?()A、You should consider adding trace enabled="true" writeToDiagnosticsTrace="true"pageOutput="true" localOnly="true" / to the Web.config file.B、You should consider adding compilation debug="false" urlLinePragmas="true" / to theWeb.config file.C、You should consider adding trace enabled="true" pageOutput="false" localOnly="true" / tothe Web.config file.D、You should consider adding compilation debug="true" / to the Web.config file.
You work as a Web Developer at Certkiller.com. You create a Web application using MicrosoftASP.NET 3.5. Certkiller.com hosts the application in Microsoft Internet Information Services 7.0. You attempt tobrowse the application and receive the following error message: Service Unavailable HTTP Error 503. The service is unavailable. You check and discover that you are able to browse successfully to other application that formspart of the same IIS Web site. The hosted applications on the network make use of ASP.NET 3.5.There are not previous versions of ASP.NET is installed. You need to resolve this error as soon aspossible. What should you do?()A、You should run the ServiceModel Metadata Utility tool (Svcutil.exe).B、You should change the pipeline mode associated with the application pool that hosts theapplication.C、You should run the ASP.NET Registration Tool (Aspnet_regiis.exe).D、You should make sure that the application pool that hosts the application is initiated.
单选题You work as an application developer at Certkiller .com. Certkiller .com has asked you to create a multi-threaded application, which executes a critical database backup operation on an hourly basis. You define this operation with the following code: public void BackupDB () { //Implementation code } You then create a Thread object for the purpose of invoking this method. You need to ensure that the thread is scheduled for execution before any other thread at runtime.What should you do?()A AB BC CD D
单选题You work as an application developer at Certkiller .com. You have been asked by you superiors at Certkiller .com to create a child application domain. The new child application domain has to specify a different assembly path than that of the parent application domain.You need to ensure that your solution meets Certkiller .com’s requirements.What should you do?()A AB BC CD D
单选题You work as a Web Developer at Certkiller.com. You create a Web application using MicrosoftASP.NET 3.5. Certkiller.com hosts the application in Microsoft Internet Information Services 7.0. You attempt tobrowse the application and receive the following error message: Service Unavailable HTTP Error 503. The service is unavailable. You check and discover that you are able to browse successfully to other application that formspart of the same IIS Web site. The hosted applications on the network make use of ASP.NET 3.5.There are not previous versions of ASP.NET is installed. You need to resolve this error as soon aspossible. What should you do?()AYou should run the ServiceModel Metadata Utility tool (Svcutil.exe).BYou should change the pipeline mode associated with the application pool that hosts theapplication.CYou should run the ASP.NET Registration Tool (Aspnet_regiis.exe).DYou should make sure that the application pool that hosts the application is initiated.
单选题You work as a database administrator for Certkiller .com. You have been asked to use a centralized administrative tool to administer your database servers and application servers. In order to achieve the objective, which component would you configure on each database server?()ADatabase ControlBManagement ServerCManagement RepositoryDApplication Server ControlEOracle Management Agent
单选题You work as an application developer at Certkiller .com. Certkiller .com has asked you to develop an application that monitors and controls the activities of a Windows service.You need to use the appropriate class to meet Certkiller .com’s requirements. What should you do?()A Use the ServiceBase class.B Use the ServiceInstaller class.C Use the ServiceManager class.D Use the ServiceController class.
单选题You recently developed a Web application that accesses an external Web service to retrieve current exchange rates for Certkiller .com's e-Commerce Web site. The Web service converts USD prices to the customer's local currency. You have stored the URL to the external Web service's endpoint in the section of the Web.config file. The Web application has been successfully deployed to a Certkiller .com Web server named Certkiller -SR14. A few months later the vendor of the Web service changes the port that is used to access the Web service. You need to update the section of the Web application's Web.config file from Certkiller -WS528. You need to ensure that your solution has a minimal impact on customers that may be connected to the e-Commerce Web site. What should you do?()ACreate a Host entry in the Lmhosts file on Certkiller -SR14. Point the Host entry to the new end point.BUse the Copy Web Site function in Visual Studio 2005 to deploy the Web.config file from Certkiller -WS528 to Certkiller -SR14.CCreate a Web Setup project in Visual Studio 2005 to deploy the Web.config file from Certkiller -WS528 to Certkiller -SR14.DUse the Web Site Administration Tool to change the appSettings section of the Web.config file.
单选题You are an administrator at Certkiller .com. Certkiller has a network of 5 member servers acting as file servers. It has an Active Directory domain. You have installed a software application on the servers. As soon as the application is installed, one of the member servers shuts down itself. To trace and rectify the problem, you create a Group Policy Object (GPO). You need to change the domain security settings to trace the shutdowns and identify the cause of it. What should you do to perform this task()ALink the GPO to the domain and enable System Events optionBLink the GPO to the domain and enable Audit Object Access optionCLink the GPO to the Domain Controllers and enable Audit Object Access optionDLink the GPO to the Domain Controllers and enable Audit Process tracking optionEPerform all of the above actions
多选题Certkiller.com has hired you as a system administrator for their network. The previousadministrator created a Microsoft ASP.NET Web application. Microsoft .NET Framework v3.5 wasused to create this application. You detect an unexpected increase in the value of the Application Restarts counter whilstmonitoring the application performance counters. You receive an instruction from management toidentify the reasons for the increase. What should you identify?()AThe increase occurred due to changes made to the Web.config file in the system.web sectionfor debugging the application.BThe increase occurred due to the Microsoft IIS 6.0 host being restarted.CThe increase occurred due to an additional code fragment that needs recompilation to theASP.NET Web application.DThe increase occurred due to the Microsoft Windows Server 2003 that hosts the Webapplication being restarted.EThe increase occurred due to an additional new assembly in the Bin directory of the application.FThe increase occurred due to HTTP compression being enabled in the Microsoft IIS 6.0manager for the application
单选题You work as a Web Developer at Certkiller.com. You are in the process of creating a Webapplication using Microsoft ASP.NET 3.5. The configuration below exists in the Web.config file: Certkiller.com hosts the Web application in Microsoft Internet Information Services (IIS) 6.0. TheIntegrated Windows Authentication is enabled in IIS and anonymous access disabled. The application pool is configured to run as the identity Certkiller/WebApp. The IIS anonymous accountis Certkiller/Anonymous. The following code exists in the code-behind file for a web form: stringname = WindowsIdentity.GetCurrent().Name; Response.Write(name); A Certkiller.com employee named RoryAllen has a domain user account named Certkiller/RAllen.He uses this account to access the page. However, Rory Allen logs in to the Web application withthe user name FormsUser. You need to determine the output of this code when Rory Allenaccesses the page. What will the output of this code be?()AThe output will be FormsUser.BThe output will be Certkiller/RAllen.CThe output will be Certkiller/Anonymous.DThe output will be Certkiller/WebApp
单选题You work as an application developer at Certkiller .com. You have recently created a multithreaded application to manage Certkiller .com’s inventory system. The fulfillment task has to be executed on a regular basis, while other tasks are performed in the application. The task does not need any input to start. You are required to create and start the fulfillment thread using the appropriate code.What code should you use?()A AB BC CD D