单选题You have the following requirements:   - Ensure that the business tier can be updated without affecting the application tier.   - Use the minimum role instance size that meets or exceeds the current server specifications.    You need to recommend a topology for hosting the application in Windows Azure.  What should you recommend?()A Deploy the application tier and the business tier to one role with two Medium instances.B Deploy the application tier and the business tier to one role with two Large instances.C Deploy the application tier role to a Medium instance.  Deploy the business tier role to a medium instance.D Deploy the application tier role to a Large instance.  Deploy the business tier role to a Large instance.

单选题
You have the following requirements:   - Ensure that the business tier can be updated without affecting the application tier.   - Use the minimum role instance size that meets or exceeds the current server specifications.    You need to recommend a topology for hosting the application in Windows Azure.  What should you recommend?()
A

 Deploy the application tier and the business tier to one role with two Medium instances.

B

 Deploy the application tier and the business tier to one role with two Large instances.

C

 Deploy the application tier role to a Medium instance.  Deploy the business tier role to a medium instance.

D

 Deploy the application tier role to a Large instance.  Deploy the business tier role to a Large instance.


参考解析

解析: 暂无解析

相关考题:

When you use Microsoft Windows Media Player to begin playback of a music file, you receive the following error message: You do not have the rights to play this file.” You need to configure Windows Media Player to ensure playback of protected digital media.What should you do?()A.AB.BC.CD.D

You have a computer that runs Windows Vista.You need to configure the computer to meet the following requirements:·You must be able to make configuration changes remotely.·You must be able to make the changes without the permission of the locally logged-on user.What should you do?()A.AB.BC.CD.D

Which of the following is the BEST reason to label servers within the server room?()A、 To ensure server documentation is kept up to dateB、 To ensure administrators avoid duplicate server namesC、 To ensure server power requirements are metD、 To ensure the servers can be identified quickly and easily

You have an Exchange Server 2010 organization and an Active Directory Rights Management Services(AD RMS) server.  All users access their mailboxes by using Outlook Web App (OWA).  You need to plan a security solution for the organization to meet the following requirements:.Secure messages by using administrator-defined templates  .Ensure that e-mail messages sent by users can be stored in an encrypted format  What should you include in the plan?()A、a legal holdB、Domain SecurityC、Outlook Protection RulesD、Secure/Multipurpose Internet Mail Extensions (S/MIME)

Your company includes mobile computer users who frequently work offline. You are planning to deploy Windows 7 by using an image.   You have the following requirements:   Provide access to all applications when mobile computer users first start their computers. Minimize network and local storage requirements.  Provide language-pack support based on the geographic location of the user.    You need to ensure that your image-creation strategy meets the requirements.   What should you do?()A、Create a single thin image for all computers.B、Create a single hybrid image for all computers.C、Create one thin image for the mobile computers. Create one thick image for all other computers.D、Create one thick image for the mobile computers. Create one thin image for all other computers.

You are designing a remote administration solution that meets business requirements. You need to specify client or server software that will be required. What should you do?()A、Ensure that all client computers have a graphical Telnet client installedB、Ensure that all client computers have the Remote Desktop Connection client software installedC、Ensure that all server computers have RCONSOLE installed and that it is configured to start automaticallyD、Ensure that all server computers have Remote Administration (HTML) installed

You have an Exchange Server 2010 organization that contains multiple Hub Transport servers. You need to recommend a message hygiene solution to meet the following requirements: .Block servers that are known to send spam .Minimize administrative effort What should you recommend?()A、an IP Block listB、IP Block list providersC、recipient filteringD、sender filtering

You use Microsoft .NET Framework 4 to create a Windows Presentation Foundation (WPF) application. You need to ensure that the application meets the following requirements: Displays a menu that is specific to the control selected by the user. Displays the menu next to the control. Which control should you use? ()A、MenuB、PopUpC、ListBoxD、ContextMenu

You have an Exchange Server 2010 organization.  Your company has a relationship with another company.  The partner company has an Exchange Server 2010 organization.  You need to recommend a security solution to meet the following requirements:  .Ensure that all e-mail delivery between your servers and the partner companys servers is encrypted .Ensure that all communication between your servers and the partner companys servers is authenticated What should you include in the solution?()A、Active Directory Rights Management Services (AD RMS)B、Domain SecurityC、Forms-based AuthenticationD、Secure/Multipurpose Internet Mail Extensions (S/MIME)

You are creating a Windows Communication Foundation (WCF) service to process orders.The data contract for the order is defined as follows:[DataContract]public class Order{ [DataMember] public string CardHolderName { get; set; } [DataMember] public string CreditCardNumber { get; set; }}You have the following requirements: Enable the transmission of the contents of Order from the clients to the service. Ensure that the contents of CreditCardNumber are not sent across the network in clear text. Ensure that the contents of CreditCardNumber are accessible by the service to process the order.You need to implement the service to meet these requirements. What should you do?()A、Add a DataProtectionPermission attribute to the CreditCardNumber property and set the ProtectData property to true.B、Convert the DataContract to a MessageContract and set the ProtectionLevel property to SignAndEncrypt.C、Change the data type of CreditCardNumber from string to SecureString.D、Implement the CreditCardNumber property getter and setter In the setter, run the value of the CreditCardNumber through the MD5CryptoServiceProvider class TransformBlock method.

You are designing an upgrade strategy for a Windows Azure application that includes one web role with one instance.  You have the following requirements:   - Test the application on the Windows Azure platform.   - Ensure that application upgrades can be rolled back.   - Ensure that upgrade and rollback processes do not cause downtime.    You need to recommend an approach for upgrading the application.  What should you recommend?()A、 Deploy to the Production slot.  Test the application, and then perform a VIP swap.B、 Deploy to the Staging slot.  Test the application, and then perform a VIP swap.C、 Deploy to the Staging slot.  Test the application, and then perform a manual in-place upgrade to the Production slot.D、 Deploy to the Staging slotTest the application, and then perform an automatic in-place upgrade to the Production slot.

You are designing a Windows Azure application that will use Windows Azure Table storage. The application will allow teams of users to collaborate on projects.  Each user is a member of only one team. You have the following requirements:   - Ensure that each user can efficiently query records related to his or her team’s projects.  - Minimize data access latency.   You need to recommend an approach for partitioning table storage entities. What should you recommend? ()A、 Partition by user.B、 Partition by team.C、 Partition by project.D、 Partition by the current date.

单选题You work as an application developer at Certkiller .com. You have been asked by you superiors at Certkiller .com to create a child application domain.  The new child application domain has to specify a different assembly path than that of the parent application domain.You need to ensure that your solution meets Certkiller .com’s requirements.What should you do?()A AB BC CD D

单选题Which of the following is the BEST reason to label servers within the server room?()A To ensure server documentation is kept up to dateB To ensure administrators avoid duplicate server namesC To ensure server power requirements are metD To ensure the servers can be identified quickly and easily

单选题You have an Exchange Server 2010 organization.  You need to recommend a storage solution that meets the following requirements:.Provides users with an alternate location for storing e-mail messages  .Provides users with access to the alternate location by using Outlook Web App (OWA)  What should you recommend?()Ajournal rulesBmanaged foldersCpersonal archivesDpersonal folders (.pst)

单选题You are designing a Windows Azure application that will use Windows Azure Table storage. The application will allow teams of users to collaborate on projects.  Each user is a member of only one team. You have the following requirements:   - Ensure that each user can efficiently query records related to his or her team’s projects.  - Minimize data access latency.   You need to recommend an approach for partitioning table storage entities. What should you recommend? ()A Partition by user.B Partition by team.C Partition by project.D Partition by the current date.

单选题You are planning to upgrade Internet Explorer.   You have the following requirements:   Create a report that identifies which computers are successfully upgraded. Do not install additional software on the client computers.   You need to design a deployment method that meets the requirements.   What should you do?()AUse Internet Explorer Administration Kit (IEAK) and Group Policy.BUse Microsoft System Center Configuration Manager.CUse Windows Server Update Services (WSUS).DUse Microsoft System Center Essentials.

单选题All client computers in your network run Windows XP. Some of the computers are part of a secure network. Some of the computers connect to the network by using virtual private networking (VPN). You are planning to deploy Windows 7.   You have the following requirements:   Use a dedicated server for deployment.  Use a single operating system image for deployment.   Ensure that you can use removable media to deploy the image.   Ensure that you can select which applications are installed onto a client computer at the time of deployment.   You need to design a deployment strategy that meets the requirements.   What should you do?()A Using a Windows PE boot media, use ImageX to apply the image from a network share to the client computers.B Use System Center Configuration Manager 2007 R2 to perform a zero-touch installation.C Use the Microsoft Deployment Toolkit to perform a lite-touch installation.D Use Windows Deployment Services on a network server to deploy Windows 7 by using an install image.

单选题You are designing a Windows 7 virtual desktop infrastructure.You have the following requirements:   Provide access to Remote Desktop Services RemoteApp sources from multiple remote desktop servers.  Support network load balancing.  Support reconnection to existing sessions on virtual desktops.    You need to specify a design that meets the requirements.   What should you include in your design?()ARemote Desktop GatewayBRemote Desktop Connection BrokerCWindows Deployment ServicesDWindows Virtual PC and Windows XP Mode

单选题You develop a Windows Communication Foundation (WCF) service. It is used exclusively as an intranet application and is currently unsecured. You need to ensure that the service meets the following requirements: The service now must be exposed as an Internet application. The service must be secured at the transport level. Impersonation and delegation cannot be enabled. What should you use? ()AbasicHttpBinding and HTTPBbasicHttpBinding and KerberosCwsHttpBinding and KerberosDwsHttpBinding and HTTPS

单选题Your network has 1,000 client computers that run Windows XP. You are planning to deploy Windows 7.  You plan to use the Microsoft Deployment Toolkit Lite Touch Installation deployment method to deploy the Windows 7 image.   You have the following requirements:   Migrate 20 computers at a time.  Ensure that you conserve network bandwidth.   You need to design a deployment strategy that meets the requirements.   What should you do?()AConfigure multicast transmission on the deployment point.BConfigure unicast transmission on the deployment point.CCompress the contents of the distribution folder.DDistribute the image by using Background Intelligent Transfer Service (BITS).

单选题Your network consists of a single Active Directory forest. You have an Exchange Server 2003 organization.  You need to create a plan to transition the organization to Exchange Server 2010. The plan must meet the following requirements: .Ensure that e-mail messages can be sent between all users in the organization  .Ensure that administrators can modify address lists from Exchange Server 2010 servers  .Ensure that users who are moved to Exchange Server 2010 can access all public folders in theorganization What should you include in the plan?()Atwo Send connectorsa sharing policyaddress lists that use OPATHBtwo Send connectorspublic folder replicationnew address listsCa two-way routing group connectora sharing policynew address listsDa two-way routing group connectorpublic folder replicationaddress lists that use OPATH