微软认证考试 题目列表
You are implementing an ASP.NET application. The application includes a Person class with property Age. You add a page in which you get a list of Person objects and display the objects in a GridView control. You need to add code so that the GridView row is highlighted in red if the age of the person is less than 18. Which GridView event should you handle?()A、RowDataBoundB、RowCommandC、RowUpdatedD、RowEditing

You create a Web page that contains the span shown in the following line of code. TextYou need replace the contents of the span with HTML that you download from a URL specified by a global variable named localURL. Which code segment should you use?()A、$.ajax({ type: "GET", url: localURL, dataType: "jsonp", success: function(htmlText { $("#span1").text(htmlText); } }); B、$.ajax( localURL, {}, function(htmlText) { $("#span1").html(htmlText); },"html" ); C、$.ajax({ type: "GET", url: localURL, dataType: "html",success: function(htmlText) { $("#span1").innerHTML = htmlText; }}); D、$.ajax({ type: "GET", url: localURL, success: function(htmlText) { $("#span1").html(htmlText); } });

You use Microsoft .NET Framework 4 to create a Windows Presentation Foundation (WPF) application. The application contains a composite user control that includes a TextBox control named txtInput. The user control will be hosted in a window and will have handlers for the text-changed event of txtInput. You need to ensure that the application meets the following requirements: AddHandler(TextBox.TextChangedEvent, new RoutedEventHandler(Audit_TextChanged), true); Which of the following statments are TRUE ?()A、A text-changed event handler, named Audit_TextChanged, was Created for the txtInput control.B、Audit_TextChanged will stop running because the event is marked as handled by certain event handlers.C、Even through the event is marked handled by certain event handlers, Audit_TextChanged will still run.D、Audit_TextChanged will continue to run until the event is marked as handled.

Which of the following is the technology that helps organizations to reduce legal risks associated with e-mail?()A、Information Rights ManagementB、JoumalingC、Legal disclaimerD、Messaging Records Management

You are the network administrator for your company. The network consists of a single Active Directory domain with three sites. There is a domain controller at each site. All servers run Windows Server 2003. Each client computer runs either Windows 2000 Professional or Windows XP Professional. The IT staff is organized into four groups. The IT staff works at the three different sites. The computers for the IT staff must be configured by using scripts. The script or scripts must run differently based on which site the IT staff user is logging on to and which of the four groups the IT staff user is a member of. You need toensure that the correct logon script is applied to the IT staff users based on group membership and site location.  What should you do?()A、 Create four Group Policy objects (GPOs). Create a script in each GPO that corresponds to one of the four groups. Link the four new GPOs to all three sites. Grant each group permissions to apply only the GPO that was created for the group.B、 Create a single script that performs the appropriate configuration based on the user’s group membership. Place the script in the Netlogon shared folders on the domain controllers.C、 Configure a Group Policy object (GPO) with a startup script that configures computers based on IT staff group. Link the GPO to the three sites.D、 Create a script that configures the computers based on IT staff group membership and site. Create and link a GPO to the Domain Controllers OU to run the script.

You are designing an Active Directory implementation strategy to present to executives from your  company and from Contoso, Ltd. Which implementation strategy should you use?()A、Upgrade the New York domain. Upgrade the Chicago domain. Create a pristine forest for Contoso, Ltd.B、Create a pristine forest. Upgrade the New York domain. Upgrade the Chicago domain. Do nothing further.C、Create pristine forest. Upgrade the New York domain. Upgrade the Chicago domain. Create a pristine forest for Contoso, Ltd.  D、Create a pristine forest. Upgrade the New York domain. Upgrade the Chicago domain. Create a new child domain for Contoso, Ltd.

You run the English (US) edition of Windows 2000 Professional on your home computer. You are writing a letter that will include text in both English and German. The word processing program you are using is a Windows 16-bit character-based document. You then install German language support by using Regional Options in Control Panel. However, you are unable to use German in your document. You want to be able to complete the German portion of the document with the least amount of administrative effort. What should you do?()A、Save the document and close the word processing program. Select German by using the locale indicator on the taskbar and restart the word processing program.B、Save the document and close the word processing program. Log off and log on to the computer. Restart the word processing program and select German by using the locale indicator on the taskbar.C、Install the German version of Windows 2000 Professional. Reinstall the word processing program.D、Change the language preference from English to German within the word processing program.

You work as the enterprise exchange administrator at TestKing.com. TestKing.com makes use of Microsoft Exchange Server messaging solution. The TestKing.com network consists of a single ActiveDirectory domain named testking.com. TestKing.com is configured to run an exchange 2010 environment.Due to company growth, TestKing.com has bought two other comapnies named Courseware Publishersand Stanford Finance. Youz have received instructions from the CIO to make sure that the users fromboth of these companies have their own respective e-mail address that correspond to their company. What should you do?()A、The best option is to create and configure two Receive connectors and two address lists.B、The best option is to create and configure two transport rules and two address remote entries.C、The best option is to create and configure two accepted domains and two e-mail address policies.D、The best option is to create and configure two remote domains and two accepted domains.

您的数据修复策略必须符合下列需求:  ·将所有数据文件和数据夹备份到 C:///Data。  ·将个别档案和数据夹还原到 C:///Data。  ·确定数据备份到外部媒体,而且从外部媒体还原。  这时应该怎么做?()A、 使用 [以前的版本] 功能还原档案和数据夹。B、 使用 [系统还原] 功能执行备份和还原作业。C、 使用 NTBackup 公用程序备份和还原个别档案和数据夹。D、 使用 [备份及还原中心] 备份和还原档案。

Your company has an Active Directory domain. The main office has a DNS server named DNS1 that is  configured with Active Directory-integrated DNS. The branch office has a DNS server named DNS2 that  contains a secondary copy of the zone from DNS1. The two offices are connected with an unreliable WAN  link.   You add a new server to the main office. Five minutes after adding the server, a user from the branch  office reports that he is unable to connect to the new server.  You need to ensure that the user is able to connect to the new server.  What should you do()A、Clear the cache on DNS2.B、Reload the zone on DNS1.C、Refresh the zone on DNS2.D、Export the zone from DNS1 and import the zone to DNS2.

Your company has a main office and two branch offices that are connected by WAN links. The main office runs the DNS Server service on three domain controllers.The zone for your domain is configured as an Active Directory-integrated zone.Each branch office has a single member server that hosts a secondary zone for the domain.The DNS servers in the branch offices use the main office DNS server as the DNS Master server for the zone.You need to minimize DNS zone transfer traffic over the WAN links.What should you do?()A、Decrease the Retry Interval setting in the Start of Authority (SOA) record for the zone.B、Decrease the Refresh Interval setting in the Start of Authority (SOA) record for the zone.C、Increase the Refresh Interval setting in the Start of Authority (SOA) record for the zone.D、Disable the netmask ordering option in the properties of the DNS Master server for the zone.

Your company has a server that runs an instance of Actrve Directory Lightweight Directory Service (AD LDS) You need to create new organizational units in the AD LDS application directory partition What should you do()A、Use the Actrve Directory Users and Computers snap-in to create the organizational units on the AD LDS application directory partitionB、Use the ADSI Edit snap-in to create the organizational units on the AD LDS application directory partitionC、Use the dsadd OU  command to create the organizational unitsD、Use the dsmod OU  command to create the organizational units

You work as an ASP.NET Web Application Developer for SomeCompany.  The company uses Visual Studio .NET 2010 as its application development platform.You create an ASP.NET Web site using .NET Framework 4.0. Only registered users of the company will be able to use the application. The application holds a page named UserAccount.aspx that enables new users to register them to the registered users„ list of the company. The UserAccount page hold numerous TextBox controls that accept users personal details, such as user name, password, home address, zipcode, phone number, etc.  One of the TextBox controls on the page is named ZipCode in which a user enters a zip code.  You must ensure that when a user submits the UserAccount page, ZipCode must contain five numeric digits.  What will you do to accomplish this?()A、Use RangeValidator.B、Use RegularExpressionValidatorC、Use RequiredValidatorD、Use CompareValidatorE、Use RequiredFieldValidator

You work as the IT professional in an international company which is named Wiikigo. You are experiencedin implementing and administering a network operating system. You are specialized in deploying servers,configuring Windows Server 2008 Terminal services and network application services, and configuring aweb services infrastructure. Windows Server 2008 is run by your company. The company network isconfigured as an Active Directory domain named wiikigo.com. The network has a Web server namedWEB1. The domain users use http://web1 to access WEB1. You have a self-signed certificate generatedfor WEB1 and have WEB1 configured to use SSL. Now you receive report from users saying that they geta warning message when they use https://web1 to connect to WEB1.You have to make sure that users can connect to WEB1 without receiving a warning message. So what action should you perform?()A、Join WEB1 to the wiikigo.com domain. Reissue the self-signed certificate. Request all the users to connect to WEB1 by using https: //web1.wiikigo.com.B、Create a DNS Host (A) Record for WEB1 in the wiikigo.com zone. Reissue the self-signed certificate.Request all the users to connect to WEB1 by using https: //web1.wiikigo.com.C、The https: //web1 name should be added to the list of Trusted Sites zone on all the computers in the domain.D、Open the Certificates snap-in on WEB1. The self-signed certificate should be exported to a web1.cerfile.Have the web1.cer file installed on all the computers in the domain.

您需要移除 Microsoft Windows Vista 计算机上任何未经下列授权单位事先核准的 Microsoft Windows Internet Explorer 7 附加组件: ·Microsoft ·系统制造商 ·服务提供者 这时应该怎么做?()A、 移除在已下载的 ActiveX 控件清单中找不到的附加组件。B、 移除在 Windows Internet Explorer 7 所使用的附加组件清单中找不到的附加组件。C、 移除在没有必要执行权限的附加组件清单中找不到的附加组件。D、 移除在目前加载 Windows Internet Explorer 7 的附加组件清单中找不到的附加组件。