单选题You need to resolve the double counting of transactions issue in the existing reports. What should you do?()AApply a many-to-many relationship between the Transaction measure group and the Person dimension in the WoodgroveSSAS database.BApply a Conditional Split transformation in the Transaction data in the SSIS package.CDelete the AccountHolder table in the WoodgroveDW database.DApply a foreign key relationship between the Person table and the Transaction table in the WoodgroveDW database.

单选题
You need to resolve the double counting of transactions issue in the existing reports. What should you do?()
A

Apply a many-to-many relationship between the Transaction measure group and the Person dimension in the WoodgroveSSAS database.

B

Apply a Conditional Split transformation in the Transaction data in the SSIS package.

C

Delete the AccountHolder table in the WoodgroveDW database.

D

Apply a foreign key relationship between the Person table and the Transaction table in the WoodgroveDW database.


参考解析

解析: 暂无解析

相关考题:

A person has suffered a laceration of the arm. Severe bleeding has been controlled by using a sterile dressing and direct pressure. What should you do next?A.Apply a tourniquet to prevent the bleeding from restartingB.Apply a pressure bandage over the dressingC.Remove any small foreign matter and apply antisepticD.Administer fluids to assist the body in replacing the lost blood

You are designing a Windows Azure application that will use Windows Azure Table storage.  You need to recommend an approach for minimizing storage costs.  What should you recommend? ()A、 Use Entity Group Transactions.B、 Use multiple partitions to store data.C、 Use a transaction scope to groupall storage operations.D、 Use Microsoft Distributed Transaction Coordinator (MSDTC).

You need to select appropriate processing methods for the EmployeeAssignment measure group and the Employee dimension. Which method should you choose?()A、Run a Process Update against the Employee dimension. Run a Process Full against the EmployeeAssignment measure group.B、Run a Process Full against the EmployeeAssignment measure group. Run a Process Update against the Employee dimension.C、Run a Process Full against the Employee dimension. Run a Process Incremental against the EmployeeAssignment measure group.D、Run a Process Incremental against the EmployeeAssignment measure group. Run a Process Full against the Employee dimension.

Your company uses a Windows 2008 Enterprise certificate authority (CA) to issue certificates. You need to implement key archival. What should you do()A、Archive the private key on the server.B、Apply the Hisecdc security template to the domain controllers.C、Configure the certificate for automatic enrollment for the computers that store encrypted files.D、Install an Enterprise Subordinate CA and issue a user certificate to users of the encrypted files.

You are the network administrator for your company. Your network consists of a single Active   Directory domain. Three security groups named Accountants, Processors, and Management are located in an organizational unit (OU) named Accounting. All of the user accounts that belong to these three  groups are also in the Accounting OU. You create a Group Policy object (GPO) and link it to the  Accounting OU. You configure the GPO to disable the display options under the User Configuration  section of the GPO. You need to achieve the following goals: You need to ensure that the GPO applies to  all user accounts that are members of the Processors group. You need to prevent the GPO fromapplying  to any user account that is a member of the Accountants group. You need to prevent the GPO from  applying to any user account that is a member of the Management group, unless the user account is also  a member of the Processors group. What should you do?()A、 Modify the discretionary access control list (DACL) settings of the GPO to assign the Accountants and Management security groups the Deny - Read and the Deny - Apply Group Policy permissions. Modify the DACL of the GPO to assign the users who are in both the Accountants and Management security groups the Allow - Read and the Allow - Apply Group Policy permissions.B、 Modify the discretionary access control list (DACL) settings of the GPO to assign the Accountants and Management security groups the Deny - Read and the Deny - Apply Group Policy permissions. Create a new security group named Mixed that contains all the user accounts from the Processors group and the specific user accounts from the Management group to which you want the GPO to apply. Modify the DACL of the GPO to assign the Mixed security group the Allow - Read and the Allow - Apply Group Policy permissions.C、 Modify the discretionary access control list (DACL) settings of the GPO to assign the Accountants security group the Deny - Read and the Deny - Apply Group Policy permissions. Modify the DACL settings of the GPO to remove the Authenticated Users special group. Modify the DACL settings of the GPO to add the Processors group and assign the Allow - Read and the Allow - Apply Group Policy permissions.D、 Modify the discretionary access control list (DACL) settings of the GPO to assign the Accountants security group the Deny - Read and the Allow - Apply Group Policy permissions. Modify the DACL settings of the GPO to assign the Management security group the Deny - Read and the Deny - Apply Group Policy permissions.

Your company has an Active Directory domain that has an organizational unit named Sales. The   Sales organizational unit contains two global security groups named sales managers and sales  executives.    You need to apply desktop restrictions to the sales executives group. You must not apply these desktop  restrictions to the sales managers group. You create a GPO named DesktopLockdown and link it to the  Sales organizational unit.   What should you do next()A、Configure the Deny Apply Group Policy permission for the sales managers on the DesktopLockdown  GPO.B、Configure the Deny Apply Group Policy permission for the sales executives on the DesktopLockdown  GPO.C、Configure the Deny Apply Group Policy permission for Authenticated Users on the DesktopLockdown  GPO.D、Configure the Allow Apply Group Policy permission for Authenticated Users on the DesktopLockdown  GPO.

You need to resolve the blocking issue that is affecting the performance of the CRM system. What should you do?()A、Replace the named query with an SQL view.B、Set the transaction isolation level to serializable in the named query.C、Set the source database to use snapshot isolation.D、Set the transaction isolation level to repeatable read in the named query.

You need to resolve the double counting of transactions issue in the existing reports. What should you do?()A、Apply a many-to-many relationship between the Transaction measure group and the Person dimension in the WoodgroveSSAS database.B、Apply a Conditional Split transformation in the Transaction data in the SSIS package.C、Delete the AccountHolder table in the WoodgroveDW database.D、Apply a foreign key relationship between the Person table and the Transaction table in the WoodgroveDW database.

A support engineer reports that inserting new sales transactions in a SQL Server 2005 database results in an error. You investigate the error. You discover that in one of the databases, a developer has accidentally deleted some data in a table that is critical for transaction processing. The database uses the full recovery model. You need to restore the table. You need to achieve this goal without affecting the availability of other data in the database. What should you do?()A、Back up the current transaction log. Restore the database with a different name and stop at the point just before the data loss. Copy the table back into the original database.B、Back up the current transaction log. Restore the database to the point just before the data loss.C、Restore the database from the existing backup files to a time just before the data loss.D、Restore the database to the point of the last full backup.

You create a Password Settings object (PSO).   You need to apply the PSO to a domain user named User1.   What should you do()A、Modify the properties of the PSO.B、Modify the account options of the User1 account.C、Modify the security settings of the User1 account.D、Modify the password policy of the Default Domain Policy Group Policy object (GPO).

You are integrating a Windows Communication Foundation (WCF) service within an enterprise-wide Service Oriented Architecture (SOA).Your service has the following service contract: [ServiceContract]public class CreditCardConfirmationService { [OperationContract] boolean ConfirmCreditCard(string ccNumber); double OrderAmount(int orderNumber);} You need to allow the code in the ConfirmCreditCard method to participate automatically in existing transactions.If there is no existing transaction, a new transaction must be created automatically. What should you do?()A、Inside the ConfirmCreditCard method, surround the code that must participate in the transaction with a using(new TransactionScope()) block.B、Inside the ConfirmCreditCard method, surround the code that must participate in the transaction with a using(new CommittableTransaction()) block.C、Add an [OperationBehavior(TransactionScopeRequired=true)] attribute to the ConfirmCreditCard method.D、Add an [OperationBehavior(TransactionAutoComplete=true)] attribute to the ConfirmCreditCard method.

Your highly available virtual environment includes Windows Server 2008 R2 Hyper-V servers. You are developing a strategy to apply Hyper-V updates. You need to ensure that you can deploy updates while minimizing server downtime. What should you do on each Hyper-V server?()A、Migrate the VMs, apply the update to the Hyper-V server, apply the update to each VM, and then migrate the VMs back to the Hyper-V serverB、Pause the VMs, apply the update to the Hyper-V server, and then apply the update to the VMsC、Apply the update to the Hyper-V server, and then apply the update to the VMsD、Take a snapshot of the VMs, and then apply the update to the Hyper-V server

You need to design a password policy that meets business requirements. What should you do? Select all that apply.()A、Increase the number of passwords that are rememberedB、Disable reversible encryptionC、Set the minimum password age to zero daysD、Increase the maximum password age

You are the network administrator for your company. The network consists of a single Active Directory domain. The domain includes an organizational unit (OU) named Processing. There are 100 computer accounts in the Processing OU. You create a Group Policy object (GPO) named NetworkSecurity and link it to the domain. You configure NetworkSecurity to enable security settings through the Computer Configuration section of the Group Policy settings. You need to ensure that NetworkSecurity will apply only to the computers in the Processing OU. You need to minimize the number of GPO links.  What should you do?()A、 Link NetworkSecurity to the Processing OU. Disable the User Configuration section of NetworkSecurity.B、 Link NetworkSecurity to the Processing OU. Remove the link from NetworkSecurity to the domain.C、 Modify the discretionary access control list (DACL) for NetworkSecurity to assign all computer accounts in the Processing OU the Allow - Read and the Allow - Apply Group Policy permissions.D、 Modify the discretionary access control list (DACL) for NetworkSecurity to assign the Authenticated Users group the Deny - Apply Group Policy permission and to assign all of the computer accounts in the Processing OU the Allow - Read and the Allow - Apply Group Policy permissions.

You are a database administrator for your company. The company uses a SQL Server 2005 computer that runs Reporting Services. Reporting Services is used to produce hundreds of reports each day. You discover that the ReportServerTempDB database is growing. You need to minimize the size of the ReportServerTempDB database. What should you do?()A、Decrease the time between transaction log backups of the database.B、Delete report snapshot history each week.C、Minimize the use of session caching in the reports.D、Minimize the use of report snapshots in the reports.

You are developing a Windows Communication Foundation (WCF) service that executes a long-running operation.The service is accessed from your business applications in a server transaction in which the client does not participate.You need to ensure that the transaction times out and aborts if the operation has not completed within 45 seconds. What should you do?()A、Set the service binding sendTimeout attribute to 00:00:45.B、Apply [ServiceBehavior(TransactionTimeout="00:00:45")] to the service implementation.C、Set the service binding receiveTimeout attribute to 00:00:45.D、Apply [OperationBehavior(TransactionScopeRequired=false)] to the service operation.

单选题You need to design a method to standardize and deploy a baseline security configuration for servers. You solution must meet business requirements. What should you do?()ACreate a script that installs the Hisecdc.inf security templateBUse a GPO to distribute and apply the Hisec.inf security templateCUse the System Policy Editor to configure each server’s security settingsDUse a GPO to distribute and apply a custom security template

单选题Your company has an Active Directory domain that has an organizational unit named Sales. The Sales organizational unit contains two global security groups named sales managers and sales executives. You need to apply desktop restrictions to the sales executives group. You must not apply these desktop restrictions to the sales managers group. You create a GPO named DesktopLockdown and link it to the Sales organizational unit. What should you do next()AConfigure the Deny Apply Group Policy permission for the sales managers on the DesktopLockdown GPO.BConfigure the Deny Apply Group Policy permission for the sales executives on theDesktopLockdown GPO.CConfigure the Deny Apply Group Policy permission for Authenticated Users on the DesktopLockdown GPO.DConfigure the Allow Apply Group Policy permission for Authenticated Users on the DesktopLockdown GPO.

单选题You are designing a Windows Azure application that will use Windows Azure Table storage.  You need to recommend an approach for minimizing storage costs.  What should you recommend? ()A Use Entity Group Transactions.B Use multiple partitions to store data.C Use a transaction scope to groupall storage operations.D Use Microsoft Distributed Transaction Coordinator (MSDTC).

单选题A support engineer reports that inserting new sales transactions in a SQL Server 2005 database results in an error. You investigate the error. You discover that in one of the databases, a developer has accidentally deleted some data in a table that is critical for transaction processing. The database uses the full recovery model. You need to restore the table. You need to achieve this goal without affecting the availability of other data in the database.  What should you do?()A Back up the current transaction log. Restore the database with a different name and stop at the point just before the data loss. Copy the table back into the original database.B Back up the current transaction log. Restore the database to the point just before the data loss.C Restore the database from the existing backup files to a time just before the data loss.D Restore the database to the point of the last full backup.

单选题You create a Password Settings object (PSO).   You need to apply the PSO to a domain user named User1.   What should you do()AModify the properties of the PSO.BModify the account options of the User1 account.CModify the security settings of the User1 account.DModify the password policy of the Default Domain Policy Group Policy object (GPO).

单选题You need to resolve the blocking issue that is affecting the performance of the CRM system. What should you do?()AReplace the named query with an SQL view.BSet the transaction isolation level to serializable in the named query.CSet the source database to use snapshot isolation.DSet the transaction isolation level to repeatable read in the named query.

单选题You are the network administrator for your company. The network consists of a single Active Directory domain. The domain includes an organizational unit (OU) named Processing. There are 100 computer accounts in the Processing OU. You create a Group Policy object (GPO) named NetworkSecurity and link it to the domain. You configure NetworkSecurity to enable security settings through the Computer Configuration section of the Group Policy settings. You need to ensure that NetworkSecurity will apply only to the computers in the Processing OU. You need to minimize the number of GPO links.  What should you do?()A Link NetworkSecurity to the Processing OU. Disable the User Configuration section of NetworkSecurity.B Link NetworkSecurity to the Processing OU. Remove the link from NetworkSecurity to the domain.C Modify the discretionary access control list (DACL) for NetworkSecurity to assign all computer accounts in the Processing OU the Allow - Read and the Allow - Apply Group Policy permissions.D Modify the discretionary access control list (DACL) for NetworkSecurity to assign the Authenticated Users group the Deny - Apply Group Policy permission and to assign all of the computer accounts in the Processing OU the Allow - Read and the Allow - Apply Group Policy permissions.

单选题You are the network administrator for your company. Your network consists of a single Active   Directory domain. Three security groups named Accountants, Processors, and Management are located in an organizational unit (OU) named Accounting. All of the user accounts that belong to these three  groups are also in the Accounting OU. You create a Group Policy object (GPO) and link it to the  Accounting OU. You configure the GPO to disable the display options under the User Configuration  section of the GPO. You need to achieve the following goals: You need to ensure that the GPO applies to  all user accounts that are members of the Processors group. You need to prevent the GPO fromapplying  to any user account that is a member of the Accountants group. You need to prevent the GPO from  applying to any user account that is a member of the Management group, unless the user account is also  a member of the Processors group. What should you do?()A Modify the discretionary access control list (DACL) settings of the GPO to assign the Accountants and Management security groups the Deny - Read and the Deny - Apply Group Policy permissions. Modify the DACL of the GPO to assign the users who are in both the Accountants and Management security groups the Allow - Read and the Allow - Apply Group Policy permissions.B Modify the discretionary access control list (DACL) settings of the GPO to assign the Accountants and Management security groups the Deny - Read and the Deny - Apply Group Policy permissions. Create a new security group named Mixed that contains all the user accounts from the Processors group and the specific user accounts from the Management group to which you want the GPO to apply. Modify the DACL of the GPO to assign the Mixed security group the Allow - Read and the Allow - Apply Group Policy permissions.C Modify the discretionary access control list (DACL) settings of the GPO to assign the Accountants security group the Deny - Read and the Deny - Apply Group Policy permissions. Modify the DACL settings of the GPO to remove the Authenticated Users special group. Modify the DACL settings of the GPO to add the Processors group and assign the Allow - Read and the Allow - Apply Group Policy permissions.D Modify the discretionary access control list (DACL) settings of the GPO to assign the Accountants security group the Deny - Read and the Allow - Apply Group Policy permissions. Modify the DACL settings of the GPO to assign the Management security group the Deny - Read and the Deny - Apply Group Policy permissions.

单选题Your highly available virtual environment includes Windows Server 2008 R2 Hyper-V servers. You are developing a strategy to apply Hyper-V updates. You need to ensure that you can deploy updates while minimizing server downtime. What should you do on each Hyper-V server?()AMigrate the VMs, apply the update to the Hyper-V server, apply the update to each VM, and then migrate the VMs back to the Hyper-V serverBPause the VMs, apply the update to the Hyper-V server, and then apply the update to the VMsCApply the update to the Hyper-V server, and then apply the update to the VMsDTake a snapshot of the VMs, and then apply the update to the Hyper-V server

单选题You need to select appropriate processing methods for the EmployeeAssignment measure group and the Employee dimension. Which method should you choose?()ARun a Process Update against the Employee dimension. Run a Process Full against the EmployeeAssignment measure group.BRun a Process Full against the EmployeeAssignment measure group. Run a Process Update against the Employee dimension.CRun a Process Full against the Employee dimension. Run a Process Incremental against the EmployeeAssignment measure group.DRun a Process Incremental against the EmployeeAssignment measure group. Run a Process Full against the Employee dimension.

单选题You are integrating a Windows Communication Foundation (WCF) service within an enterprise-wide Service Oriented Architecture (SOA).Your service has the following service contract: [ServiceContract]public class CreditCardConfirmationService { [OperationContract] boolean ConfirmCreditCard(string ccNumber); double OrderAmount(int orderNumber);} You need to allow the code in the ConfirmCreditCard method to participate automatically in existing transactions.If there is no existing transaction, a new transaction must be created automatically. What should you do?()AInside the ConfirmCreditCard method, surround the code that must participate in the transaction with a using(new TransactionScope()) block.BInside the ConfirmCreditCard method, surround the code that must participate in the transaction with a using(new CommittableTransaction()) block.CAdd an [OperationBehavior(TransactionScopeRequired=true)] attribute to the ConfirmCreditCard method.DAdd an [OperationBehavior(TransactionAutoComplete=true)] attribute to the ConfirmCreditCard method.