单选题You are creating an error page that provides a user-friendly screen whenever a server exception occurs.You want to hide the stack trace, but you do want to provide the exception’s error message to the user sothe user can provide it to the customer service agent at your company.  Which EL code snippet inserts thiserror message into the error page?()AMessage: b${exception.message}/bBMessage: b${exception.errorMessage}/bCMessage: b${request.exception.message}/bDMessage: b${pageContext.exception.message}/bEMessage: b${request.exception.errorMessage}/b

单选题
You are creating an error page that provides a user-friendly screen whenever a server exception occurs.You want to hide the stack trace, but you do want to provide the exception’s error message to the user sothe user can provide it to the customer service agent at your company.  Which EL code snippet inserts thiserror message into the error page?()
A

Message: <b>${exception.message}</b>

B

Message: <b>${exception.errorMessage}</b>

C

Message: <b>${request.exception.message}</b>

D

Message: <b>${pageContext.exception.message}</b>

E

Message: <b>${request.exception.errorMessage}</b>


参考解析

解析: 暂无解析

相关考题:

You have a stand-alone server named Server1 that runs Windows Server 2003 Service Pack 2 (SP2).A user named User1 is a member of the Administrators group on Server1.User1 attempts to log on to Server1 and receives the following error message.Other members of the Administrators group can log on to Server1.You need to ensure that User1 can log on to Server1.What should you do? ()A. From the properties of the User1 account, modify the Session settings.B. From the properties of the User1 account, modify Environment settings.C. From the local security policy on Computer1, modify the Deny log on locally setting.D. From the local security policy on Server1, modify the Impersonate a client after authentication setting.

You are using tracing to diagnose run-time issues.When you look at the traces for the service in SvcTraceViewer.exe,you see what is shown in the exhibit:The exception trace is selected in SvcTraceViewer.exe. You need to interpret the trace results to determine where the error occurred and what to do next.What should you do?()A.B.C.D.

You have a stand-alone server named Server1 that runs Windows Server 2003 Service Pack (SP2).A user attempts to connect to the server by using Remote Desktop Connection and receives the following error message.You need to ensure that the user can log on to the server by using Remote Desktop Connection.What should you do?()A. On Server1, modify the Remote Control settings for the user account.B. On Server1, modify the Remote Access Permission settings for the user account.C. Instruct the user to log on to Server1 locally and then to change her password.D. Instruct the user to log on to another computer and then connect to Server1 by using Remote Desktop Connection.

You are creating an error page that provides a user-friendly screen whenever a server exception occurs.You want to hide the stack trace, but you do want to provide the exception’s error message to the user sothe user can provide it to the customer service agent at your company.  Which EL code snippet inserts thiserror message into the error page?()A、Message: b${exception.message}/bB、Message: b${exception.errorMessage}/bC、Message: b${request.exception.message}/bD、Message: b${pageContext.exception.message}/bE、Message: b${request.exception.errorMessage}/b

When you try to open your database, you receive the following error:  ORA-00205: error in identifying control file   Where would you find the details required to resolve this error?()A、audit trailB、alert log fileC、user trace fileD、online trace fileE、background trace fileF、operating system event viewer

How can you modify the application to return more meaningful error messages to the user?()A、Create a custom messages table. Include the necessary error handling code in the form modules to display the meaningful custom message instead of the ORA- error message. B、Provide users with a form in the application to query the ORA- error, that will return a custom message to replace the ORA- message. C、Eliminate constraints where possible, thereby limiting the number of error messages returned. D、Create a procedure to include the RETRIEVE_MESSAGE built-in that automatically translates common server errors into meaningful messages for use in Forms.

A user has a computer that runs Windows XP Professional. The user attempts to connect to the computer by using a Remote Desktop Connection and receives the following error message: “The local policy of the system does not permit you to log on interactively.” You need to ensure that the user can log on to the computer by using a Remote Desktop Connection. What should you do?() A、From the System settings, disable Remote Assistance.B、Add the user's account to the Remote Desktop Users group. C、From Windows Firewall, modify the scope of the Remote Desktop exception. D、Set the Remote Desktop Help Session Manager service Startup type to Automatic, and then start the service.

You have a VPN server that runs Windows Server 2003 Service Pack 2 (SP2). The VPN server supports only PPTP connections. A firewall protects the VPN server from the Internet. From a remote computer connected to the Internet, you attempt to connect to the VPN server. During the connection attempt, you receive a message that your user name and password are being verified. You then receive the following error message: “Error 721: The remote computer is not responding.”You need to ensure that you can establish a VPN connection to the VPN server from the Internet.  What should you do?()A、On the VPN server, enable LAN routing.B、On the VPN server, create a demand-dial interface.C、On the firewall, allow inbound connections that use TCP port 1701.D、On the firewall, allow inbound connections that use Generic Route Encapsulation (GRE) protocol 47.

You are a network administrator for your company. The network consists of a single Active Directory domain. The domain contains three Windows Server 2003 domain controllers, 20 Windows Server 2003 member servers, and 750 Windows XP Professional computers. The domain is configured to use only Kerberos authentication for all server connections.A user reports that she receives an "Access denied" error message when she attempts to connect to one of the member servers. You want to test the functionality of Kerberos authentication on the user’s client computer.  Which command should you run from the command prompt on the user’s computer?()A、netshB、netdiagC、ktpassD、ksetup

You are the administrator of the desktop.com domain. You are configuring a roaming user profile for a user named Paul West. You create a user account named Paul West on the Windows 2000 server computer named server 1. You define a network profile by entering the path //server1/profile/%username% in Paul’s user account setting. When Paul logs on to a Windows 2000 Professional computer he sees the following message- “Windows can not locate your roaming profile and is attempting to log you on with your local profile which will not be propagated to the server.” The details of network cannot be found. You want to configure the roaming user profile for Paul. What should you do?()A、Create a home folder for Paul.B、Share the network profile directory.C、Map a device to network profile directory.D、Use the %username% variable to allow access.

You need to design a hosting service option for customers who want to access their databases by using their own Active Directory domain accounts. What should you do?()A、Design a hosting service option that duplicates each customer’s domain user account as SQL Serverlogin account.B、Design a hosting service option that provides VPN-based connectivity from each customer’s network tothe SQL Server computer that hosts that customer’s daabase or databases.C、Design a hosting service option that provides a dedicated server to each customer.Join that server to that customer’s Active Directory domainD、Design a hosting service option that configures a unique instance of SQL Server 2005 for each customer.Configure that instance to use Integrated Windows authentication.

You are the network administrator for The network consists of a single Active Directory domain named All network servers run Windows Server 2003. Your new assistant, Tess, will perform basic administrative tasks on a member server named TestKingSrvC. Tess is not a member of the local Administrators group on TestKingSrvC, but she can log on to the server console. Tess reports that she receives an error message when she tries to use Remote Desktop. The error message states: "The local policy of this system does not permit you to log on interactively". You need to ensure that Tess can use Remote Desktop to log on to TestKingSrvC. What should you do?()A、Add Tess's user account to the Remote Desktop Users domain local group.B、Add Tess's user account to the Remote Desktop Users local group on TestKingSrvc.C、On the Remote Control tab of Tess's domain account, select the Enable remote control option.D、On the Security tab of Tess's domain account, add the Remote Desktop Users domain local group. Assign the Allow - Full Control permissions to this group.

You have a computer that runs Windows 7 and Windows Internet Explorer 8. A user named User1 attemptsto access a Web page. User1 fails to access the Web page and receives an error message stating that thepage does not have a rating. You need to configure Internet Explorer to allow User1 to access Web pagesthat do not have a rating.  Which settings should you modify?()A、Content AdvisorB、InPrivate FilteringC、Parental ControlsD、Restricted sites

You are debugging an ASP.NET Web application by using the Visual Studio debugger. The application is incorrectly handling a SQL Exception on the login page. You need to break execution where the exception is thrown . What should you do?()A、Enable the User-unhandled option for SqlException in Visual Studio Exception configuration.B、Set the value of the customErrors element‟s mode attribute to “on” in the web.config file.C、Manually attach the Visual Studio debugger to Internet Explorer.D、Enable the thrown option for SqlException in Visual Studio exception configuration.

You are the administrator of your company’s network. A user name Andrew has limited dexterity, which prevents him from using standard keyboard when completing his daily tasks. You configure Windows 2000 Professional to use sticky keys and screen keyboard options. You save the accessibility options to a shared folder on the local hard disk of Andrews’s computer. You want to configure the same options for another user Peter. You log on to Peter’s computer using his local user account and you access the folder over the network from Peter’s computer. You select the .acw file from the shared folder to set up Peter’s computer to use the accessibility option. You receive an error message as follows: " There was a problem running the file when running the accessibility wizard". What should you do to install the accessibility features on Peter’s computer?()A、Copy the .acw file to the c;/documents/setting/default user folderB、Save the accessibility option to the floppy disk and change the permission to allow full control  of the fileC、Resume the setting for the option by using utility manager, then copy the file to Peter’s local  profile folderD、Change the permission of the .acw file in the folder to allow access for Peter’s user account.

In your test database, you find that a user’s session is executing a lot of SQL statements, resulting in the generation of a large number of trace files. While investigating the reason, you find that SQL trace has been enabled at the instance level. You want to disable SQL trace, remotely, only for that user session to reduce the volume of trace data being generated.How do you achieve this objective?()A、 by setting the SQL_TRACE parameter to FALSE in the parameter fileB、 by using DBMS_MONITOR.SESSION_TRACE_DISABLE to disable the tracing for the user sessionC、 by setting the SQL_TRACE parameter to FALSE by using the ALTER SYSTEM command in the user sessionD、 by setting the SQL_TRACE parameter to FALSE by using the ALTER SESSION command in the user session

单选题You are creating an error page that provides a user-friendly screen whenever a server exception occurs.You want to hide the stack trace, but you do want to provide the exception’s error message to the user sothe user can provide it to the customer service agent at your company.  Which EL code snippet inserts thiserror message into the error page?()AMessage: b${exception.message}/bBMessage: b${exception.errorMessage}/bCMessage: b${request.exception.message}/bDMessage: b${pageContext.exception.message}/bEMessage: b${request.exception.errorMessage}/b

单选题You are debugging an ASP.NET Web application by using the Visual Studio debugger. The application is incorrectly handling a SQL Exception on the login page. You need to break execution where the exception is thrown . What should you do?()AEnable the User-unhandled option for SqlException in Visual Studio Exception configuration.BSet the value of the customErrors element‟s mode attribute to “on” in the web.config file.CManually attach the Visual Studio debugger to Internet Explorer.DEnable the thrown option for SqlException in Visual Studio exception configuration.

单选题In your test database, you find that a user’s session is executing a lot of SQL statements, resulting in the generation of a large number of trace files. While investigating the reason, you find that SQL trace has been enabled at the instance level.  You want to disable SQL trace, remotely, only for that user session to reduce the volume of trace data being generated.  How do you achieve this objective?()Aby setting the SQL_TRACE parameter to FALSE in the parameter fileBby using DBMS_MONITOR.SESSION_TRACE_DISABLE to disable the tracing for the user sessionCby setting the SQL_TRACE parameter to FALSE by using the ALTER SYSTEM command in the user sessionDby setting the SQL_TRACE parameter to FALSE by using the ALTER SESSION command in the user session

单选题You manage a domain controller that runs Windows Server 2008 R2 and the DNS Server server role. The DNS server hosts an Active Directory-integrated zone for your domain.You need to provide a user with the ability to manage records in the zone. The user must not be able to modify the DNS server settings. What should you do?()AAdd the user to the DNSUpdateProxy Global security group.BAdd the user to the DNSAdmins Domain Local security group.CGrant the user permissions on the zone.DGrant the user permissions on the DNS server.

单选题You are the administrator of your company’s network. A user name Andrew has limited dexterity, which prevents him from using standard keyboard when completing his daily tasks. You configure Windows 2000 Professional to use sticky keys and screen keyboard options. You save the accessibility options to a shared folder on the local hard disk of Andrews’s computer. You want to configure the same options for another user Peter. You log on to Peter’s computer using his local user account and you access the folder over the network from Peter’s computer. You select the .acw file from the shared folder to set up Peter’s computer to use the accessibility option. You receive an error message as follows: " There was a problem running the file when running the accessibility wizard". What should you do to install the accessibility features on Peter’s computer?()ACopy the .acw file to the c;/documents/setting/default user folderBSave the accessibility option to the floppy disk and change the permission to allow full control  of the fileCResume the setting for the option by using utility manager, then copy the file to Peter’s local  profile folderDChange the permission of the .acw file in the folder to allow access for Peter’s user account.

单选题You need to design a hosting service option for customers who want to access their databases by using their own Active Directory domain accounts. What should you do?()ADesign a hosting service option that duplicates each customer’s domain user account as SQL Serverlogin account.BDesign a hosting service option that provides VPN-based connectivity from each customer’s network tothe SQL Server computer that hosts that customer’s daabase or databases.CDesign a hosting service option that provides a dedicated server to each customer.Join that server to that customer’s Active Directory domainDDesign a hosting service option that configures a unique instance of SQL Server 2005 for each customer.Configure that instance to use Integrated Windows authentication.

单选题You have a computer that runs Windows 7 and Windows Internet Explorer 8. A user named User1 attemptsto access a Web page. User1 fails to access the Web page and receives an error message stating that thepage does not have a rating. You need to configure Internet Explorer to allow User1 to access Web pagesthat do not have a rating.  Which settings should you modify?()AContent AdvisorBInPrivate FilteringCParental ControlsDRestricted sites

单选题You are the network administrator for The network consists of a single Active Directory domain named All servers run Windows Server 2003. All client computers run Windows XP Professional. purchases a host-connectivity gateway application developed by an independent software vendor. You need to install the application on a Windows Server 2003 computer named TestKing2. A support technician named Marie is assigned to install the application. Marie's user account is not a member of the Administrator's group on TestKing2. The installation fails and displays an error message stating the user account used for installing the application needs to be a member of the local Administrators group. Your user account is a member of the Domain Admins group. You want to enable Marie to install applications, but you do not want her to be able to make other changes on TestKing2. What should you do?()ALog on locally on TestKing2 as the local administrator. On TestKing2, in Control Panel, start Add or Remove Programs. Instruct Marie to install the application.BUse the Run as option to start the Add or Remove Programs Control Panel item on TestKing2. Provide the credentials of the local Administrator account. Instruct Marie to install the application.CMake Marie's user account a member of the local Administrators group on TestKing2. Instruct him to log on locally by using his user account and to install the application.DInstruct Marie to log on locally and to send a Remote Assistance request to you. Accept the request, and take remote control of the session. On TestKing2, in Control Panel, start Add or Remove Programs. Instruct Marie to install the application.

单选题Your network contains a file server named Server1 that runs Windows Server 2008 R2.On Server1, you create a disk quota for volume E that limits storage to 200 MB for all users.You need to ensure that a user named User1 can store files that are larger than 200 MB on volume E. What should you do? ()AFrom a command prompt, run dirquota.exe.BFrom Disk Management, create a new quota entry.CFrom Windows Explorer, modify the security properties of the volume.DFrom File Server Resource Manager, create a file screen exception.

单选题You are a network administrator for your company. The network consists of a single Active Directory domain. The domain contains three Windows Server 2003 domain controllers, 20 Windows Server 2003 member servers, and 750 Windows XP Professional computers. The domain is configured to use only Kerberos authentication for all server connections.A user reports that she receives an "Access denied" error message when she attempts to connect to one of the member servers. You want to test the functionality of Kerberos authentication on the user’s client computer.  Which command should you run from the command prompt on the user’s computer?()AnetshBnetdiagCktpassDksetup

单选题A user has a computer that runs Windows XP Professional. The user attempts to connect to the computer by using a Remote Desktop Connection and receives the following error message: “The local policy of the system does not permit you to log on interactively.” You need to ensure that the user can log on to the computer by using a Remote Desktop Connection. What should you do?()AFrom the System settings, disable Remote Assistance.BAdd the user's account to the Remote Desktop Users group. CFrom Windows Firewall, modify the scope of the Remote Desktop exception. DSet the Remote Desktop Help Session Manager service Startup type to Automatic, and then start the service.

单选题You are the administrator of the desktop.com domain. You are configuring a roaming user profile for a user named Paul West. You create a user account named Paul West on the Windows 2000 server computer named server 1. You define a network profile by entering the path //server1/profile/%username% in Paul’s user account setting. When Paul logs on to a Windows 2000 Professional computer he sees the following message- “Windows can not locate your roaming profile and is attempting to log you on with your local profile which will not be propagated to the server.” The details of network cannot be found. You want to configure the roaming user profile for Paul. What should you do?()ACreate a home folder for Paul.BShare the network profile directory.CMap a device to network profile directory.DUse the %username% variable to allow access.