微软认证考试资料
微软认证题库
![微软认证题库](https://img.taocdn.com/s3/m/0cfdcd205901020207409c44.png)
Same type as the certification exams, 70-660 exam preparation is in multiple-choice questions (MCQs).Tested by multiple times before publishingTry free 70-660 exam demo before you decide to buy it in .Note:This pdf demo do not include the question's picture.Exam : Microsoft 70-660Title : TS: Windows(r) Internals1. You are writing an I/O dispatch routine for a Windows device driver. The device driver supports buffered I/O. The dispatch routine transfers 1 KB of data to the user process.You need to retrieve the kernel address of the 1-KB buffer from the I/O request packet (IRP).Which field of the IRP contains the kernel address?A. Irp->AssociatedIrp.SystemBufferB. Irp->erApcContextC. Irp->Tail.Overlay.DriverContext[0]D. Irp->UserBufferAnswer: A2. You are developing an application.You need to ensure that the application can read from COM port 10 by using the CreateFile function.Which device name should you open?A. "COM10"B. "%COM10%"C. "\COM10"D. "\\.\COM10"Answer: D3. You develop a Windows device driver for a hardware device. The hardware device uses a simple direct memory access (DMA) controller. The hardware device does not perform virtual address translation.You need to allocate a 64-KB buffer in Windows that accepts a DMA transfer of 64 KB from the hardware device. Which routine should you use?A. AllocateHeap(655536)B. ExAllocatePoolWithTag(PagePool, 65536, 'abcd')C. ExAllocatePoolWithTag(NonPagePool, 65536, 'abcd')D. MmAllocateContiguousMemory(65536, 0xFFFFFFFF)Answer: D4. You have a device driver that has one monitoring thread named Thread1. The device driver has three worker threads named Thread2, Thread3, and Thread4. The worker threads run every 10 seconds and complete within 1 second. If any worker thread does not run at least once every 30 seconds, Thread1 calls KeBugCheckEx, and then a complete kernel crash dump is generated.The computer generates a bug check and a complete kernel dump is generated.You review the complete kernel dump and notice the following:You need to identify the root cause of the bug check.What caused the bug check to occur?A. the priority of Thread1B. the priority of Thread4C. the state of Thread1D. the state of Thread2 and Thread3Answer: B5. You develop a device driver for Windows X P that runs on uniprocessor systems only. The driver creates a system thread and a deferred procedure call (DPC). The DPC is invoked by a repeating timer.The thread and the DPC must process entries from the same work queue.You need to ensure that the system thread and the DPC are synchronized.Which IRQ Level (IRQL) should you use?A. APC_LEVELB. DISPATCH_LEVELC. LOW_LEVELD. PASSIVE_LEVELAnswer: B6. You plan to update a device driver on a Windows system. You download a copy of the device driver file from the Internet, but you are uncertain that the device driver is legitimate.You need to verify the device driver's digital signature.Which tool should you use?A. Certmgr.exeB. Certmgr.mscC. Makecert.exeD. Signtool.exeAnswer: D7. You are writing a user application that runs on Windows Server 2003.The design specification for the application requires user authentication.You need to ensure that users enter a local user name and password each time the application is started.Which routine should you use?A. CredReadDomainCredentials()B. CredUIParseUserName()C. CredUIPromptForCredentials()D. LsaRegisterLogonProcess()Answer: C8. You develop a device driver for a PCI device. The PCI device runs on Windows Server 2003 computers.You test the device driver's interrupt processing. The computer stops responding.You need to locate the list of interrupt handling routines in the crash dump by using WinDbg.Which command should you use?A. !idtB. !ipiC. !irqlD. !isrAnswer: A9. You are developing a user mode application that contains two processes.You need to allow the two processes to synchronize access to a shared data area.Which synchronization primitive should you use?A. Critical SectionB. ERESOURCEC. MutexD. SpinlockAnswer: C10. You are designing an application.The application fails because of an access violation. The access violation is caused by a heap corruption.You need to identify the cause of the heap corruption.。
Microsoft资格认证考试试题
![Microsoft资格认证考试试题](https://img.taocdn.com/s3/m/8d6429d731126edb6e1a1054.png)
Microsoft资格认证考试试题1. 您有两台计算机,分别名为 Computer1 和 Computer2。
您将用户状态数据从 omputer1 迁移到 Computer2。
迁移的文件包含若干Microsoft Office Excel 文件。
您需要确保可以在 Computer2 上通过使用Excel 打开 Excel 文件。
您应该怎么做?A. 安装 Office。
B. 禁用“用户帐户控制”(UAC)。
C. 修改默认程序设置。
D. 运行 Loadstate.exe /i:migapp.xml。
Answer: A2. 您有一台运行 Windows 7 的引用计算机。
您计划部署计算机的一个映像。
您创建名为 answer.xml 的应答文件。
您需要确保在部署映像后安装应用应答文件。
捕获映像之前您应该运行哪一命令?A. Imagex.exe /append answer.xml /checkB. Imagex.exe /mount answer.xml /verifyC. Sysprep.exe /reboot /audit /unattend:answer.xmlD. Sysprep.exe /generalize /oobe /unattend:answer.xmlAnswer: D33. 您的网络由单一的 Active Directory 林组成。
您有 50 台便携式计算机和 50 台台式计算机。
所有计算机都有 32 位硬件。
您计划使用自定义映像将 Windows 7 和 10 个企业应用程序部署到这些计算机。
您需要使用最少的.管理工作量准备部署。
您第一步应该怎么办?A. 在一台计算机上安装 Windows 7 和企业应用程序。
B. 在一台便携式计算机和一台台式计算机上安装 Windows 7 和企业应用程序。
C. 在服务器上,安装并运行 Microsoft Assessment and Planning (MAP) Toolkit。
微软认证70-210模拟试卷1(题后含答案及解析)
![微软认证70-210模拟试卷1(题后含答案及解析)](https://img.taocdn.com/s3/m/1a3472f958fb770bf68a555d.png)
微软认证70-210模拟试卷1(题后含答案及解析) 题型有:1. 单选题 2. 多选题单选题1.You are the administrator of a Windows 2000 network. Your network includes 75 Windows NT Workstation 4.0 computers. You are adding 50 new PXE-compliant computers to the network. The hardware on each computer is configured identically.You are using a RIS image to deploy Windows 2000 Professional to the 50 computers. You successfully install Windows 2000 Professional on the first 10 computers. However, you cannot install Windows 2000 Professional on remaining 40 computers.What should you do?A.Configure the DHCP scope to add additional IP addresses.B.Run Rbfg.exe from the RemoteInstall\Admin folder on the RIS server.C.Modify the startup sequence in the CMOS of the remaining computers.D.Create computer accounts on the remaining computers in the Active Directory.正确答案:A解析:Explanation: RIS requires Active Directory, DNS and DHCP. The clients can either be PXE-compliant or they can use a Remote boot diskette. In this scenario, the DHCP server has run out of IP-addresses. By extending the scope by 40 IP addresses the installation on the remaining computers will be successful.Incorrect Answers:B: Rbfg.exe is used to create Remote Boot disks for computers that do not have PXE-compliant network cards. In this scenario, all clients are PXE-compliant and will thus be able to boot through the network and access the RIS image. It is thus not necessary to create Remote Boot disks.C: The 50 new computers have identical hardware. There installation worked on 10 of the new computers. There can thus be no incorrect startup sequence setting in CMOS.D: In this situation there is no need for prestaged computer accounts in Active Directory. Pre-staged computer accounts are used to select between RIS servers. By configuring the RIS server to answer only known client computers it would require user accounts for all RIS clients. This is not the default setting.2.You configure your Windows 2000 Professional computer for Internet Connection Sharing and for TCP/IP filtering as shown in the exhibit.You test your TCP/IP filtering configuration from another client computer. You can access web sites, but you cannot access FTP sites.What should you do to be able to access FTP sites?A.Add Port 21 to the TCP Ports section.B.Add Port 138 to the TCP Ports section.C.Add Port 21 to the IP Ports section.D.Add Port 138 to the IP Ports section.正确答案:A解析:Explanation: The FTP protocol uses the TCP port 21. In the exhibit the UDP port 21 has been incorrectly added instead of the TCP port.Incorrect answers:B: The FTP protocol uses Port 21 not Port 138.C: The port 21 should be added as a TCP port 21, not as a UDP port or as an IP protocol. IP is also a network protocol and not a port.D: The FTP protocol uses TCP port 21 not port 138. IP is also a network protocol and not a port.3.As a Ezonexam employee you are the desktop administrator of a Windows 2000 Professional computer.The Windows 2000 Professional computer has 25 MB of free disk space drive C and 800 MB of free disks pace on drive E. You are unable to print large documents because if inadequate disk space on drive C.You want to be able to use the space on drive E to print large documents.What should you do?A.From the Printer Properties dialog box, change the location field to E:\Winnt\System32\Spool\Printers.B.From the Print Server Properties dialog box, change the location of the spool folder to any existing file path on drive E.C.Copy the C:\Winnt\System32\Spool\Printers folder to the E:\Winnt\System32\Spool\Printers folder.D.Mount drive C as a subdirectory on drive E.正确答案:B解析:Explanation: When one is unable to print large documents then the hard disk space is insufficient for spooling. To remedy the situation you should create more free space on the hard disk. Since the question mentions that Drive C has 25 MB of free disk space and Disk E has 800 MB of free disk space, and there is an inability to print large documents due to inadequate disk space on Drive C, then it would be logical to change the location of the spool folder to any existing file path on Drive E if one wants to be able to print large documents.Incorrect answers:A: The Printer Properties dialog box is not the appropriate location from which to change the location of the spool folder.C: This procedure is not how one changes the location of the spool folder.D: There is no need to mount Drive C as a subdirectory on Drive E. Drive C will still have inadequate free disk space.多选题4.You are the network administrator for . Your network has 210 Windows 2000 Professional computers and eleven Windows 2000 Server computers. Users on the network save their work files in home folders on a network server. The NTFS partition that contains the home folders has Encrypting File System (EFS) enabled. A user named Sandra leaves . You decrypt the files for hermanager. When the manager attempts to open any of the files, he receives the following error message: “Access is denied.”You want the manager to be able to access the files.What should do? (Each correct answer presents a complete solution. Choose two.)A.Move the files from Sandra’s folder to the manager’s folder.B.Grant the manager NTFSFull Controlpermission to the files.C.Run theciphercommand to create a new file encryption key for the manager.D.Run theciphercommand to generate an EFS recovery agent key and certificate.E.Grant the manager NTFSList Folder Contentspermissions to the folder containing Sandra’s files.正确答案:A,B解析:Explanation:A: When a new file is created it inherits the permissions from its parent. A Move operation creates a new version of the resource you are moving if you are moving the resource to a different partition-for this reason, permissions of the parent are inherited. A Move operation does not create a new version of the resource if you are moving the resource to a different location on the same partition-for this reason, existing permissions are moved along with the resource.B: The NTFS Full Control permission allows a user to change permissions, take ownership, delete subfolders and files, and perform the actions granted by all other permissions.Incorrect answers:C, D: The Cipher utility allows you to encrypt files and folders as well as check the encryption statistics. However, this does not guarantee the manager access to the files because the files have been decrypted already and access was still denied.E: The NTFS List Folder Contents permission allows a user to see the names of files and subfolders in the folder. This is not the same as granting access.5.You are preparing to install Windows 2000 Professional on 75 new computers. You want to create a standard installation image to use on all the new computers. The computers have several different configurations of hard disks and hardware components.You install Windows 2000 Professional and other standard software on one of the computers. You log on to the computer using the local Administrator account. You configure the standard applications and customize the desktop settings you intend to deploy.You run the Setup Manager and create a Sysprep.inf file. You copy Sysprep.exe and Setupcl.exe to the C:\Sysprep folder. You run Sysprep.exe and run your third party disk imaging software.You copy the image to the several test computers and restart the computers. When the installation is complete, you find that some of the computers do not function at all. You also find that the desktop settings do not appear as you have configured them on the original computer.You want to correct the imaging process and ensure that all computers have the same standard desktop.What should you do? (Choose two)A.Copy Sysprep.inf to C:\Sysprep folder.B.Copy the Administrator profile to the Default User profile, and then grant permissions to the Everyone group to use the profile.C.Include the-pnpparameter for Sysprep.exe when you rerun that utility.D.Include the-nosidgenparameter for Sysprep.exe when you rerun that utility.正确答案:B,C解析:Explanation:B: A user profile is automatically created and maintains the desktop configuration for each user’s desktop on the local Windows 2000 computer. This user profile is created when the user logs on to a computer for the first time. An administrator profile, which maintains the administrators desktop configuration is created during the Windows 2000 Professional installation. In this scenario the administrator profile must be copied and used as the Default User profile, which is applied to all users. As all users are automatically placed in the Everyone user group, the Everyone user group must be granted permission to access this profile.C: Because the computers that Windows 2000 Professional will be installed onto have different hardware configurations a full plug and play detection must be done during the installation process. This can be accomplished by including the -pnp parameter to the sysprep.exe utility, as this parameter causes the plug and play detection utility to be used.Incorrect answers:A: When the installation is complete, you find that some of the computers do not function at all and that the desktop settings do not appear as they have been configured on the original computer. This indicates that the sysprep installation was successful. Therefore the sysprep.inf file must have already been in the C:\Sysprep folder (as is the default when using setupmgr.exe to create the file).D: The -nosidgen is only used on the initial computer where the clone image was made. It instructs the installation program not to generate the system information that is unique to each installation of Windows 2000 Professional. This parameter is not used here during the installation of Windows 2000 Professional on the target computers. It is therefore not relevant to this scenario.。
微软认证模拟试题
![微软认证模拟试题](https://img.taocdn.com/s3/m/0f99a3ec7f1922791688e8bd.png)
微软认证考试:企业技术篇(1)Windows NT Server 4.0 in EnterpriseSingle** Mutiple1. You transfer all of the user accounts,and files from a NetWareserver to Windows NT Server computer. You want all computers that previously were able to access the NetWare server to be able to access the Windows NT Server computer. What must you do?A. Install a Microsoft redirector on each client computer.B. Install Client Server for NetWare on each client computer.C. Install FTP server software on the Windows NT Server computer.D. Install Gateway(and client) Services for NetWare on the Windows NTServer computer.A2. you TCP/IP network has two subnets. You install a Windows NT Server computer that will function as a router connecting the two subnets.You want DHCP client computers on one suubnet to be able to access a DHCP server on the other subnet.Which additional service must you install on the Windows NT Server computer?A. SAP AgentB. DHCP Relay AgentC. RIP for inte rnet ProtocolD. RIP for NWLink IPX/SPX Compatible TranspoortB3. Your organization provides World Wide Web Services for 10 different companies. Each company has a registered domain name. You want to creat a seperate Web site for each company on a single Windows NT Server computer that has Microsoft internet information Server installed.What should you do to accomplish this ?(Choose two.)A. Assign multiple IP addresses to the Windows NT Serveer computer s network adapter.B. Assign the same IP address to each company s domain name on a DNS server.C. Assign a separate IP address to each company s WWW folder.D. Use WINS to Assign an IP address to a NetBOIS computer name. Map the computer name to each company s WWW folder.A C4. Situation:You company has a Windows NT Server network. The brokers at your firm each have laptop computers with Windows NT Workstation installed.You are developing a solution to improve network security.Required results:Allow the brokers at& nbsp;your firm remote access to the network from anylocation.Prevent all user accounts other than the brokers user accounts from remotely accessing the network.Optional desired results:Implement a method to protect passwords while they are transmitted.Implement a method to protect the data while it s being transmitted.Proposed solution:Require passwords with a minimum length of eight characters for all users, and force passwords to be changed every 40 days.Install RAS on one of the Windows NT Server computers on the network.Configure RAS security to allow only the brokers to dail remotely and to allow any authentication method.Install a hardware-based security host between the RAS server and the modems.Which results does the proposed solution produce?A. the proposed solution produces the required results and produces both of optional desired results.B. the proposed solution produces the required results and produces only one of optional desired results.C. the& proposed solution produces the required results but does not produce either of optional desired results.D. the proposed solution does not produce the required results.C5. Situation:You company has a Windows NT Server network. The brokers at your firm each have laptop computers with Windows NT Workstation installed.You are developing a solution to improve network security.Required results:Allow the brokers at your firm remote access to the network from any location.Prevent all user accounts other than the brokers user accounts from remotely accessing the network.Optional desired results:Implement a method to protect passwords while they are transmitted.Implement a method to protect the date while it s being transmitted.Proposed solution:Require passwords with a minimum length of eight characters for all users, and force passwords to be changed every 40 days.Install RAS on one of the Windows NT Server computers on the network.Configure RAS security to allow&n only the brokers to dail remotely to require Microsoft encrypted authentication,and to require data encryption.Configure RAS callback security to use a user-defined telephone number.Which results does the proposed solution produce?A. the proposed solution produces the required results and produces both of optional desired results.B. the proposed solution produces the required results and produces only one of optional desired results.C. the proposed solution produces the required results but does not produce either of optional desired results.D. the proposed solution does not produce the required results.D6. Situation:you receive reports from users of client computers in London that logon attempts and boot times are every slow ,and that browsing the network is unacceptably slow. Users of client computers in Mexico City do not report any problems with network performance.Required result:Increase the network performance in London to the same levels as in Mexico City.Optional desired r esults:Reduce WINS traffic over the 56-Kbps link.Reduce DHCP traffic over the 56-Kbps link.Maintain the same level of name resolution services while minimizing replication traffic over the 56-Kbps link.Reduce logon validation traffic over the 56-Kbps link.Proposed solution:Reinstall the Windows NT Server in London as a BDC.Add WINS and DHCP to the Windows NT Server computer in London.Configure all client computers in London to use the London WINS server.Configure the replicationGovernor registry entry on the BDC to 25 percent.Configure the two WINS servers as pull partners only.Which rsults does the proposed solution produce?A. the proposed solution produces the required results and produces all of the optional desired results.B. the proposed solution produces the required results and produces two of the optional desired results.C. the proposed solution produces the required results but does not produce any of the optional desired results.D. the proposed solution does not produce the required results.A7. Users report slow reponse times from one of the servers on your Windows NT Server network. This server acts as a file-and-print server. You suspect very high utilization on one of the disk drives.Which action providers the most information for determining which disk partition has the highest utilization?A.In Performance Monitor,view the LogicalDisk object.B.In Performance Monitor,view the Paging File object.C.In Performance Monitor,view the Servercounter for the Thread object.e the Diskperf utility to analyze the activity occurring on a per-file basis.A8. You receive a report that one subnet on you Windows NT Server network is experiencing a large amount of broadcast traffic.Which tool should you use to determine which computers are generating the most traffic?A.Response ProbeB.Performance MonitorC.Windows NT DiagnosticsD.Windows NT Server 4.0 Network MonitorD9. You Windows NT Server network uses the single master domain model.The master domain contains seven domain controllers and 2,000 user accounts. Using Performance Monitor,you determine that the PDC is being overloaded with synchronization to the BDCs.What should you do to reduce the load on the PDC?A. Add a new BDC to the domain.B. Stop the Net Logon service on the PDC.C. Increase the Pulse registry entry on the PDC.D. Increase the Pulse Concurrency registry entry on PDC.C10. You are running Windows NT Server 4.0 Network monitor on the Windows NT Server computer that functions as the DNS,DHCP,and WINS server for the network. All computers on the network use TCP/IP with DHCP,DNS,and WINS.You capture 1,200 packets.How should you configure the display filter to view only the packets pertaining to the assignment of IP addresses?A. Protocol==SMBB. Protocol==DHCPC. Protocol==BROWSERD. *NETBIOS Multicast(ETHERNET)<->*ANYB11. You are administrratoor of a Windows NT Server computer named Techs.Techs has an intel Pentium 133-MHz processor,32 MB of RAM,and 2-GB SCSI hard disk.Techs functions as a file-and-print server for 115 client computers.Users of client computers have recently started reporting slow reponse times when they access files located on Techs.You run Performance Monitor and gather the following average statistics.Computer:\\TECHSObject:Processor o%Processor Time80.835Object:MemoryPages/sec101.155Object:ServerBytes Total/sec84364.461Object:PhysicalDisk o%disk Time100.000What should you do Techs to provider the greatest increase in performance?A. Upgrade the processor.B. Upgrade RAM to 64 MBC. Upgrade Techs to a multiprocessor system.D. Implement a stripe set with parity.B12. you are using an accounting application to print checks.The printer jams in the middle of the print job.The accounting application will allow you to reprint the checks.You turn off the printer and clear the jammed checks.What should you to do in Print Manager to complete printing this batch of checks ?A.Se lect Resume from the Printer menu.B.Select Resume from the Document menu.C.Select Restart from the Document menu.D.Select Pause Printing from the Printer menu,and then resume printing.B13. Your Windows NT Server computer is configure with six SCSI hard disks.One hard disk is the system disk,and the other five are configured as a stripe set with parity.After a power outage,your server reboots,and you discover that two of the five hard disks in the stripe set wiyh parity have failed.You replace both failed hard disks.What else should you do to recover from the hard disk failure?A.Regenerate the stripe set with parity by using Disk Administrator.B.Wait for Windows Nt server to regenerate the stripe set with parity.C.Create a stripe set across all five hard disks,and then restore from tape bacpup.D.Create a stripe set with parity across all five disks,and then restore from tape backup.D14. After you install a new device driver for a SCSI hard disk, you discover that your Windows Server computer will not start.You do not have the Windows NT setup disks but you have an Emergency Repair disk.What must you do to recover the system?(Choose two.)A.Create the Windows NT setup disks by using the Winnt.exe program on anthor computer.B.Restore the registry from the Emergency Repair disk by using the Rdisk.exe utility.C.Boot with the Emergency Repair disk and recover the registry.D.Boot with the Windows NT setup disks and restore the registry from the Emergency Repair disk.AD15. You install Windows NT Server without creating an Emergency Repair disk. You then configure several SCSI devices and printers.You want to back up the configuration settings so that you can quickly restore the computer in the event of a startup failure.How should you do this?A.Save a copy of the registry by using the Windows NT Backup program.B.Save all configuration information to disk by using Disk Administrator.C.Make a copy of the registry hives by using Save Key in the Registry Editor.D.Creat e an Emergency Repair disk with the current configuration settings by using the Rdisk.exe utility.D16. Reduce logon validation traffic over the 56-Kbps link.Proposed solution:Reinstall the Windows NT Server in London as a BDC.Add WINS and DHCP to the Windows NT Server computer in London.Configure all client computers in London to use the London WINS server.Configure the replicationGovernor registry entry on the BDC to 25 percent.Configure the two WINS servers as pull partners only.Which rsults does the proposed solution produce?A. the proposed solution produces the required results and produces all of the optional desired results.B. the proposed solution produces the required results and produces two of the optional desired results.C. the proposed solution produces the required results but does not produce any of the optional desired results.D. the proposed solution does not produce the required results.A17. Users report slow reponse times from one of the servers on your Windows NT Server network. This server acts as a file-and-print server. You suspect very high utilization on one of the disk drives.Which action providers the most information for determining which disk partition has the highest utilization?A.In Performance Monitor,view the LogicalDisk object.B.In Performance Monitor,view the Paging File object.C.In Performance Monitor,view the Servercounter for the Thread object.e the Diskperf utility to analyze the activity occurring on a per-file basis.A18. You receive a report that one subnet on you Windows NT Server network is experiencing a large amount of broadcast traffic.Which tool should you use to determine which computers are generating the most traffic?A.Response ProbeB.Performance MonitorC.Windows NT DiagnosticsD.Windows NT Server 4.0 Network MonitorD19. You Windows NT Server network uses the single master domain model.The master domain contains seven domain controllers and 2,000 user accounts. Using Performance Monitor,you determine that the PDC is being overloaded with synchronization to the BDCs.What should you do to reduce the load on the PDC?A. Add a new BDC to the domain.B. Stop the Net Logon service on the PDC.C. Increase the Pulse registry entry on the PDC.D. Increase the Pulse Concurrency registry entry on PDC.C20. You are running Windows NT Server 4.0 Network monitor on the Windows NT Server computer that functions as the DNS,DHCP,and WINS server for the network. All computers on the network use TCP/IP with DHCP,DNS,and WINS.You capture 1,200 packets.How should you configure the display filter to view only the packets pertaining to the assignment of IP addresses?A. Protocol==SMBB. Protocol==DHCPC. Protocol==BROWSERD. *NETBIOS Multicast(ETHERNET)<->*ANYB21. You are administrratoor of a Windows NT Server computer named Techs.Techs has an intel Pentium 133-MHz processor,32 MB of RAM,and 2-GB SCSI hard disk.Techs functions as a file-and-print server for 115 client computers.Users of client computers have rece ntly started reporting slow reponse times when they access files located on Techs.You run Performance Monitor and gather the following average statistics. Computer:\\TECHSObject:Processor o%Processor Time80.835Object:MemoryPages/sec101.155Object:ServerBytes Total/sec84364.461Object:PhysicalDisk o%disk Time100.000What should you do Techs to provider the greatest increase in performance?A. Upgrade the processor.B. Upgrade RAM to 64 MBC. Upgrade Techs to a multiprocessor system.D. Implement a stripe set with parity.B22. you are using an accounting application to print checks.The printer jams in the middle of the print job.The accounting application will allow you to reprint the checks.You turn off the printer and clear the jammed checks.What should you to do in Print Manager to complete printing this batch of checks ?A.Select Resume from the Printer menu.B.Select Resume from the Document menu.C.Select Restart from the Document menuD.Select Pause Printing from the Printer menu,and then resume printing.B23. Your Windows NT Server computer is configure with six SCSI hard disks.One hard disk is the system disk,and the other five are configured as a stripe set with parity.After a power outage,your server reboots,and you discover that two of the five hard disks in the stripe set wiyh parity have failed.You replace both failed hard disks.What else should you do to recover from the hard disk failure?A.Regenerate the stripe set with parity by using Disk Administrator.B.Wait for Windows Nt server to regenerate the stripe set with parity.C.Create a stripe set across all five hard disks,and then restore from tape bacpup.D.Create a stripe set with parity across all five disks,and then restore from tape backup.D24. After you install a new device driver for a SCSI hard disk, you discover that your Windows NT Server computer will not start.You do not have the Windows NT setup disks but you have an Emergency Repair disk. What must you do to recover the system?(Choose two.)A.Create the Windows NT setup disks by using the Winnt.exe program on anthor computer.B.Restore the registry from the Emergency Repair disk by using the Rdisk.exe utility.C.Boot with the Emergency Repair disk and recover the registry.D.Boot with the Windows NT setup disks and restore the registry from the Emergency Repair disk.AD25. You install Windows NT Server without creating an Emergency Repair disk. You then configure several SCSI devices and printers.You want to back up the configuration settings so that you can quickly restore the computer in the event of a startup failure.How should you do this?A.Save a copy of the registry by using the Windows NT Backup program.B.Save all configuration information to disk by using Disk Administrator.C.Make a copy of the registry hives by using Save Key in the Registry Editor.D.Create an Emergency Repair disk with the current configuration settings by using the Rdisk.exeutility.D26. Reduce logon validation traffic over the 56-Kbps link.Proposed solution:Reinstall the Windows NT Server in London as a BDC.Add WINS and DHCP to the Windows NT Server computer in London.Configure all client computers in London to use the London WINS server.Configure the replicationGovernor registry entry on the BDC to 25 percent.Configure the two WINS servers as pull partners only.Which rsults does the proposed solution produce?A. the proposed solution produces the required results and produces all of the optional desired results.B. the proposed solution produces the required results and produces two of the optional desired results.C. the proposed solution produces the required results but does not produce any of the optional desired results.D. the proposed solution does not produce the required results.A27. Users report slow reponse times from one of the servers on your Windows NT Server network. This server acts as a file-and-print server. You suspec very high utilization on one of the disk drives.Which action providers the most information for determining which disk partition has the highest utilization?A.In Performance Monitor,view the LogicalDisk object.B.In Performance Monitor,view the Paging File object.C.In Performance Monitor,view the Servercounter for the Thread object.e the Diskperf utility to analyze the activity occurring on a per-file basis.A28. You receive a report that one subnet on you Windows NT Server network is experiencing a large amount of broadcast traffic.Which tool should you use to determine which computers are generating the most traffic?A.Response ProbeB.Performance MonitorC.Windows NT DiagnosticsD.Windows NT Server 4.0 Network MonitorD29. You Windows NT Server network uses the single master domain model.The master domain contains seven domain controllers and 2,000 user accounts. Using Performance Monitor,you determine that the PDC is being overloaded with synchronization to the BDCs.What should you do to reduce the load on the PDC? A. Add a new BDC to the domain.B. Stop the Net Logon service on the PDC.C. Increase the Pulse registry entry on the PDC.D. Increase the Pulse Concurrency registry entry on PDC.C30. You are running Windows NT Server 4.0 Network monitor on the Windows NT Server computer that functions as the DNS,DHCP,and WINS server for the network. All computers on the network use TCP/IP with DHCP,DNS,and WINS.You capture 1,200 packets.How should you configure the display filter to view only the packets pertaining to the assignment of IP addresses?A. Protocol==SMBB. Protocol==DHCPC. Protocol==BROWSERD. *NETBIOS Multicast(ETHERNET)<->*ANYB31. You are administrratoor of a Windows NT Server computer named Techs.Techs has an intel Pentium 133-MHz processor,32 MB of RAM,and 2-GB SCSI hard disk.Techs functions as afile-and-print server for 115 client computers.Users of client computers have recently started reporting slow reponse times when they access files located on Techs.You run Performance Monitor and gather the fol lowing average statistics.Computer:\\TECHSObject:Processor o%Processor Time80.835Object:MemoryPages/sec101.155Object:ServerBytes Total/sec84364.461Object:PhysicalDisk o%disk Time100.000What should you do Techs to provider the greatest increase in performance?A. Upgrade the processor.B. Upgrade RAM to 64 MBC. Upgrade Techs to a multiprocessor system.D. Implement a stripe set with parity.B32. you are using an accounting application to print checks.The printer jams in the middle of the print job.The accounting application will allow you to reprint the checks.You turn off the printer and clear the jammed checks.What should you to do in Print Manager to complete printing this batch of checks ?A.Select Resume from the Printer menu.B.Select Resume from the Document menu.C.Select Restart from the Document menu.D.Select Pause Printing from the Printer menu,and then resume printing.B33. Your Windows NT Server computer is configure with six SCSI hard disks.One hard disk is the system disk,and the other five are configured as a stripe set with parity.After a power outage,your server reboots,and you discover that two of the five hard disks in the stripe set wiyh parity have failed.You replace both failed hard disks.What else should you do to recover from the hard disk failure?A.Regenerate the stripe set with parity by using Disk Administrator.B.Wait for Windows Nt server to regenerate the stripe set with parity.C.Create a stripe set across all five hard disks,and then restore from tape bacpup.D.Create a stripe set with parity across all five disks,and then restore from tape backup.D34.After you install a new device driver for a SCSI hard disk, you discover that your Windows NT Server computer will not start.You do not have the Windows NT setup disks but you have an Emergency Repair disk.What must you do to recover the system?(Choose two.)A.Create the Windows NT setup disks by using the Winnt. exe program on anthor computer.B.Restore the registry from the Emergency Repair disk by using the Rdisk.exe utility.C.Boot with the Emergency Repair disk and recover the registry.D.Boot with the Windows NT setup disks and restore the registry from the Emergency Repair disk.AD35. You install Windows NT Server without creating an Emergency Repair disk. You then configure several SCSI devices and printers.You want to back up the configuration settings so that you can quickly restore the computer in the event of a startup failure.How should you do this?A.Save a copy of the registry by using the Windows NT Backup program.B.Save all configuration information to disk by using Disk Administrator.C.Make a copy of the registry hives by using Save Key in the Registry Editor.D.Create an Emergency Repair disk with the current configuration settings by using the Rdisk.exe utility.D微软认证模拟试题:IE4.0考题Additional components added in to IEAK that are custom, must be digitally signed and in What type of format?A. (. dat)B. (. ico)C. (. exe)D. (. cab)Answer: C, DCAB files are executables that are added into IEAK for custom component install. They should be :A. Approved by versionB. Digitally signedC. Approved by IE development teamD. Compressed for installationAnswer: BWhich of the following would allow your user to access certain files but at the same time avoid her from downloading unsigned controls?A. Do not place any URLs in any zone.B. Place URLs in question in the Restricted Sites Zone.C. Place URLs in question in the Restricted Sites Zone and set Download Unsigned ActiveX Controls to Disable.D. Place URLs in question in the Restriced Sites Zone with medium security settings.Answer: AWhen Installing IE 4.0 on a NT 4.0 Workstation, the user must login as which of the following to complete the installation.A. Member of Server OperatorsB. Any userC. Member of Power UsersD. Member of AdministratorsAnswer: C, DWhen Installing IE 4.0 on a Windows 95 machine, the user must login as which of the following to complete the installation.A. Member of Server OperatorsB. Any userC. Member of Power UsersD. Member of AdministratorsAnswer: BWhich settings will be imported from Netscape Navigator 3.0 to Internet Explorer 4.0?A. cookies, bookmarks, & proxy informationB. plug- ins and favoritesC. cookies, plug- ins and proxy settingsD. favorites, cookies and plug- insAnswer: AHow many favorites or favorite links can you add during a custom build of IE4.0 through IEAK?A. 20B. 10C. 200D. 100Answer: CHow many download sites can you add to a custom setup of IE4.0 through IEAK?A. 20B. 10C. 200D. 100Answer: BSuppose the following situation exists: Several developers at your company frequently download ActiveX components from the Internet for beta testing.Required Result:Prompt the developers before downloading signed ActiveX controls.Optional Desired Results:1) Enable the developers to download unsigned ActiveX controls.2) Enable the developers to run ActiveX scripts.Proposed Solution:Set up Internet Explorer and accept the default configuration.Which results does the proposed solution produce?A. The proposed solution produces the required result and both of the optional desired results.B. The proposed solution produces the required result and only one of the optional desired results.C. The proposed solution produces the required result but neither of the optional desired results.D. The proposed solution does not produce the required result.Answer: BWhere does IE get the information for the AutoComplete fearture?A. Favorites folderB. Manually AddedC. Temporary Internet Files folderD. History folderAnswer: DTo customize the control panel and my computer of a custom install of IE4.0 which files must be modified?A. Mycomp. htmB. Mycomp. httC. Controlp. htmD. Controlp. httAnswer: CFor an ISP using IEAK for IE4.0 what are the 2 types of user signups available?A. Internet sign- up serverB. Use sign up wizard in setupC. Serverless setupD. ISP connection wizardAnswer: A, CYou are an administrator for a global organization. Your users require multiple languages for the Internet Explorer. You currently have 3 different installation options and need them in 3 different languages. How many different times must you reset your system's regional settings in order to make your custom packages.A. noneB. sixC. threeD. nineAnswer: AThe resolution of a fully qualified domain name to an IP address uses what service?A. WINSB. DNSC. PPTPD. ARPAnswer: BAfter setting up a dialing parameters, How should you test to see if your configuration is correct?A. Do a test install and run setup. exeB. Run Setup. ins from command lineC. Click verify information on dialing parameters screenD. Click test sign up pageAnswer: DIn which stage of building a custom version of IE4.0 through IEAK ,will you be able to modify the security zone?A. Zone 1B. Zone 3C. Zone 4D. Zone 5Answer: D。
微软认证70-228-试卷2
![微软认证70-228-试卷2](https://img.taocdn.com/s3/m/d61ce69c5ef7ba0d4b733b07.png)
微软认证70-228-试卷2(总分:14.00,做题时间:90分钟)一、单选题(总题数:7,分数:14.00)1.You are the administrator of a SQL Server 2000 computer. Each evening after business hours, you perform database maintenance tasks. You create a Data Transformation Services package to populate the data warehouse. MAPI is not installed on the server.You want to schedule the DTS package to run each night. You want to attend to other duties while the DTS package is executing. You also want to be notified if the DTS package fails.What should you do?(分数:2.00)A.Select the DTS packages log package execution to SQL server check box. Create a SQL server event alert to notify you if the package fails.B.Select the DTS packages write completion status to event log check box. Create a SQL server event alert to notify you if the package fails. √C.Configure the DTS package to include an on failure precedence constraint and a send mail task. Configure the send mail task to notify you if the package fails.D.Configure the DTS package to include an on failure precedence constraint and a send mail task. Configure the execute process task to execute a not send command that will notify you if the package fails.解析:解析:Explanation: When jobs are completed (successfully or not), the subsystem returns a result status (with optional messages) to SQL Server Agent. SQL Server Agent then records the completion status in both the operating system's application log and the job history table in SQL Server and optionally sends an e-mail report or an SQL Server event alert of the job status to the designated operator. Incorrect Answers: A: We are interested to when the package has completed. The completion status, not the log package execution, should be used to trap the completion of a package. The execution status concerns Last run time, Last run status, Last run message, etc. C, D: The Messaging Application Programming Interface (MAPI) isn't installed. MAPI is needed for SQL Server to send e-mail. No e-mail can be send by SQL Server in this scenario.2.server’s msdb database in an e-mail message to the administrator of another SQL Server computer.You create a job that contains the following steps:--Detach the msdb database--Send the database to the administrator in an e-mail message--Reattach the msdb databaseYou test the job, and it fails on the first step. You need to ensure that the msdb database is mailed to the administrator every night.What should you do?(分数:2.00)A.Ensure that the SQLServerAgent service is running under a user account that has database owner access to the msdb databaseB.Delete the first and last steps in the jobC.Configure the job to back up the msdb database to a temporary file. Send the file to the administrator in an e-mail message √D.Insert a new job step before the first step. Configure the new step to terminate all processes that use the msdb database解析:解析:Explanation: The current job fails since the detach msdb statement fails. It fails because detaching a database requires that no one is using the database. The msdb database is used by the SQL Server Agent service, which performs scheduled activities such as backups and replication tasks. We want to send the msdb database. The msdb database could be detached if all processes that use it where terminated. Then we could send the database file and reattach the msdb database. This would stop scheduled tasks from being run during this period. A better approach would to be to backup the database and send the temporary file instead. Note: A new SQL Server2000 installation automatically includes six databases: master, model, tempdb, pubs, Northwind, and msdb. The master, model, and tempdb databases cannot be detached. Incorrect answers: A: The problem that the SQL Service Agent is using the msdb database. This problem would still be there even user account running the SQL Server Agent service is changed. B: The msdb database is used by the SQL Server Agent service and the database file would be locked. It cannot be sent directly in an e-mail message. D: The msdb database could be detached if all processes that use it where terminated. Then we could send the database file and reattach the msdb database. This would stop scheduled tasks from being run during this period.3.You are the database administrator for an accounting company. You are installing SQL Server 2000 on a new Microsoft Windows 2000 Server computer. The computer will run two client/server database applications that your company has purchased. Each application uses a separate database.During the installation, you specify SQL_Latin1_General_CP1_CI_AI as the default collation for the SQL server computer. After completing the installation, you discover that one of the new applications, named Financials, is sorting information incorrectly.You contact the application vendor and discover that the Financials application requires the SQL_Latin1_CP437_BIN collation. You need to configure the correct collation for the applications without diminishing the performance of the SQL Server computer.What should you do?(分数:2.00)A.Rerun the SQL Server Setup and specify the SQL_Latin1_General_CP437_BIN collation.B.Run the rebuildm utility and specify the SQL_Latin1_General_CP437_BIN collation.e the ALTER DATABASE statement to specify the SQL_Latin1_General_CP437_BIN collation for the Financials database. √e the ALTER TABLE statement to specify the SQL_Latin1_General_CP437_BIN collation for each table in the Financials database.解析:解析:Explanation: The collation of a database can be specified in the COLLATE clause of the ALTER DATABASE statement. This will change the default collation of the database that was specified when the database was created, or to alter the collation for a database where the collation was not specified when the database was created and thus the default collation of the server was used. Incorrect Answers: A: The collation of a database can be altered using the COLLATE clause of the ALTER DATABASE statement. It is therefore not necessary to reinstall the instance of SQL Server 2000 or to rerun the setup program. Furthermore, rerunning the SQL Server 2000 setup program would disrupt the performance of the SQL Server computer. B: The rebuildm utility alters the master database and can be used to change the collation settings for an instance of SQL Server 2000. However, it is only the Financial database that needs to be altered as it is financial application is the only application that uses the SQL_Latin1_General_CP437_BIN collation. D: The COLLATE clause can be specified at different levels. It can be specified for the database, a table, a column or an expression. In this scenario the collation can be altered at the database level as this will reduce administrative effort when new tables are added to the database.4.You are the database administrator of a SQL Server 2000 computer. The server contains your company's Accounts database. Hundreds of users access the database each day.Because you have had power interruptions in the past, you want to perfect the physical integrity of the Accounts database. You do not want to slow down server operations.What should you do?(分数:2.00)A.Enable the torn page detection database option for each database.B.Disable write caching on all disk controllers.C.Ensure that write caching disk controllers have battery backups. √D.Create a database maintenance plan to check database integrity and make repairs each night. 解析:解析:Explanation: The scenario states that power interruptions have occurred in the past. By buying a battery backup solution for the disk controllers the power interruption problem wouldbe prevented. Incorrect Answers: A: Torn page detection is a reactive solution which would slow down performance since restores would have to be made. It would better to use a preventive solution. Note: Torn page detection: If a torn page is detected, the database must be restored from backup because it will be physically inconsistent. B: Caching is very import for performance. Disabling write-caching would be a bad idea. D: Repairing the database every night is not a good solution. Database errors cannot be accepted. It is better to prevent the problem instead of trying to fix it after it has happened.5.You are the administrator of a SQL Server 2000 computer. The server contains a database namedInventory. The database is configured as shown in the Users frequently need details about parts. Users search for data by using the following query.SELECT Parts.SKU, Locations.Description, , PartsLocations.Qty,stInventoriedFROM PartsINNER JOIN Manufacturer ON Parts.ManufacturerID= Manufacturer.ManufacturerIDINNER JOIN PartsLocation ON Parts.PartID =Parts.Location.PartsIDINNER JOIN Locations ON Parts.LocationID= Locations.LocationIDWHERE SKU?You need to accelerate query response time. What should you do?(分数:2.00)A.Create a parameterised stored procedure to retrieve the data.B.Create a denormalized table that is maintained by triggers.e ad hoc queries to retrieve the data.D.Create a nonclustered index on the primary key of each table. √解析:解析:Explanation: A nonclustered index is similar to an index in a textbook. The data is stored in one place, the index in another, with pointers to the storage location of the data. The index contains entries describing the exact location in the table of the data values being searched for in the queries and should be used for columns that contain a large number of distinct values; queries that do not return large result sets; columns frequently involved in search conditions of a query that return exact matches; and decision-support-system applications for which joins and grouping are frequently required. Create multiple nonclustered indexes on columns involved in join and grouping operations, and a clustered index on any foreign key columns. Note: A better solution, not listed here, would to create clustered indexes on the primary keys and nonclustered indexes on the foreign keys. Incorrect Answers: A: A parameterized query would not improve performance. Parameterized queries are SQL queries written for reusability. They contain parameter markers as placeholders for data that will change from execution to execution. In the Data Transformation Services (DTS) tasks that use parameterized queries. B: Reasonable normalization often includes few regularly executed queries that use joins involving more than four tables. In this scenario four tables are being joined in the query. The normalization here is thus permissible. Note: Database normalization often improves query performance. When useful indexes are available, the SQL Server 2000 query optimizer can select rapid, efficient joins between tables. Normalization is advantageous as it aids faster sorting and index creation; enables a larger number of clustered indexes; allows for narrower and more compact indexes; reduces the number of indexes per table, which improves the performance of INSERT, UPDATE, and DELETE statements; and reduces null values and the opportunity for inconsistency, which increase database compactness. However, as normalization increases, so do the number and complexity of joins required to retrieve data. Too many complex relational joins between too many tables can hinder performance. C: An ad hoc query is a query that is composed for a particular task. The code in this scenario is an example of an ad hoc query.6.You are the administrator of a SQL Server 2000 computer. The server contains a database that stores inventory data. Another database administrator has created a number of scheduled jobs to maintain the inventory database. Each weeknight the following jobs occur.-- A BULK INSERT jobimports data at 10:00 P.M.-- Indexes are rebuilt at 10:15 P.M.-- Data integrity checks are performed at 10:30 P.M.-- A differential backup is performed at 10:45 P.M.-- A DBCC SHRINKDATABASE job runs at 11:00 P.M.You notice that the final job often fails and returns the following error message: "Server Msg 3140, Level 16, State 3. Could not adjust the space allocation for file 'inventory_data'."You need to ensure that the final job runs without errors. What should you do? (分数:2.00)A.Create a new DBCC SHRINKFILE job to shrink the inventory_data file. Schedule the new job to run at the same time as the DBCC SHRINKDATABASE job.B.Modify the DBCC SHRINKDATABASE job so that it uses DBCC SHRINKFILE statement to shrink each file individually.C.Increase the time between the data integrity checks and the differential backup.D.Increase the time between the differential backup and the DBCC SHRINKDATABASE job. √解析:解析:Explanation: The DBCC SHRINKDATABSE cannot be executed until the previous job step, the differential backup, has been completed. We should increase the time between these two job steps, or even better configure the last job step to run only after the differential backup has been completed. Note: The DBCC SHRINKDATABASE statement shrinks data files on a per-file basis but shrinks log files as if all the log files existed in one contiguous log pool. The target size for the data and log files cannot be smaller than the minimum size of a file that was specified when the file was originally created, or the last explicit size set with a file size changing operation such as the ALTER DATABASE statement with the MODIFY FILE option or the DBCC SHRINKFILE statement. Incorrect Answers: A: The DBCC SHRINKDATABASE command shrinks the whole database. Shrinking a single data file would not be the optimal solution to shrink the database. Note: The DBCC SHRINKFILE statement shrinks the size of the specified data or log file in the related database and is used to reduce the size of a file to smaller than its originally created size. The minimum file size for the file is then reset to the newly specified size. By using the EMPTYFILE argument in conjunction with the DBCC SHRINKFILE statement before executing the ALTER DATABASE statements, we can remove the data in a file. Other users can be working in the database when the file is shrunk, thus the database being shrunk does not have to be in single-user mode when using the DBCC SHRINKFILE statement. The DBCC SHRINKDATABASE statement shrinks data files on a per-file basis but shrinks log files as if all the log files existed in one contiguous log pool. The target size for the data and log files cannot be smaller than the minimum size of a file that was specified when the file was originally created, or the last explicit size set with a file size changing operation such as the ALTER DATABASE statement with the MODIFY FILE option or the DBCC SHRINKFILE statement. These two functions thus adjust the space allocation on a per-file basis and cannot run at the same time. B: The DBCC SHRINKDATABASE statement shrinks data files on a per-file basis already. There is no need to use the DBCC SHRINKFILE statement to shrink each file individually. Note: The DBCC SHRINKDATABASE statement shrinks log files as if all the log files existed in one contiguous log pool. The target size for the data and log files cannot be smaller than the minimum size of a file that was specified when the file was originally created, or the last explicit size set with a file size changing operation such as the ALTER DATABASE statement with the MODIFY FILE option or the DBCC SHRINKFILE statement. C: Database integrity checks such as the DBCC CHECHDB statement should be run before any major system changes, such as a hardware or software upgrade, or after a hardware failure, or if a system problem is suspected. It is not necessary to run database integrity checks as part of the normal backup or maintenance procedures.7.You are the administrator of a SQL Server 2000 computer in your company's personnel department. Employee data is stored in a SQL Server 2000 database. A portion of the database schema is shownin the You want to create a text file that lists these data columns in the following format title, FirstName, LastName, WorkPhone, PositionName, DepartmentName.You want to createthe text file as quickly as possible. You do not expect to re-create this file, and you want to avoid creating new database objects if possible.What should you do?(分数:2.00)e the bcp utility to export data from each table to a separate text file. Use format files to select the appropriate columns. Merge the data from each text file into a single text file.B.Create a view that joins data from all three tables include only the columns you want to appear in the text file. Use the bcp utility to export data from the view.C.Create a SELECT query that joins the data from the appropriate columns in the three tables. Add an INTO clause to the query to create a local temporary table. Use the bcp utility to export data from the local temporary table to a text file.D.Create a SELECT query that joins the data from the appropriate columns in the three tables. Add an INTO clause to the query to create a global temporary table. Use the bcp utility to export data from the global temporary table to a text file. √解析:解析:Explanation: As the columns that we want in the text file are on different tables in the database, we would have to combine the column into a table or view. Because we will not need to reproduce the file, we can we can combine the column from the various tables into a global temporary table by using the SELECT INTO statement. Then we use the bcp utility to export the data from the global temporary file to a text file. Note: Temporary tables are not stored in the current database; they are stored in the tempdb system. There are two types of temporary tables: local temporary tables, which are visible only to the connection that created them, and global temporary tables, that are visible to all connections. If global temporary tables are not dropped explicitly before the connection that created them disconnects, they are dropped as soon as all other tasks stop referencing them. No new tasks can reference a global temporary table after the connection that created it disconnects. The bcp utility copies data between an instance of SQL Server 2000 and a data file in a user-specified format. It can be used to transfer data from a SQL Server table to a data file for use in other programs. Furthermore, data can also be transferred out by specifying a SELECT statement. The bcp utility can use global temporary tables, but not local temporary tables. Incorrect Answers: A: Creating a global temporary table by using the SELECT statement and using the bcp utility to export data from that table would require less administrative effort than using bcp to export the required columns from each table into a separate text file and then merging those text files into a single text file. B: Because we would not need to re-create the data file again, it would be easier to use the SELECT statement to create a global temporary table as these tables are dropped automatically when nothing reference them. C: The bcp utility cannot use local temporary tables. Note: Temporary tables are not stored in the current database; they are stored in the tempdb system. There are two types of temporary tables: local temporary tables, which are visible only to the connection that created them, and global temporary tables, that are visible to all connections.。
微软认证考试《NetworkingEssentials》试题
![微软认证考试《NetworkingEssentials》试题](https://img.taocdn.com/s3/m/58aa651fb7360b4c2e3f645a.png)
The solution was to install UTP in the offices and use fiber optic cable between the office and the branches.
I chose would not provide the required result.
Client and the server have the same IP address
Server has the wrong subnet mask.
Server’s name not registered with the name server.
C. TCP
D. IP
E. UDP
Q14. What is a benefit of installing an application server to store and manage a database?
A. An application server centrally manages all user accounts.
Bridge
Broutery
Q5. You have a network using NetBEUI and TCP/IP. The server and client are in different subnets. The client can PING the server, but cannot access the server using its name.
D. An application server transfers the entire database to client computers.
微软认证考试模拟题库。70-536模拟题
![微软认证考试模拟题库。70-536模拟题](https://img.taocdn.com/s3/m/5fd58c02de80d4d8d15a4f80.png)
QUESTION 1You work as the application developer at Certkiller .com. Certkiller .com uses Visual 2005 as its application development platform.You are in the process of storing numerical values up to 2,100,000,000 into a variable and may require storing negative values using a .NET Framework 2.0 application. You are required to optimize memory usageWhat should you do?A. Int32B. UInt16C. UInt32D. Int16Answer: AQUESTION 2You work as an application developer at Certkiller .com. You are currently in the process of creating a class that stores data about Certkiller .com's customers. Certkiller .com customers are assigned unique identifiers and various characteristics that may include aliases, shipping instructions, and sales comments. These characteristics can change in both size and data type.You start by defining the Customer class as shown below:public class Customer{private int custID;private ArrayList attributes;public int CustomerID{get {return custID;}}public Customer (int CustomerID){this.custID = CustomerID;this.attributes = new ArrayList ();}public void AddAttribute (object att){attributes.Add (att);}}You have to create the FindAttribute method for locating attributes in Customer objects no matter what the data type is.You need to ensure that the FindAttribute method returns the attribute if found,and you also need to ensure type-safety when returning the attribute.What should you do?A. Use the following code to declare the FindAttribute method:public T FindAttribute (T att){//Find attribute and return the value}B. Use the following code to declare the FindAttribute method:public object FindAttribute (object att){//Find attribute and return the value}C. Use the following code to declare the FindAttribute method:public T FindAttribute <T> (T att){//Find attribute and return the value}D. Use the following code to declare the FindAttribute method:public string FindAttribute (string att){//Find attribute and return the value}Answer: CQUESTION 3You work as an application developer at Certkiller .com. You are creating a custom exception class named ProductDoesNotExistException so that custom exception messages are displayed in a new application when the product specified by users is unavailable.This custom exception class will take the ProductID as an argument to its constructor and expose this value through the ProductID. You are now in the process of creating a method named UpdateProduct. This method will be used to generate and manage the ProductDoesNotExistException exception if the ProductID variable contains the value 0.You need to ensure that use the appropriate code for the UpdateProduct method.What should you do?A. Make use of the following code:public void UpdateProduct (){try{if (ProductID == 0)throw new ProductDoesNotExistException (ProductID);}catch (ProductDoesNotExistException ex){MessageBox.Show ("There is no Product" + ex. ProductID);}}B. Make use of the following code:public void UpdateProduct (){try{if (ProductID = = 0)throw new Exception ("Invalid ProductID");}catch (ProductDoesNotExistException ex){MessageBox.Show (ex.Message);}}C. Make use of the following code:public void UpdateProduct (){if (ProductID = = 0)throw new ProductDoesNotExistException (ProductID);}D. Make use of the following code:public void UpdateProduct (){if (ProductID = = 0)throw new Exception ("Invalid ProductID");}Answer: AQUESTION 4You work as the application developer at Certkiller .com. Certkiller .com uses Visual 2005 as its application development platform.You have recently finished development of a class named TestReward and package the class in a .NET 2.0 assembly named TestObj.dll. After you ship the assembly and it is used by client applications, you decide to move the TestReward class from TestObj.dll assembly to the TestRewardObj.dll Assembly. You are to ensure when you ship the updated TestObj.dll and TestRewardObj.dll assemblies that the client applications continue to work and do not require recompiling.What should you do?A. The TypeForwardedTo attribute should be usedB. The TypeConvertor.ConvertTo method should be usedC. The InternalsVisibleTo attribute should be usedD. The Type Convertor.ConvertFrom method should be usedAnswer: AQUESTION 5You work as an application developer at Certkiller .com. You have recently created a custom collection class named ShoppingList for a local supermarket. This custom class will include ShoppinItem objects that have the public properties listed below.* Name* AisleNumber* OnDiscountYou are required to enable users of your class to iterate through the ShoppingList collection, and to list each product name and aisle number using the foreach statement.You need to achieve this by declaring the appropriate code.What code should you use?A. public class ShoppingList : ICollection{// Class implementation}B. public class ShoppingList : IEnumerator, IEnumerable{// Class implementation}C. public class ShoppingList : Ilist{// Class implementation}D. public class ShoppingList : Enum{// Class implementation}Answer: BQUESTION 6You work as the application developer at Certkiller .com. Certkiller .com uses Visual 2005 as its application development platform.You are developing a .NET Framework 2.0 application used to store a type-safe list of names and e-mail addresses. The list will be populated all at ones from the sorted data which means you well not always need to perform insertion or deletion operations on the data. You are required to choose a data structure that optimizes memory use and has good performance.What should you do?A. The System.Collections.Generic.SortedList class should be usedB. The System.Collections.HashTable class should be usedC. The System.Collections.Generic.SortedDictionary class should be usedD. The System.Collections.SortedList class should be usedAnswer: AQUESTION 7You work as an application developer at Certkiller .com. You are currently in theprocess of reviewing an application that was created by a fellow developer.The application that you are reviewing includes a declaration for a collection named EmployeeList, which stores Employee objects. The declaration is shown below: public class EmployeeList : Enumerator, IEnumerable{// Class implementation}You require the ability to iterate through the EmployeeList with minimum development effort.What should you do?A. Utilize the switch statementB. Utilize the dowhile statementC. Utilize the foreach statementD. Utilize the if statementAnswer: CQUESTION 8You work as an application developer at Certkiller .com. Certkiller .com has been contracted to develop an application for the local bank.You have been given the responsibility of creating this application and need to store each transaction record, which is identified using a complex transaction identifier,in memory. The bank informs you that the total amount of transaction records could reach 200 per day.To achieve this, you decide to utilize one of the existing collection classes in the .NET 2.0 class library. You need to ensure that you the collection class you select is the most efficient one for storing transaction records.What should you do?A. Select the ListDictionary collection class.B. Select the HashTable collection class.C. Select the Queue collection class.D. Select the StringCollection collection class.Answer: BQUESTION 9You work as an application developer at Certkiller .com. Certkiller .com has been hired by a small local private school to develop a class library that will be used in an application named ManageAttendance for the purpose of managing student records.You are responsible for developing this class library. Certkiller .com has instructed you to create a collection in the application to store learners' results.The school has informed you that they currently only have seven learners, but that this value will triple in the following year. Due to the limited resources, you need to ensure that the collection you create consumes a minimum amount of resources. What should you use to create the collection?A. The HybridDictionary collection class.B. The HashTable collection class.C. The ListDictionary collection class.D. The StringCollection collection class.Answer: AQUESTION 10You work as an application developer at Certkiller .com. Certkiller .com wants you to develop an application that stores and retrieves client information by means of a unique account number.You create a custom collection class, which implements the IDictionary interface,named ClientDictionary. The following code have been included into the new application.//Create Client objectsClient c1 = new Client ("AReid", "Andy Reid", Status.Current);Client c2 = new Client ("DAustin", "Dean Austin", Status.New);//Create ClientDictionary objectIDictionary cData = new ClientDictionary ();cData.Add ("10001", c1);cData.Add ("10002", c2);You use the same method to add other Client objects to the collection. You need to ensure that you are able to retrieve client information associated with the account number 10111.What should you do?A. Use the following code:Client foundClient;foundClient = (Client) cData.Find ("10111");B. Use the following code:Client foundClient;if (cData.Contains ("10111"))foundClient = cData ["10111"];C. Use the following code:Client foundClient;if (cData.Contains ("10111"))foundClient = (Client) cData ["10111"];D. Use the following code:Client foundClient;foreach (string key in cData.Keys{if (key == "10111")foundClient = (Client) cData.Values ["10111"];}Answer: CQUESTION 11You work as an application developer at Certkiller .com. Certkiller .com has instructed you to create a class named MetricFormula. This class will be used to compare MetricUnit and EnglishUnit objects.The MetricFormula is currently defined as follows (Line numbers are used for reference purposes only):1. public class MetricFormula2. {3.4. }You need to ensure that the MetricFormula class can be used to compare the required objects. What should you do? (Choose two)A. Add the following code on line 1:: IComparable{B. Add the following code on line 1:: IComparer{C. Add the following code on line 3:public int Compare (object x, object y){// implementation code}D. Add the following code on line 3:public int CompareTo (object obj){// implementation code}Answer: B, CQUESTION 12You work as an application developer at Certkiller .com. You are developing an application that makes use of a Queue class object named MyQueue. This Queue class object will be used to store messages sent by the user during application run time. The application that you are developing provides an interface for administrators and an interface for users to create message reports.You want to ensure that all user messages stored in the MyQueue object are removed when an administrator selects the reset option.What should you do?A. Use the Enqueue method of the MyQueue object.B. Use the Clear method of the MyQueue object.C. Use the Dequeue method of the MyQueue object.D. Use the TrimToSize method of the MyQueue object.Answer: BQUESTION 13You work as an application developer at Certkiller .com. You are developing an application that will store user messages collectively and the process the messages in sequence. The order in which the messages are processed will depend on the orderin which it is received. To add messages to the collection, users will specify the message that should be stored in a TextBox control named txtMsg and then click a Button control named btnAdd. You need to ensure that the appropriate code is used tocreate the collection. What should you use? (Choose two)A. Queue msgCollection = new Queue ();B. Stack msgCollection = new Stack ();C. msgCollection.Enqueue (txtMSG.Text);D. msgCollection.Push (txtMSG.Text);Answer: A, CQUESTION 14You work as an application developer at Certkiller .com. You are developing an application that makes use of a Queue class object named MyQueue. This Queue class object will be used to store messages sent by the user during application run time.You would like to access the message at the beginning of the queue, prior to processing the user messages, without removing it. What should you do?A. Use the Enqueue method of the MyQueue object.B. Use the Contains method of the MyQueue object.C. Use the Dequeue method of the MyQueue object.D. Use the Peek method of the MyQueue object.Answer: DQUESTION 15You work as an application developer at Certkiller .com. Certkiller .com wants you to develop an application that stores and retrieves employee information by means of a unique staff number.You create a custom collection class, which implements the type-safe IDictionary interface. This collection class is named EmployeeCollection, and is defined using the following code.public class EmployeeCollection : IDictionary <int, Employee>{// Implementation code}You need to ensure that an EmployeeCollection object is instantiated and that Employee objects are added to it.What should you do?A. Use the following code:Employee e1, e2;e1 = new Employee (1001, "Andy Reid", "Manager");e2 = new Employee (1002, "Kara Lang", "Sales Engineer"); EmployeeCollection eData = new EmployeeCollection();eData.Add (new KeyValuePair <string, Employee> (e1.ID, e1));eData.Add (new KeyValuePair <string, Employee> (e2.ID, e2));B. Use the following code:Employee e1, e2;e1 = new Employee (1001, "Andy Reid", "Manager");e2 = new Employee (1002, "Kara Lang", "Sales Engineer"); EmployeeCollection eData = new EmployeeCollection();eData.Add ((string) e1.ID, e1);eData.Add ((string) e2.ID, e2);C. Use the following code:Employee e1, e2;e1 = new Employee (1001, "Andy Reid", "Manager");e2 = new Employee (1002, "Kara Lang", "Sales Engineer"); EmployeeCollection eData = new EmployeeCollection();eData.Add (e1.ID, e1);eData.Add (e2.ID, e2);D. Use the following code:Employee e1, e2;e1 = new Employee (1001, "Andy Reid", "Manager");e2 = new Employee (1002, "Kara Lang", "Sales Engineer"); EmployeeCollection eData = new EmployeeCollection();eData.Add (new KeyValuePair (e1.ID, e1));eData.Add (new KeyValuePair (e2.ID, e2));Answer: CQUESTION 16You work as an application developer at Certkiller .com. Certkiller .com wants you to develop an application that stores and retrieves staff information by means of a unique staff number.You have already written the following code for the purpose of storing Employee objects.Employee e1 = new Employee (1001, "Andy Reid", "Manager");Employee e2 = new Employee (1002, "Kara Lang", "Sales Engineer");Dictionary <int, Employee> eData = new Dictionary <int, Employee> ();eData.Add (e1.ID, e1);eData.Add (e2.ID, e2);All other Employee objects have been added in the same way. You are required to display all key/value pairs within the Dictionary collection.What should you do?A. Use the following code:foreach (KeyValuePair<int, Employee> keyPair in eData)Console.WriteLine ("{0} key : {1} value", keyPair.Key, keyPair.Value);B. Use the following code:foreach (string key in eData.Keys)Console.WriteLine ("{0} key : {1} value", Key, (Employee) eData [key]);C. Use the following code:foreach (KeyValuePair keyPair in eData)Console.WriteLine ("{0} key : {1} value", keyPair.Key, keyPair.Value);D. Use the following code:foreach (object value in eData.Values)Console.WriteLine ("{0} key : {1} value", eData [value], value);Answer: AQUESTION 17You work as an application developer at Certkiller .com. Certkiller .com wants you to develop an application that handles passes for Certkiller .com's parking lot. The application has to store and retrieve vehicle information using a vehicle identification number (VIN).You need to use the correct code to ensure type-safety. What should you do?A. Use the following code:Vehicle v1, v2;v1 = new Vehicle ("1M2567871Y91234574", "Nissan Silvia", 1996);v2 = new Vehicle ("1F2569122491234574", "Mitsubishi Lancer", 2005);ArrayList vList = new ArrayList ();vList.Add (v1);vList.Add (v2);B. Use the following code:Vehicle v1, v2;v1 = new Vehicle ("1M2567871Y91234574", "Nissan Silvia", 1996);v2 = new Vehicle ("1F2569122491234574", "Mitsubishi Lancer", 2005); SortedList <string, Vehicle> vList = new SortedList <string, Vehicle> ();vList.Add (v1.VIN, v1);vList.Add (v2.VIN, v2);C. Use the following code:Vehicle v1, v2;v1 = new Vehicle ("1M2567871Y91234574", "Nissan Silvia", 1996);v2 = new Vehicle ("1F2569122491234574", "Mitsubishi Lancer", 2005);List vList = new List ();vList.Add (v1);vList.Add (v2);D. Use the following code:Vehicle v1, v2;v1 = new Vehicle ("1M2567871Y91234574", "Nissan Silvia", 1996);v2 = new Vehicle ("1F2569122491234574", "Mitsubishi Lancer", 2005); SortedList vList = new SortedList ();vList.Add (v1.VIN, v1);vList.Add (v2.VIN, v2);Answer: BQUESTION 18You work as an application developer at Certkiller .com. Certkiller .com wants you to develop an application that handles passes for Certkiller .com's parking lot. The application has to store and retrieve vehicle information in a contiguous list that allows for advanced navigation techniques.You have already written and executed the following code:Vehicle v1, v2, v3, v4, v5;v1 = new Vehicle ("1M2567871Y91234574", "Nissan Silvia", 1996);v2 = new Vehicle ("1H2569122493456960", "Honda Civic", 1999);v3 = new Vehicle ("1F2569106891234589", "Mitsubishi Lancer", 2001);v4 = new Vehicle ("1F7969122491234589", "Mazda MX7", 1998);v5 = new Vehicle ("1T2569122493456123", "Toyota Supra", 2000);LinkedList <Vehicle> vList = new LinkedList < Vehicle > ();LinkedListNode < Vehicle > vNode;vNode = vList.AddFirst (v1);vNode = vList.AddLast (v2);vNode = = vList.AddAfter (vNode, v3);vNode = = vList.AddAfter (vNode, v4);vList.AddLast (v5);foreach (Vehicle v in vList){Console.WriteLine ("{0} {1} ({2})", v.MakeModel, v.Year, v.Vin);}What output will be produced in the console?A. Nissan Silvia 1996 (1M2567871Y91234574)Honda Civic 1999 (1H2569122493456960)Mitsubishi Lancer 2001 (1F2569106891234589)Mazda MX7 1998 (1F7969122491234589)Toyota Supra 2000 (1T2569122493456123)B. Nissan Silvia 1996 (1M2567871Y91234574)Mazda MX7 1998 (1F7969122491234589)Mitsubishi Lancer 2001 (1F2569106891234589)Honda Civic 1999 (1H2569122493456960)Toyota Supra 2000 (1T2569122493456123)C. Nissan Silvia 1996 (1M2567871Y91234574)Mazda MX7 1998 (1F7969122491234589)Mitsubishi Lancer 2001 (1F2569106891234589)Toyota Corolla 2002 (1T2569122493456123)Honda Civic 1999 (1H2569122493456960)D. Nissan Silvia 1996 (1M2567871Y91234574)Mitsubishi Lancer 2001 (1F2569106891234589)Mazda MX7 1998 (1F7969122491234589)Honda Civic 1999 (1H2569122493456960)Toyota Supra 2000 (1T2569122493456123)Answer: BQUESTION 19You work as an application developer at Certkiller .com. You are developing a collection class named ClientCollection, which is to be used for storing the names ofCertkiller .com's clients that are situated in various geographical areas.These client names are represented by the Client class. You are planning to create a method named SortClients in the ClientCollection class to arrange Client objects in ascending order. You need to ensure that the appropriate interface is implemented by the Client class to allow sorting.What interface should be used?A. IDictionaryB. IComparableC. IComparerD. IEqualityComparerAnswer: BQUESTION 20You work as an application developer at Certkiller .com. You have been given the responsibility of creating a class named CalcSalary that will determine the salariesof Certkiller .com's staff.The CalcSalary class includes methods to increment and decrement staff salaries.You would like to invoke the IncrementSalary and DecrementSalary methods dynamically at runtime from the sales manager application when needed. After viewing the information displayed in the exhibit, you decide to use the Salary delegate to invoke these methods.using System;public delegate boolSalary (Employee Emp, double Amount);public class CalcSalary{// for promotionspublic static bool IncrementSalary (Employee Emp, double Amount){// implementation details}// for demotionspublic static bool DecrementSalary (Employee Emp, double Amount){// implementation details}What code should you use?A. public void Review (Employee emp, double amount){Salary salaryDel;if (emp.Status = = QuarterlyReview.OnTarget | | emp.Status = = QuarterlyReview.AboveGoals)salaryDel.Invoke (CalcSalary.IncrementSalary (emp, amount));elsesalaryDel.Invoke (CalcSalary.DecrementSalary (emp, amount));}B. public void Review (Employee emp, double amount)Salary salaryDel;if (emp.Status == QuarterlyReview.OnTarget | | emp.Status = = QuarterlyReview.AboveGoals)salaryDel.Method = CalcSalary.IncrementSalary;elsesalaryDel.Method = CalcSalary.DecrementSalary;salaryDel.Invoke (emp, amount);}C. public void Review (Employee emp, double amount){Salary salaryDel;if (emp.Status == QuarterlyReview.OnTarget | | emp.Status = = QuarterlyReview.AboveGoals)salaryDel.IncrementSalary (emp, amount);elsesalaryDel.DecrementSalary (emp, amount);}D. public void Review (Employee emp, double amount){Salary salaryDel;if (emp.Status = = QuarterlyReview.OnTarget | | emp.Status = = QuarterlyReview.AboveGoals)salaryDel = CalcSalary.IncrementSalary;elsesalaryDel = CalcSalary.DecrementSalary;salaryDel.Invoke (emp, amount);}Answer: DQUESTION 21You work as an application developer at Certkiller .com. You have been given the responsibility of creating a class named CalcSalary that will determine the salaries of Certkiller .com's staff. The CalcSalary class includes methods to increment and decrement staff salaries. The following code is included in the CalcSalary class: public class CalcSalary{// for promotionspublic static bool IncrementSalary (Employee Emp, double Amount){if (Emp.Status == QuarterlyReview.AboveGoals)Emp.Salary += Amount;return true;}return false;}//for demotionspublic static bool DecrementSalary (Employee Emp, double Amount){if (Emp.Status == QuarterlyReview.AboveGoals)Emp.Salary -= Amount;return true;}elsereturn false;}}You would like to invoke the IncrementSalary and DecrementSalary methods dynamically at runtime from the sales manager application, and decide to create a delegate named SalaryDelegate to invoke them.You need to ensure that you use the appropriate code to declare the SalaryDelegate delegate.What is the correct line of code?A. public delegate bool Salary (Employee Emp, double Amount);B. public bool Salary (Employee Emp, double Amount);C. public event bool Salary (Employee Emp, double Amount);D. public delegate void Salary (Employee Emp, double Amount);Answer: AQUESTION 22You work as an application developer at Certkiller .com. You have recently created a Windows service application and need to define a Windows service class. What should you do?A. Use the following code:public class TestService : System.ServiceProcess.WindowsService{//Implementation details}B. Use the following code:public class TestService : System.ServiceProcess.IWindowsService{//Implementation details}C. Use the following code:public class TestService : System.ServiceProcess.ServiceBase{//Implementation details}D. Use the following code:public class TestService : System.ServiceProcess.IService{//Implementation details}Answer: CQUESTION 23You work as an application developer at Certkiller .com. You have been given the task of developing a Windows service application that regularly monitors other Windows services on the same computer.This Windows service application must also log any abnormal file system activity. You have added the following class to the Windows service application:public class EnumerateService : ServiceBase{public static EnumerateService (){this.ServiceName = "Enumerate Service";this.CanStop = true;}protected override void OnStart (string[] args){// Enumerate all services and initialize the FileSystemWatcher}protected override void OnStop (){// Stop the FileSystemWatcher and perform cleanup}public static void Main (){EnumerateService service = new EnumerateService();}}You then create the installer for the Windows service application, and install the Windows service application. You have configured the Windows service Startup type to Automatic, and rebooted the system. You then test the new Windows service application, and find that it is not working.You need to ensure that the service is working properly. What should you do?A. Override the OnBoot method instead of the OnStart method.B. Replace the Main method code with the following code:EnumerateService service = new EnumerateService ();Service.Run ();C. Override the OnLoad method instead of the OnStart method.D. Replace the Main method code with the following code:EnumerateService service = new EnumerateService ();Run (service);Answer: DQUESTION 24You work as an application developer at Certkiller .com. Certkiller .com has asked you to develop an application allows administrators to control Windows services dynamically without using the Services MMC.You start by creating a class named LocalServiceController. You need to add the correct code to the LocalServiceController class to ensure that administrators are able to start local Windows services.What code should you use?A. public static bool StartService (string serviceName){try {ServiceBase.Run (serviceName);return true;}catch{return false;}}B. public static bool StartService (string serviceName){ServiceController controller = new ServiceController (serviceName);if (controller.Status != ServiceControllerStatus.Running){controller.Start ();return true;}elsereturn false;}C. public static bool StartService (string serviceName){ServiceManager manager = new ServiceManager (serviceName);if (manager.Status != ServiceManagerStatus.Running){manager.Start ();return true;}elsereturn false;}。
微软认证的IC3考试题完整收藏
![微软认证的IC3考试题完整收藏](https://img.taocdn.com/s3/m/499d7bd549649b6648d7471b.png)
01单元习题1.个人计算机的4个重要组成部分为硬件、软件、用户和训练。
a.正确b.错误2.在为计算机安装外部设备时需要内部驱动程序的支持。
a.正确b.错误3.衡量微处理器运算速度的单位是MHz或GHz。
a.正确b.错误4.为什么RAM被认为是不稳定的?a.当计算机断电或重新启动时,RAM中的信息会消失b.它的资源在处理数据时几乎被耗尽c.Windows经常会占用很多内存。
d.a和b5.高速缓冲存储器有助于提高CPU对频繁访问内存的指令和数据的处理速度。
a.正确b.错误6.如果暂时不使用计算机,那么需要对显示器进行怎样的操作?a.关闭显示器b.调低对比度c.使用屏幕保护功能d.以上任意选项7.以下哪个键可用于结束一行文本的输入、插入一个新的空行或执行输入命令?a.b.c.d.+8.端口是计算机后部面板上的插口,输入输出设备通过它连接到计算机上。
a.正确b.错误9.为什么要将文件存储于存储设备中?a.防止计算机关机后数据丢失b.将RAM中的信息保存于存储设备中c.保留一个数据备份d.以上都正确e.仅有a和c正确10.移动硬盘是指可以从一台本地计算机中取走数据并且可以将数据用于另一台计算机的存储设备。
a.正确b.错误11.点矩阵打印机的优势是:a.耗材费用低b.连续进纸c.文本型文档的打印质量高d.以上都正确e.只有a和b正确12.使用打印机时,应该回收用完的墨盒,而不要对它们进行简单的丢弃处理。
a.正确b.错误13.程序被称为软件,是因为它们只有被安装到计算机中并从操作系统内部开始执行命令时才能发挥作用。
a.正确b.错误14.在开机和重新启动计算机时,操作系统识别安装于计算机中的所有设备,并检查它们是否正常工作。
a.正确b.错误15.启动计算机指的是开启计算机并加载操作系统的过程。
a.正确b.错误16.用户可以不必顾及当前的工作,直接关闭计算机的电源。
a.正确b.错误02单元习题1.使用“开始”菜单中的哪个选项可以查看系统中安装的程序?a.我的文档b.所有程序c.搜索d.快速启动项目列表2.菜单中的命令旁边的符号代表什么意思?a.将弹出快捷菜单b.含有子菜单c.可启动程序d.打开一个对话框3.若窗口太小,不能显示全部内容,滚动条就会出现。
微软认证70-210-试卷1_真题(含答案与解析)-交互
![微软认证70-210-试卷1_真题(含答案与解析)-交互](https://img.taocdn.com/s3/m/b651fe3e5627a5e9856a561252d380eb6294234e.png)
微软认证70-210-试卷1(总分10, 做题时间90分钟)1. 单选题1.You are the administrator of a Windows 2000 network. Your network includes 75 Windows NT Workstation 4.0 computers. You are adding 50 new ****puters to the network. The hardware on **puter is configured identically.You are using a RIS image to deploy Windows 2000 Professional to the 50 computers. You successfully install Windows 2000 Professional on the first 10 computers. However, you cannot install Windows 2000 Professional on remaining 40 computers.What should you do?SSS_SINGLE_SELA Configure the DHCP scope to add additional IP addresses.B Run Rbfg.exe from the RemoteInstall\Admin folder on the RIS server.C Modify the startup sequence in the CMOS of the **puters.D **puter accounts on the **puters in the Active Directory.该问题分值: 2答案:A解析:Explanation: RIS requires Active Directory, DNS and DHCP. The clients can either be **pliant or they can use a Remote boot diskette. In this scenario, the DHCP server has run out of IP-addresses. By extending the scope by 40 IP addresses the installation on the **puters will be successful. Incorrect Answers: B: Rbfg.exe is used to create Remote Boot disks **puters that do not have **pliant network cards. In this scenario, all clients are **pliant and will thus be able to boot through the network and access the RIS image. It is thus not necessary to create Remote Boot disks. C: The 50 **puters have identical hardware. There installation worked on 10 of the**puters. There can thus be no incorrect startup sequence setting in CMOS. D: In this situation there is no need for **puter accounts in Active Directory. Pre-**puter accounts are used to select between RIS servers. By configuring the RIS server to answer only known **puters it would require user accounts for all RIS clients. This is not the default setting.2.You configure your Windows 2000 **puter for Internet Connection Sharing and for TCP/IP filtering as shown in the exhibit./You test your TCP/IP filtering configuration from another **puter. You can access web sites, but you cannot access FTP sites.What should you do to be able to access FTP sites?SSS_SINGLE_SELA Add Port 21 to the TCP Ports section.B Add Port 138 to the TCP Ports section.C Add Port 21 to the IP Ports section.D Add Port 138 to the IP Ports section.该问题分值: 2答案:A解析:Explanation: The FTP protocol uses the TCP port 21. In the exhibit the UDP port 21 has been incorrectly added instead of the TCP port. Incorrect answers: B: The FTP protocol uses Port 21 not Port 138. C: The port 21 should be added as a TCP port 21, not as a UDP port or as an IP protocol. IP is also a network protocol and not a port. D: The FTP protocol uses TCP port 21 not port 138. IP is also a network protocol and not a port.3.As a Ezonexam employee you are the desktop administrator of a Windows 2000 **puter.The Windows 2000 **puter has 25 MB of free disk space drive C and 800 MB of free disks pace on drive E. You are unable to print large documents because if inadequate disk space on drive C.You want to be able to use the space on drive E to print large documents.What should you do?SSS_SINGLE_SELA From the Printer Properties dialog box, change the location field to E:\Winnt\System32\Spool\Printers.B From the Print Server Properties dialog box, change the location of the spool folder to any existing file path on drive E.C Copy the C:\Winnt\System32\Spool\Printers folder to theE:\Winnt\System32\Spool\Printers folder.D Mount drive C as a subdirectory on drive E.该问题分值: 2答案:B解析:Explanation: When one is unable to print large documents then the hard disk space is insufficient for spooling. To remedy the situation you should create more free space on the hard disk. Since the question mentions that Drive C has 25 MB of free disk space and Disk E has 800 MB of free disk space, and there is an inability to print large documents due to inadequate disk space on Drive C, thenit would be logical to change the location of the spool folder to any existing file path on Drive E if one wants to be able to print large documents. Incorrect answers: A: The Printer Properties dialog box is not the appropriate location from which to change the location of the spool folder. C: This procedure is not how one changes the locationof the spool folder. D: There is no need to mount Drive C as a subdirectory on Drive E. Drive C will still have inadequate free disk space.2. 多选题1.You are the network administrator for . Your network has 210 Windows 2000 **puters and eleven Windows 2000 **puters. Users on the network save their work files in home folders on a network server. The NTFS partition that contains the home folders has Encrypting File System (EFS) enabled. A user named Sandra leaves . You decrypt the files for her manager. When the manager attempts to open any of the files, he receives the following error message: "Access is denied."You want the manager to be able to access the files.What should do? (Each correct answer presents a complete solution. Choose two.)SSS_MULTI_SELA Move the files from Sandra's folder to the manager's folder.B Grant the manager NTFSFull Controlpermission to the files.C Run **mand to create a new file encryption key for the manager.D Run **mand to generate an EFS recovery agent key and certificate.E Grant the manager NTFSList Folder Contentspermissions to the folder containing Sandra's files.该问题分值: 2答案:A,B解析:Explanation: A: When a new file is created it inherits the permissions from its parent. A Move operation creates a new version of the resource you are moving if you are moving the resource to a different partition-for this reason, permissions of the parent are inherited. A Move operation does not create a new version of the resource if you are moving the resource to a different location on the same partition-for this reason, existing permissions are moved along with the resource. B: The NTFS Full Control permission allows a user to change permissions, take ownership, delete subfolders and files, and perform the actions granted by all other permissions. Incorrect answers: C, D: The Cipher utility allows you to encrypt files and folders as well as check the encryption statistics. However, this does not guarantee the manager access to the files because the files have been decrypted already and access was still denied. E: The NTFS List Folder Contents permission allows a user to see the names of files and subfolders in the folder. This is not the same as granting access.2.You are preparing to install Windows 2000 Professional on 75**puters. You want to create a standard installation image to use onall the **puters. **puters have several different configurations of hard disks and **ponents.You install Windows 2000 Professional and other standard software on one of **puters. You log on to **puter using the local Administrator account. You configure the standard applications and customize the desktop settings you intend to deploy.You run the Setup Manager and create a Sysprep.inf file. You copy Sysprep.exe and Setupcl.exe to the C:\Sysprep folder. You run Sysprep.exe and run your third party disk imaging software.You copy the image to the several **puters and restart **puters. When the installation is complete, you find that some of **puters do not function at all. You also find that the desktop settings do not appear as you have configured them on the **puter.You want to correct the imaging process and ensure that **puters have the same standard desktop.What should you do? (Choose two)SSS_MULTI_SELA Copy Sysprep.inf to C:\Sysprep folder.B Copy the Administrator profile to the Default User profile, and then grant permissions to the Everyone group to use the profile.C Include the-pnpparameter for Sysprep.exe when you rerun that utility.D Include the-nosidgenparameter for Sysprep.exe when you rerun that utility.该问题分值: 2答案:B,C解析:Explanation: B: A user profile is automatically created and maintains the desktop configuration for each user's desktop on the local Windows 2000 computer. This user profile is created when the user logs on to a computer for the first time. An administrator profile, which maintains the administrators desktop configuration is created during the Windows 2000 Professional installation. In this scenario the administrator profile must be copied and used as the Default User profile, which is applied to all users. As all users are automatically placed in the Everyone user group, the Everyone user group must be granted permission to access this profile. C: Because **puters that Windows 2000 Professional will be installed onto have different hardware configurations a full plug and play detection must be done during the installation process. This can be accomplished by including the -pnp parameter to the sysprep.exe utility, as this parameter causes the plug and play detection utility to be used. Incorrect answers: A: When the installation is complete, you findthat some of **puters do not function at all and that the desktop settings do not appear as they have been configured on the **puter. This indicates that the sysprep installation was successful.Therefore the sysprep.inf file must have already been in theC:\Sysprep folder (as is the default when using setupmgr.exe to create the file). D: The -nosidgen is only used on the **puter where the clone image was made. It instructs the installation program not to generate the system information that is unique to eachinstallation of Windows 2000 Professional. This parameter is not used here during the installation of Windows 2000 Professional on the**puters. It is therefore not relevant to this scenario.1。
微软BI认证考试070-431
![微软BI认证考试070-431](https://img.taocdn.com/s3/m/834f8bfb0242a8956bece460.png)
Exam : 070-431Title : Microsoft® SQL Server 2005 - Implementation and MaintenanceVer : 11.03.06QUESTION 1:Your application must access data that is located on two SQL Server 2005 computers. One of these servers is named SQL1 and the other is SQL2. You have permissions to create a stored procedure on SQL1 to support your application. However, on SQL2 you only have permissions to select data.You write the stored procedure on SQL1. The stored procedure accesses SQL2 by using the OPENQUERY Transact-SQL statement. However, the query fails when executed. You need to troubleshoot the cause of the error. What should you do?A. Join the two servers by using the four-part syntax of server.database.schema.table.B. Reference SQL2 by using an alias.C. Add SQL2 as a remote server to SQL1.D. Add SQL2 as a linked server to SQL1.Answer: DExplanation: You need to define a linked server for each external data source you want to access and the configure the security context under which your distributed queries will run. After you create a linked server, you can use the Transact-SQL OPENQUERY function to execute your distributed queries.QUESTION 2:You are preparing for a new installation of SQL Server 2005. You need to select the protocols that client computers might use to connect to the server.Which two protocols can you use to achieve this goal? (Each correct answer presents a complete solution. Choose two.)A. Named PipesB. TCP/IPC. Shared MemoryD. Virtual Interface Adapter (VIA)E. MultiprotocolAnswer: A,BExplanation: By default, clients have TCP and Named Pipes as available protocols. You can manipulate the protocol ordering by using the SQL Server Client utility.The client application uses the protocols in the order specified on the client computer. If you are using SQL Server 2005, the protocol order is stored in the ProtocolOrder registry entry under the following registry subkey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\MSSQLServer\Client\SNI9.0QUESTION 3:You configure a new SQL Server 2005 computer to use TCP/IP with all default settings. Your corporate policy requires that each server use a firewall. You find that you can connect to the SQL Server instance from the local computer. However, client computers cannot connect to the SQL Server instance.You need to identify the most likely cause of the connection issues. What should you do first?A. Ensure that port 1433 is open in your firewall.B. Ensure that port 443 is open in your firewall.C. Ensure that client computers connect by using Shared Memory protocol.D. Ensure that the server is not paused.Answer: AExplanation: The default instance of the Database Engine uses port 1433, but thatcan be changed. Instances of SQL Server 2005 Express Edition, SQL Server Mobile,and named instances of the Database Engine use dynamic ports. The SQL Server Browser service lets users connect to instances of the Database Engine that are not listening on port 1433, without knowing the port number. To use SQL Server Browser, you must open UDP port 1434.QUESTION 4:Certkiller .com has multiple servers in a distributed environment. You work with two SQL Server 2005 computers named SQL1 and SQL2. Each server uses SQL Server Authentication and they use different logins.You need to write a distributed query that joins the data on SQL1 with the data on SQL2. What should you do?A. Ensure that both SQL1 and SQL2 use the same login name as the security context for each server.B. Configure SQL2 as a remote server. Write the query on SQL1.C. Configure SQL2 as a linked server to impersonate the remote login.D. Configure SQL2 as a distributed server. Use pass-through authentication.Answer: CExplanation: When you use linked servers to access external data sources, youshould pay special attention to the security context for the external connection. Youcan configure the linked server to use one of the following three security modes:Self-mapping - When a linked server is created, this mode is added for all local logins, soSQL Server tries to connect to the external data source using the current user's login credentials. The same login and password must exist on the remote server. This is the default behaviour.delegation-This mode impersonates the windows local credentials;the connection forwards the credentials of an authenticated Windows user to the linked server. The Windows user account and password must exist on the linked server.Remote Credentials - This mode lets you map local logins to remote logins on the external data source.Delegation of operating system logins is the securest mechanismQUESTION 5:Certkiller .com uses SQL Server 2005. Users report that report execution is slow. You investigate and discover that some queries do not use optimal execution plans. You also notice that some optimizer statistics are missing and others are out of date.You need to correct the problem so that reports execute more quickly. Which two Transact-SQL statements should you use? (Each correct answer presents part of the solution. Choose two.)A. DBCC CHECKTABLEB. ALTER INDEX REORGANIZEC. UPDATE STATISTICSD. CREATE STATISTICSE. DBCC SHOW_STATISTICSF. DBCC UPDATEUSAGEAnswer: C, DExplanation: When a DBA creates an index, the query optimizer stores statistical information about the indexed columns. Additionally, CREATE STATISTICS, will create statistics on columns that are not contained in indexes but that are used inquery predicates. UPDATE STATISTICS will optimize query performance. QUESTION 6:You are responsible for implementing maintenance jobs on a SQL Server 2005 database server. Certain jobs run every Sunday and other jobs run at the beginning of every month. You need to schedule the jobs in the way that uses the least amount of administrative effort. What should you do?A. Create a job schedule that runs every Sunday. Assign weekly tasks to this schedule. Create a second schedule that runs on the first day of every month. Assign monthly tasks to this schedule.B. Create a job for each task that runs once a day. Use a Transact-SQL statement tocheck the date and day of the week. If the day is either a Sunday or the first day of the month, execute the code.C. Create a job schedule that runs once a day. Assign jobs to this job schedule. If the day is either a Sunday or the first day of the month, execute the jobs.D. Create a job for each task that runs once a week on Sunday. Add a second job schedule that runs the job on the first of the month.Answer: AExplanation: You need 2 schedules or both tasks will be executed on Sundays andon the first day of the month. Creating a job schedule for each task that runs once a week instead of creating one schedule containing all the tasks would use more administrative effort than needed.QUESTION 7:You discover that the msdb database on a SQL Server 2005 computer is corrupt and must be restored. Databases are backed up daily. The database backup files are written to a network share, but the file names do not clearly indicate which databases are in each file. You need to locate the correct backup file as quickly as possible. The first file in the list is named DB_Backup.bak. Which Transact-SQL statement should you use?A. RESTORE LABELONLYFROM DISK = N\\Server1\Backup\DB_Backup.bakB. RESTORE HEADERONLYFROM DISK = N\\Server1\Backup\DB_Backup.bakC. RESTORE VERIFYONLYFROM DISK = N\\Server1\Backup\DB_Backup.bakD. RESTORE DATABASE MSDBFROM DISK = N\\Server1\Backup\DB_Backup.bak Answer: BExplanation: VERIFYONLY verifies the backup but does not restore it, and checksto see that the backup set is complete and the entire backup is readable. However, RESTORE VERIFYONLY does not attempt to verify the structure of the data contained in the backup volumes.Syntax:RESTORE VERIFYONLYFROM [ ,...n ][ WITH[ { CHECKSUM | NO_CHECKSUM } ][ [ , ] { CONTINUE_AFTER_ERROR | STOP_ON_ERROR } ][ [ , ] FILE =backup_set_file_number ][ [ , ] LOADHISTORY ][ [ , ] MEDIANAME = { media_name | @media_name_variable } ][ [ , ] MEDIAPASSWORD = { mediapassword |@mediapassword_variable } ][ [ , ] MOVE 'logical_file_name' TO 'operating_system_file_name' ][ ,...n ][ [ , ] PASSWORD = { password | @password_variable } ][ [ , ] { REWIND | NOREWIND } ][ [ , ] STATS [ = percentage ] ][ [ , ] { UNLOAD | NOUNLOAD } ]][;]<backup_device>::={{ logical_backup_device_name |@logical_backup_device_name_var }| { DISK | TAPE } = { 'physical_backup_device_name' |@physical_backup_device_name_var }}QUESTION 8:A support engineer reports that inserting new sales transactions in a SQL Server 2005 database results in an error. You investigate the error. You discover that in one of the databases, a developer has accidentally deleted some data in a table that is critical for transaction processing. The database uses the full recovery model. You need to restore the table.You need to achieve this goal without affecting the availability of other data in the database. What should you do?A. Back up the current transaction log. Restore the database with a different name and stop at the point just before the data loss. Copy the table back into the original database.B. Back up the current transaction log. Restore the database to the point just before the data loss.C. Restore the database from the existing backup files to a time just before the data loss.D. Restore the database to the point of the last full backup.Answer: AExplanation: You only want to restore the table that has been accidentally altered.All other suggestions to solution will restore the complete database and thereforeyou will lose data that may have been written to other tables after the point in time where you stop the recovery.QUESTION 9:A power failure occurs on the storage area network (SAN) where your SQL Server 2005 database server is located.You need to check the allocation as well as the structural and logical integrity of alldatabases, including their system catalogs. What should you do?A. Execute DBCC CHECKFILEGROUP for each filegroup.B. Execute DBCC CHECKCATALOG.C. Execute DBCC CHECKDB.D. Execute DBCC CHECKTABLE for each table.Answer: CExplanation: DBCC CHECKDB will check the logical and physical integrity of allthe objects in the specified database by:- Running DBCC CHECKALLOC on the database.- Running DBCC CHECKTABLE on every table and view in the database.- Running DBCC CHECKCATALOG on the database.- Validating the contents of every indexed view in the database.- Validating the Service Broker data in the databaseQUESTION 10:You are responsible for importing data into SQL Server 2005 databases. Your department is starting to receive text files that contain sales transactions from stores across the country. Columns in the data are separated by semicolons.You need to import the files into the sales database. What should you do?A. Create a custom format file, specifying a semicolon as the row terminator.B. Use the bcp command, specifying a semicolon as the field terminator.C. Use the bcp command with the default arguments.D. Use the BULK INSERT statement with the default arguments.Answer: BExplanation: The bcp utility bulk copies data between an instance of Microsoft SQL Server 2005 and a data file in a user-specified format. The bcp utility can be used to import large numbers of new rows into SQL Server tables or to export data out oftables into data files. To import data into a table, you must either use a format file created for that table or understand the structure of the table and the types of datathat are valid for its columns.QUESTION 11:You are creating a Web-based application to manage data aggregation for reports. The application connects to a SQL Server 2005 database named DataManager. One page in the application has controls that execute stored procedures in a database named ReportingDatabase. There is an existing Service Broker connection between theDataManager database and ReportingDatabase.You want to add two new message types to the existing service. In each database, you create message types named ProcessReport and SendResult. You need to add the two new message types to the existing service. What should you do first?A. Create a queue on each database with the ACTIVATION argument set to DataManager.dbo.ProcessReport.B. Create a conversation between the databases by using the following statement.BEGIN DIALOG FROM SERVICE 'ProcessReport' TO SERVICE 'SendResult'C. Create a contract between the services by using the following statement.CREATE CONTRACT ProcessData (ProcessReport SENT BY INITIATOR, SendResult SENT BY TARGET)D. Create services for each database by using the following statement.CREATE SERVICE DataManager ON QUEUE ProcessReportAnswer: CExplanation: A contract contains a list of message types and the services that are allowed to send them.Syntax: CREATE CONTRACT contract [AUTHORIZATION owner ] ( {{message_type_name | [DEFAULT ] } SENT BY { INITIATOR | TARGET | ANY } } [,...n])[;]Key: contarct Name of the contract owner Owner of the contract(database user or role) message_type_name Name of a message type to be included as part of the contract.QUESTION 12:You work at the regional sales office. You are responsible for importing and exporting data in SQL Server 2005 databases. The main office asks you to send them a text file that contains updated contact information for the customers in your region. The database administrator in the main office asks that the data be sorted by the StateProvince, Surname, and FirstName columns.You need to satisfy these requirements by using the least amount of effort. What should you do?A. Specify StateProvince, Surname, and FirstName in the ORDER hint in the bcp out command.B. Create a format file for the export operation.C. Specify StateProvince, Surname, and FirstName in the ORDER BY clause in the bcp queryout command.D. Copy the data into a new table that has a clustered index on StateProvince, Surname, and FirstName. Export the data.Answer: CExplanation: The bcp utility bulk copies data between an instance of Microsoft SQL Server 2005 and a data file in a user-specified format. The bcputility can be used to import large numbers of new rows into SQL Server tables or to export data out of tables into data files. Except when used with the queryout option, the utility requiresno knowledge of Transact-SQL. Queryout copies from a query and must bespecified only when bulk copying data from a query.Syntax:bcp{[[database_name.][owner].]{table_name | view_name} | "query"}{in | out | queryout | format} data_file[-mmax_errors] [-fformat_file] [-x] [-eerr_file][-Ffirst_row] [-Llast_row] [-bbatch_size][-n] [-c] [-N] [-w] [-V (60 | 65 | 70 | 80)] [-6][-q] [-C { ACP | OEM | RAW | code_page } ] [-tfield_term][-rrow_term] [-iinput_file] [-ooutput_file] [-apacket_size][-Sserver_name[\instance_name]] [-Ulogin_id] [-Ppassword][-T] [-v] [-R] [-k] [-E] [-h"hint [,...n]"]QUESTION 13:Certkiller .com has two SQL Server 2005 computers named SQL1 and SQL2. Both servers take part in replication. SQL1 is both the Publisher and its own Distributor of a publication named Pub1. Pub1 is the only publication on SQL1, and SQL2 is the only Subscriber. Your supervisor requests a status report about the replication latencies. Using Replication Monitor on SQL1, you need to find out the current latencies between the Publisher and Distributor as well as between the Distributor and Subscriber.What should you do?A. Select the Subscription Watch List tab for SQL1. View the Latency column for the SQL2 subscription.B. Select the All Subscriptions tab for the Pub1 publication. View the Latency column for the SQL2 subscription.C. Select the Tracer Tokens tab for the Pub1 publication. Select the Insert Tracer option and wait for the requested latency values for the SQL2 subscription to appear.D. Select the Subscription Watch List tab for SQL1. Double-click the SQL2 subscription. View the duration details on the Publisher to Distributor History tab as well as on the Distributor to Subscriber History tab.Answer: CExplanation: Tracer tokens are a new feature of the transactional replication enginein SQL Server 2005. They are a specialized transactions that is used to gain timing information. Since tracer tokens are picked up by the replication engine and transitwith every other transaction, they can be used to determine the amount of time ittakes a transaction to move from the publisher to distributor and then from thedistributor to each subscriber. With this piece of information, you can now answerthe two most predominant questions for replication: How far behind am I and howlong will it take to catch up?QUESTION 14:Exhibit:Certkiller .com has two SQL Server 2005 computers named SQL1 and SQL2. A database named DB1 is located on SQL1. DB1 contains a table named Certkiller 4. Certkiller 4 is replicated to a database named DB1Repl, which is located on SQL2. Full-Text Search is not being used. Users report that the queries they run against Certkiller 4 in DB1Repl are very slow. You investigate and discover that only the clustered index of Certkiller 4 is replicated. All other indexes in DB1Repl are missing. You examine the Certkiller 4 article properties. The current Certkiller 4 article properties are shown in the exhibit.You need to change the article properties so that all indexes of Certkiller 4 in DB1 are replicated when the subscription is reinitialized. Which two article properties should you change? (Each correct answer presents part of the solution. Choose two.)A. Copy clustered indexB. Copy nonclustered indexesC. Copy extended propertiesD. Copy unique key constraintsE. Copy index partitioning schemesF. Copy XML indexesAnswer: B,FExplanation:QUESTION 15:You are creating an HTTP endpoint that will be used to provide customer data to external applications. Your SQL Server 2005 computer is named SQL1. You create a stored procedure named p_GetPersonData to retrieve the data in the Certkiller database. You create the endpoint by using the following code.CREATE ENDPOINT SQLEP_AWPersons AS HTTP (PATH = '/AWpersons', AUTHENTICATION = (INTEGRATED), PORTS = (CLEAR), SITE = 'SQL1') FOR SOAP (WEBMETHOD 'PersonData' (NAME=' Certkiller p_GetPersonData'), BATCHES = DISABLED, WSDL = DEFAULT, DATABASE = ' Certkiller ', NAMESPACE = 'http://Adventure-Works/Persons')The first users to connect to the endpoint tell you that they do not get any data. You connect to the endpoint and discover that it is not responding. You need to modify the endpoint so that data is returned as expected. What should you do?A. Change the AUTHENTICATION property to KERBEROS.B. Specify BATCHES = ENABLED.C. Specify STATE = Started.D. Specify WSDL = 'pr_GetPersonData'.Answer: CExplanation: The possible states for an endpoint are STARTED, STOPPED, and DISABLED. For an endpoint to respond to requests, the state must be set to STARTED. To comply with the SQL Server 2005 "off by default" approach to security, the default state is STOPPED.QUESTION 16:You work in Dublin at the main office of Certkiller .com. You are responsible for managing a SQL Server 2005 database. The sales department wants a report that compares customer activity in the previous quarter between the main office in Dublin and the branch office in Buenos Aires. They want the data sorted by surname and first name. You restore a recent backup of the Buenos Aires database onto your server. You write queries to build the report, ordering the data by the Surname and FirstName columns. You review the data and notice that the customer list from the Buenos Aires database is sorted differently. The sales department needs the revised data within 15 minutes for a presentation.You need to implement the fastest possible solution that ensures that the data from bothdatabases is sorted identically. What should you do?A. Use the Copy Database Wizard to copy the data in the Buenos Aires database to a new database with the same collation as the Dublin database.B. Use the SQL Server Import and Export Wizard to copy the data from the Buenos Aires database into new tables, specifying the same collation as the Dublin database.C. Modify the format file to specify the same collation as the Dublin database. Import the table again.D. Modify the query on the Buenos Aires database to use the COLLATE setting in the ORDER BY clause. In the query, specify the same collation as the Dublin database. Answer: DExplanation:COLLATE {collation_name}Specifies that the ORDER BY operation should be performed according to the collation specified in collation_name, and not according to the collation of the column as defined in the table or view. collation_name can be either a Windows collation name or a SQL collation name. COLLATE is applicable only for columns of the char, varchar, nchar, and nvarchar data types.QUESTION 17:You work for a company that sells books. You are creating a report for a SQL Server 2005 database. The report will list sales representatives and their total sales for the current month. The report must include only those sales representatives who met their sales quota for the current month. The monthly sales quota is $2,000. The date parameters are passed in variables named @FromDate and @ToDate.You need to create the report so that it meets these requirements. Which SQL query should you use?A. SELECT s.AgentName, SUM(ISNULL(o.OrderTotal,0.00))AS SumOrderTotalFROM SalesAgent s JOIN OrderHeader o ON s.AgentID = o.AgentIDWHERE o.OrderDate BETWEEN @FromDate AND @ToDateGROUP BY s.AgentNameB. SELECT s.AgentName, SUM(ISNULL (o.OrderTotal,0.00))AS SumOrderTotalFROM SalesAgent s JOIN OrderHeader o ON s.AgentID =o.AgentIDWHERE o.OrderDate BETWEEN @FromDate AND @ToDate ANDo.OrderTotal >= 2000GROUP BY s.AgentNameC. SELECT s.AgentName, SUM(ISNULL (o.OrderTotal,0.00)) AS SumOrderTotalFROM SalesAgent s JOIN OrderHeader o ON s.AgentID = o.AgentID WHERE o.OrderDate BETWEEN @FromDate AND @ToDateGROUP BYs.AgentNameHAVING SUM(o.OrderTotal) >= 2000D. SELECT s.AgentName, SUM(ISNULL(o.OrderTotal,0.00)) AS SumOrderTotalFROM SalesAgent s JOIN OrderHeader o ON s.AgentID =o.AgentIDWHERE o.ordertotal = 2000 AND o.OrderDate BETWEEN @FromDateAND @ToDateGROUP BY s.AgentNameHAVING SUM(o.OrderTotal) >= 2000 Answer: CQUESTION 18:You are creating a stored procedure that will delete data from the Contact table in a SQL Server 2005 database. The stored procedure includes the following Transact-SQL statement to handle any errors that occur.BEGIN TRYBEGIN TRANSACTIONDELETE FROM Person.ContactWHERE ContactID = @ContactIDCOMMIT TRANSACTIONEND TRYBEGIN CATCHDECLARE @ErrorMessage nvarchar(2000) DECLARE @ErrorSeverity int DECLARE @ErrorState int SELECT @ErrorMessage = ERROR_MESSAGE(), @ErrorSeverity = ERROR_SEVERITY(), @ErrorState = ERROR_STATE() RAISERROR(@ErrorMessage, @ErrorSeverity, @ErrorState) END CATCH;You test the stored procedure and discover that it leaves open transactions. You need to modify the stored procedure so that it properly handles the open transactions. What should you do?A. Add a COMMIT TRANSACTION command to the CATCH block.B. Remove the COMMIT TRANSACTION command from the TRY block.C. Add a ROLLBACK TRANSACTION command to the CATCH block.D. Add a ROLLBACK TRANSACTION command to the TRY block.Answer: CExplanation: If an exception occurs from one of the statements in the TRY block, control is branched to the CATCH block, where the exception can be handled, logged, and so on. In this case you want to ROLLBACK the transaction if there isan error.QUESTION 19:You are creating an online catalog application that will display product information on the company Web site. The product data is stored in a SQL Server 2005 database. The data is stored as relational data but must be passed to the application as an XML document by using FOR XML. You test your application and notice that not all of the items matching your query appear in the XML document. Only those products that have values for all elements in the schema appear.You need to modify your Transact-SQL statement so that all products matching your query appear in the XML document. What should you do?A. Add an XML index to the table that contains the product data.B. Add the XSINIL argument to the ELEMENTS directive in the query.C. Add a HAVING clause to the query.D. Add the replace value of clause to the query.Answer: BExplanation: If you add the XSINIL instruction to the ELEMENTS clause in theFOR XML construction, SQL Server 2005 generates an empty XML element forNULL values.QUESTION 20:Certkiller .com has two SQL Server 2005 computers named SQL1 and SQL2. Transaction log shipping occurs from SQL1 to SQL2 by using default SQL Server Agent schedule settings.You need to reconfigure transaction log shipping to provide minimum latency on SQL2. What should you do?A. On SQL1, reschedule the transaction log backup job so that it occurs every minute. On SQL2, maintain default schedule settings for both the log shipping copy and the restore jobs.B. On SQL1, change the schedule type for the transaction log backup to Start automatically when SQL Server Agent starts. On SQL2, change the schedule types for both the log shipping copy and the restore jobs to Start automatically when SQL Server Agent starts.C. On SQL1, maintain default schedule settings for the transaction log backup job. On SQL2, change the schedule types for both the log shipping copy and the restore jobs to Start automatically when SQL Server Agent starts.D. On SQL1, reschedule the transaction log backup job so that it occurs every minute. On SQL2, reschedule both the log shipping copy and the restore jobs so that they occur every minute.Answer: DExplanation: In order to minimize latency on SQL2 you need to get a copy fromSQL1 as soon as possible after every write. The shortest possible interval for the transaction log backup is one minute. Once the backup is done you want to copy itand restore it on SQL2 as soon as possible.QUESTION 21:You are implementing transaction log shipping for a database named DB1 from a server named SQL1 to a server named SQL2. Because DB1 is 100 GB in size, it is too big to transfer over the network in a reasonable amount of time.You need to minimize the impact on the network while you initialize the secondary database. Which two actions should you perform? (Each correct answer presents part of the solution. Choose two.)A. Specify the simple recovery model for DB1.B. Specify either the full or the bulk-logged recovery model for DB1.C. Perform a complete backup of DB1 to portable media. Restore the secondary database from that backup; specify the RECOVERY option.D. Perform a complete backup of DB1 to portable media. Restore the secondary database from that backup; specify the STANDBY option.E. Before you activate transaction log shipping to the secondary database, execute the following statement on the primary server.BACKUP LOG DB1 WITHTRUNCATE_ONLYAnswer: B,DExplanation: Standby mode is the RESTORE command option you use to configure standby servers. In this mode, the secondary database is available for read-onlyaccess by users and applications. Log shipping requires that the primary database is configured with the Full or Bulk-Logged recovery model.QUESTION 22:A full backup of your database named DB1 is created automatically at midnight every day. Differential backups of DB1 occur twice each day at 10:00 and at 16:00. A database snapshot is created every day at noon. A developer reports that he accidentally dropped the Pricelist table in DB1 at 12:30. The last update to Pricelist occurred one week ago. You need to recover the Pricelist table. You want to achieve this goal by using the minimum amount of administrative effort. You must also minimize the amount of data that is lost. What should you do?A. Restore the most recent backup into a new database named DB1bak. Apply the most recent differential backup. Copy the Pricelist table from DB1bak to DB1.B. Delete all database snapshots except the most recent one. Restore DB1 from the most recent database snapshot.C. Recover DB1 from the most recent backup. Apply the most recent differential backup.D. Copy the Pricelist table from the most recent database snapshot into DB1. Answer: DExplanation: SQL Server 2005 introduces the capacity for administrators to。
微软认证经典考试试题及答案
![微软认证经典考试试题及答案](https://img.taocdn.com/s3/m/8c8b233130126edb6f1aff00bed5b9f3f90f72d7.png)
微软认证经典考试试题及答案1. 您有一台运行 Windows Vista 的计算机。
您在计算机的新分区上安装 Windows 7。
您需要确保计算机总是在默认状态下启动 Windows Vista。
您应该怎么办?A. 运行 Bcdedit.e某e 并指定 /default 参数。
B. 运行 Bcdedit.e某e 并指定 /bootems 参数。
C. 在 Windows 7 分区的根目录中创建 boot.ini 文件。
D. 在 Windows Vista 分区的根目录中创建 boot.ini 文件。
Answer: A2. 您有一台运行 Windows Vista (某86) 的计算机。
您需要执行Windows 7(64 位)的全新安装。
您应该怎么办?A. 从 Windows 7 安装媒体,运行 Rollback.e某e。
B. 从 Windows 7 安装媒体,运行 Migsetup.e某e。
C. 从 Windows 7 安装媒体启动计算机。
从“安装Windows”对话框,选择“升级”选项。
D. 从 Windows 7 安装媒体启动计算机。
从“安装Windows”对话框,选择“自定义(高级)”选项。
Answer: D3. 您打算在一台配备单个硬盘驱动器的计算机上安装 Windows 7。
该硬盘驱动器连接到一个 RAID 控制器。
在安装过程中,您发现 Windows 7 安装媒体中不包括安装 RAID 控制器所需的文件。
您需要确保可以在该硬盘驱动器上安装 Windows 7。
您应该怎么做?A. 插入 Windows 安装媒体并在计算机开机自检(POST)过程中按F8。
B. 插入 Windows 安装媒体并在计算机开机自检(POST)过程中按F6。
C. 从 Windows 安装媒体启动计算机。
从“安装Windows”对话框中,单击“加载驱动程序”。
D. 从 Windows 安装媒体启动计算机。
从“安装Windows”对话框中,单击“驱动器选项 (高级)”。
微软认证的模拟试题-2
![微软认证的模拟试题-2](https://img.taocdn.com/s3/m/9acc26d950e2524de5187ed3.png)
MIAC微软信息化应用能力认证推广办公室一、单项选择题:10.小王在计算机上使用的用户帐号是管理员帐号,他创建了一个名为“临时雇员”的帐号,那么这个“临时雇员”的用户帐号是默认是属于()组。
A.管理员组AdministratorsB.超级用户组Power UsersC.普通用户组UsersD.来宾组GuestsANSWER: C14.当用户李四登录一台Windows XP Professional SP2计算机后,当他双击控制面板中的“添加硬件”按钮后,出现了如本题图所示的提示,一般地能够说明李四帐号是一个()。
A.普通用户帐号B.管理员帐号,但是被禁用了某些功能C.被禁用的帐号D.超级用户帐号ANSWER: A15.小王经常乘坐火车出差。
在火车上,他需要长时间打开笔记本电脑处理事务。
有个令人头痛的事情是笔记本电脑的电池供电时间总是很短暂。
他向你咨询,有什么办法在不添加或更换电池的情况下,能够延长电池的供电时间,满足其移动办公的需求。
参考本题图选择正确选项()。
A.通过“设备管理器”进行配置B.通过“驱动程序签名”进行配置C.通过“Windows Update”进行配置D.通过“硬件配置文件”进行配置ANSWER: D16.如本题图所示,微软的官方网站上已经有一个针对Windows XP Professional SP2的更新程序包,你应该选择哪个选项尽快到微软官方网站上获取该更新包?A.更改或删除程序B.添加新程序C.添加/删除Windows组件D.设定程序访问和默认值ANSWER: B26.如本题图所示,小王要将“开始→所有程序→Microsoft Office”中Microsoft Office Excel2003按钮放在自己计算机的任务栏上,他应该采取的最佳操作是()。
A.直接将该按钮拖动到目标位置,然后放开鼠标左键B.先按住CTRL键不放,在讲该按钮拖动到目标位置后放开鼠标左键C.右单击该按钮,选择“发送到任务栏”选项D.右单击该按钮,选择“复制”,然后用鼠标单击任务栏目标位置,选择“粘贴”选项ANSWER: B30.一台计算机安装了Windows XP Professional SP2操作系统,有关桌面快捷图标的正确说法是()。
微软认证模拟试题 Networking Essentials
![微软认证模拟试题 Networking Essentials](https://img.taocdn.com/s3/m/f0d0949df705cc1755270966.png)
微软认证模拟试题 Networking EssentialsQ1. You have a DHCP server and and WINS server.Your are using TCP/IP,You can municate with the work using the IP address, but not when using the servers name.What do you examine first?DHCP server.WINS serverGatewayRouterQ2. Required: Reduce the utilization by 50%Options:Continue growthMaintain new work utilization.Minimize costs. Proposal: Reduce the packet size from 1514 to 576 bytes. Increase the TCP/IP window size from 4096 to 16384. Replace the Cat 3 cables with Cat 5.Required plus all options.Required plus 2 of the options.Required plus none of the options.Not the required.Q3. You want to monitor and manage hubs, bridges and routers on the work. What do you use?Performace MonitorSNMP implementationProtocol analyzerTDRQ4. 3 Servers using NT. 75 Clients using NetBEUI. You want to connect a UNIX work that uses NFS.BridgeBrouterRouterGatewayQ5. You have a work using NetBEUI and TCP/IP. The server and client are in different subs. The client can PING the server, but cannot aess the server using its name.Client and the server have the same IP addressServer has the wrong sub mask.Server’s name not registered with the name server.Client’s name not registered with the name server.Q6. You have a work that uses T1 and is connected to the inter. Which backup connection could you use to support e-mail in the event of failure.T3ATMISDNQ7. You have 3 branches that you want to connect to the main office. The branches will need 150 meters of cable and the distance between the main office and the branches is 20 miles.The solution was to install UTP in the offices and usefiber optic cable between the office and the branches.I chose would not provide the required result.Q8. Which work topology provides guaranteed aess for each puter on the work?A. star.B. bus.C. ring.D. linear.Q9. Your pany's work uses a 100Mbps backbone. Network traffic is nearly at capacity. Users report that work time is slow. You are planning to upgrade the work. Which WAN technology should you implement?A. EtherB. token-ring.C. FDDI.D. X.25.E. ATM.Q10. You manage a work that has 1 NetWare server and 25 Microsoft Windows for Workgroup puters. The NetWare server and the client puters are running IPX/SPX. The NetWare server runs your database. Which type of working is in use on this work? (Choose 2).A. collaborative puting.B. Microsoft NT Domain.C. client/server.D. peer to peer.Q11. You want to manage Microsoft Windows NT server puters that are located on remote sub. All of these servers are configured in a single Windows NT domain. You will managethese servers from another Windows NT server puter that is located in your office. You want to use User Manager and server Manager to manage the remote servers. What should you install and configure to resolve the puter names of the servers? (Choose 2).A. DNS server.B. DHCP server.C. WINS server.D. LMHOSTS file.E. RAS server.Q12. You have Microsoft Windows Workstation 4.0 puter that runs TCP/IP. This puter connects to the Inter by using a modem and a dial-up connection. You want to connect your puter to an Ether work. You install a work adapter card and connect the work adapter to the physical work. Which type of work adapter driver must you install?A. NDIS 2.0.B. NDIS 3.0.C. NDIS 3.1.D. ODI.Q13. Which 2 protocols use connection-oriented munication?A. IPXB. SPXC. TCPD. IPE. UDP Q14. What is a benefit of installing an application server to store and manage a database?A. An application server centrally manages all user aounts.B. An application server stores more data than a file-and-print server does.C. An application server transfers only the results of database queries to client puters.D. An application server transfers the entire database to client puters.Q15. What is a benefit of using an application server instead of a file-and-print server?A. An application server retrieves data and sends data to client puters more efficiently than a file-and-print server does.B. An application server manages file and record locking more efficiently than a file-and-print server does.C. An application server manages user aess to work resources.D. An application server distributes processing among all client puters on the work more efficiently than a file-and-print server does.Q16. This question was long, but it was Select and Place question (Drag & Drop) about token-ring work that uses NWLink protocol.Repeater.Bridge.Router. Drag it to the right.Gateway.Server. Drag it to the left.Q17.. You are assigning a NetBIOS name to 10 of the client puters on your work. Which is a valid NetBIOS name for this puter?A. The name of a share on 1 of the work servers.B. The puter name 1 of the work servers.C. The name of a domain on the work.D. The name of a workgroup on the work. Q18. Which WAN faster than 100Mbps?A. ISDN Basic rate interface.B. X.25.C. T1.D. ATM.Q19. Which device can you use to identify the defective work adapter?A. protocol analyzer.B. volt-ohmmeter.C. optical time domain reflectometer (OTDR).D. time domain reflectometer (TDR).Q20. What is a characteristic of connection-oriented munication?A. It provides fast but unreliable delivery of datagrams.B. It provides assurance of packet delivery.C. It uses store-and-forward techniques to move datagrams between puters.D. It uses message-oriented munication for processing e-mail.Q21.. What must you ensure that a NetBIOS name does not duplicated?A. Computer name on the same work.B. Domain name on the same work.C. Workgroup name on the same work.D. Share name on the same work.Q22. You are designing a peer-to-peer work that consists of 5 Microsoft Windows 95 puters. Which protocol should you use?A. DLC.B. NFS.C. NWLink IPX.D. XNS.Q23.. You configure your RAS Server to use DHCP to assign TCP/IP addresses. The Windows NT Workstation Computers are configured to receive IP addresses from de-server. Which additional configuration setting or settings for the workstations can you manage?A. Default gateway addresses.B. Default FTP addresses.C. DNS addresses.D. WINS server addresses.E. Mail server addresses.Q24. What is a benefit of both NDIS and ODI?A. They allow work adapters to be used in any pliant puter.B. They allow work adapters to transmit information over a greater distance than non-pliant work adapters can.C. They allow work adapters to municate with other pliant work adapters.D. They allow work adapters to be independent of any particular transport protocol.Q25. You are designing a security plan for your work. The following table summarizes the current work configuration.Server: 2 total - both run Microsoft Windows NT server, 1is the PDC and 1 is the BDC.Client Computers: 100, which run Microsoft Windows 95Network Type: 10BaseT EtherRequired result:You must have centralized control of aess to shared resources.Optional desired results:You want to track all aess and attempted aess to shared resources.You want to track attempts to guess user passwords.You want to implement a method to protect user aounts from password-breaking programs.Proposed solution:Implement NTFS with user-level security on all servers. Set appropriate aess-control security on all shared resources. Require users to change their passwords every 40 days. Implement disk striping with parity on all servers. Perform daily tape backups, and store tapes in a secure off-site location.Which results does the proposed solution produce?A. The proposed solution produces the required result and produces all of the optional desired results.B. The proposed solution produces the required result and produces only 1 of the optional desired results.C. The proposed solution produces the required result but does not produce any of the optional desired results.D. The proposed solution does not produce the required result.Q26.. You want to connect your Ether and token-ring works. Both works use NWLink IPX. You want to use IPX addressing to limit the amount of traffic between the 2 works. Which device should you use?A. repeater.B. bridge.C. router.D. gateway.Q27. Network monitoring shows that work utilization has grown from 30 percent to 70 percent of maximum capacity inthe past year. You will add 24 client puters and 1 server within 3 months. You want to reduce work utilization.Required result:You must reduce work utilization by 50 percent.Optional desired results:You want to allow for continued work growth.You want to maintain the new work utilization levels even after the planned additions to the work are implemented.You want to minimize costs for the project.Proposed solution:Change the maximum packet size on all of the puters from 1,514 bytes to 576 bytes. Replace all Category 3 UTP cable with Category 5 UTP cable. Increase TCP window size from 4,096 bytes to 16,384 bytes.Which results does the proposed solution produce?A. The proposed solution produces the required result and produces all of the optional desired results.B. The proposed solution produces the required result and produces only 2 of the optional desired results.C. The proposed solution produces the required result but does not produce any of the optional desired results.D. The proposed solution does not produce the required result.Q28.. Which data link munications protocol provides connections between puters via dial-up telephone lines? (Choose all that apply)A. SLIP.B. PPP.Q29. What can enable client puters to browse NetBIOS names on all subs of the work?A. WINS server.B. DHCP server.C. router.D. NetBIOS broadcast.Q30. You are designing a 100-Mbps work. Which media should you use?A. RG-58 A/U coaxial cableB. spread-spectrum radioC. Category 5 UTP cableD. Type 1 STP cableQ31.. You connect a client puter to a work that uses NWLink IPX. The client puter is not able to aess any work resources. After investigation, you decide that hardware is not causing the problem. What is the most likely cause of the problem?A. incorrect sub mask on the client puterB. incorrect IP address on the client puterC. incorrect frame type on the client puterD. corrupted WIN.INI file on the client puterQ32. Barbara's remote puter can be aessed via dial-up telephone lines. The puter is 5 years old and uses TCP/IP as its only transport protocol. The data link munications protocol used by the puter cannot provide automatic IP addressing. Which data link munications protocol is Barbara's puter using?A. DLC.B. SLIP.C. PPP.模板,内容仅供参考。
微软认证模拟试题:TCPIP考题
![微软认证模拟试题:TCPIP考题](https://img.taocdn.com/s3/m/46dd4cf20740be1e640e9ac9.png)
Question 1. Under Windows NT, what command would you use if you wanted to trace a packet from its source host to a destination host?A. TRACERTB. ROUTEC. NBTSTATD. IPCONFIGThe TRACERT utility is Microsoft's own, used to trace a packet from its source ( your computer ) to a destination host ( a remote computer ).Question 2. If you wanted to display all entries in the ARP cache, which of the following utilities would you use?A . ARP - GB. ARP - EC. ARP - DD. ARP - STo display all entries in the ARP ( Address Resolution Protocol ) cache, you would use the ARP utility with the -G or - A switch. They are the same thing. To get the answer type "arp /?" at the command prompt.ARP ( Address Resolution Protocol ) is used to obtain hardware ( MAC = Media Access Control ) addresses for communications with a destination host.Question 3. You notice that the subnet mask is on your Windows NT computer while using the IPCONFIG utility at the command prompt to check for IP address configuration. What does it mean when the IPCONFIG utility displays a subnet mask of ?A. The default gateway on your computer does not match the default gateway of the network.B. Your computer has the same subnet mask as another computeron the network.C. Your computer does not have the correct IP address class specified for it.D. Your computer has the same IP address as another computeron the network.The most likely cause in this scenario is that your computerhas the same IP address as another computer in the network. When this happens, running IPCONFIG will yield an IP address ofQuestion 4. If you want to copy files from one Windows NT computer to another, what TCP / IP utility would you use?A . RCPB. REXECC. TELNETD. TRACERTThe RCP ( Remote Copy ) is Microsoft's own TCP / IP utility.It is used to copy files from a source Windows NT computer to a destination ( remote ) Windows NT computer, or vice-versa. Type "rcp /?" at the command prompt to get the command's full syntax.Question 5. Use the following diagram to answer this question :You are working on your Windows NT workstation, SMALLNT, and you would like to communicate with another Windows NT computer, BIGNT. If both computers are on the same local subnet , where does SMALLNT look for the hardware address of the destination host? ( BIGNT in thiscase )A. In its own ARP cache.B. In the ARP cache of the destination host, BIGNT in this case.C. If there is a DHCP server present , then in the ARP cacheof the DHCP server.D. In the LMHOSTS or HOSTS file of the source computer.The ARP protocol ( and NOT the ARP command ) is used to map IP addresses to hardware addresses ( MAC addresses ). Anytime you communicate with a destination host that is on the same subnet( locally ), then the hardware address of the destination host is obtained from the source host's LOCAL ARP cache. In this scenario, BIGNT's hardware address is obtained from SMALLNT's own ARP cache since both computers are on the same network.Question 6. You have a print device connected to a server running the LPD service. From your Windows NT computer, you wouldlike to obtain the status of the print device. What utility would you use to achieve the task?A. LPDB. NET USEC. LPQD. GETDAEMONThe LPD ( Line Printer Daemon ) is a TCP / IP printing service.A print server that has a TCP / IP print device connected to it must have the LPD service installed on it. However, to obtain the statusof a TCP / IP print device ( or print queue as it is often called in the TCP / IP circle ), you would use the LPQ command.Type "lpq /?" at the command prompt to get the proper syntax. Pay close attention to the "-S" and "-P" switches. For the "-S" switch, you can specify the NAME or IP address of the print server running the LPD service.Question : Under Windows NT Server , how do you install the LPD service?Answer : Under Windows NT, the LPD service is known as "Microsoft TCP / IP Printing" ===> right-click Network Neighborhood | Properties | Services tab | Add... | "Microsoft TCP / IP Printing" service.Question 7. Let's say that you want to run a process on aremote host that is using the REXEC service, what Microsoft TCP / IP utility would you use?A. RCPB. REXECC. TELNETD. FTPThe REXEC ( Remote Execute ) command is Microsoft's home-grown utility used to run processes on a remote computer that is also running the REXEC service. Type "rexec /?" at the command prompt to get the full syntax.Question 8. If you want to retrieve system information from a remote host running the Finger service, what TCP / IP utility would you use?A. REXECB. PINGC. RCPD. FINGERThe FINGER utility is used to obtain system information from a remote host that is using the Finger service. To get the proper syntax, type "finger" at the command prompt.Question 9. Let's say that you want a DHCP client to give up its lease with a DHCP server, what command would you use to accomplish the task?A. ipconfig / endleaseB. ipconfig / releaseC. route / releaseD. route / endleaseThe IPCONFIG / RELEASE command is used to send a DHCPRELEASE message from a DHCP client to a DHCP server. The DHCPRELEASE messagespecifies that a client wishes to give up its current lease with the DHCP server. Type, "ipconfig /?" at the command prompt to display all the switches of the utility.Question 10. You would like to see a list of NetBIOS computer names that have been resolved into IP addresses on your Windows NT computer. Which of the following utilities would you use?A. ARPB. NetBIOSC. NETSTATD. NBTSTATYou can use the "nbtstat" utitliy to view all NetBIOS computer names that have been resolved into IP addresses. To see the NetBIOS local name table of your workstation, use "nbtstat -n."。
微软认证考试资料
![微软认证考试资料](https://img.taocdn.com/s3/m/b92c7c1b3968011ca3009143.png)
1、question 1You work as the application developer at . uses Visual 2005 as its application development platform.你在做应用程序开发人员,使用VS2005作为其应用程序的开发平台。
You are developing a .Net Framework 2.0 application used to store a type-safe list of names and e-mail addresses.你正在开发一个.Net Framework 2.0应用程序,用来存储一个包含了姓名和电子邮件的类型安全的列表(清单)。
The list will be populated all at once from the sorted data which means you well not always need to perform insertion or deletion operations on thd data.这个列表会被完全的填充从排序的数据,这就意味着你不需要经常对这些数据完成插入或删除操作。
You are required to choose a data structure that optimizes(优化) memory use and has good performance.请你选择一个数据结构,以便优化内存使用,具有良好的性能。
What should you do?该如何做?A、The System.Collections.Generic.SortedList class should be usedB、The System.Collections.HashTable class should be usedC、The System.Collections.Generic.SortedDictionary class should be usedD、The System.Collections.SortedList class should be used点评:SortedList 表示键/值对的集合,这些键值对按键排序并可按照键和索引访问。
2022微软认证试卷试题
![2022微软认证试卷试题](https://img.taocdn.com/s3/m/f59f546d2bf90242a8956bec0975f46527d3a783.png)
2022微软认证试卷试题2022微软认证试卷试题一、判断题(共50题,共100分)1.对于企业来说,给用户进行各种促销或者实施运营策略的时机也比较重要,而且对不同兴趣偏好的用户最好集中处理。
2.啤酒与尿布的经典案例,充分体现了实验思维在大数据分析理念中的重要性。
3.简单随机抽样,是从总体N个对象中任意抽取n个对象作为样本,最终以这些样本作为调查对象。
在抽取样本时,总体中每个对象被抽中为调查样本的概率可能会有差异。
4.信息生命周期管理是据生命周期管理的来源,最早由英国企业提出。
5.决策树是一种基于树形结构的预测模型,每一个树形分叉代表一个分类条件,叶子节点代表最终的分类结果,其优点在于易于实现,决策时间短,并且适合处理非数值型数据。
6.在噪声数据中,波动数据比离群点数据偏离整体水平更大。
7.对于大数据而言,最基本、最重要的要求就是减少错误、保证质量。
因此,大数据收集的信息量要尽量精确。
8.一般而言,分布式数据库是指物理上分散在不同地点,但在逻辑上是统一的数据库。
因此分布式数据库具有物理上的独立性、逻辑上的一体性、性能上的可扩展性等特点。
9.具备很强的报告撰写能力,可以把分析结果通过文字、图表、可视化等多种方式清晰地展现出来,能够清楚地论述分析结果及可能产生的影响,从而说服决策者信服并采纳其建议,是数据分析能力对大数据人才的基本要求。
10.谷歌流感趋势充分体现了数据重组和扩展对数据价值的重要意义。
11.奥巴马认为,对大数据的占有与控制,反映的是一个国家的核心能力之大小。
因此,他已经将大数据上升到国家战略高度。
12.移动互联网实现了人人相连、人物相联、物物相连。
13.林雅华博士指出,目前中国的是一个复杂社会,是一个转型社会。
14.《促进大数据发展行动纲要》指出,要加快政府数据开放共享,推动资源整合,提升治理能力。
15.中远物流有100多个配送中心,装GPS的上万辆车每月产生2亿条信息,据此优化运输路线,减排10%。
Networking Essentials(1)-微软认证试题
![Networking Essentials(1)-微软认证试题](https://img.taocdn.com/s3/m/d272f7450975f46526d3e194.png)
Networking Essentials(1)-微软认证试题Q1. You have a DHCP server and and WINS server.Your are using TCP/IP,You can communicate with the network using the IP address, but not when using the servers name.What do you examine first?DHCP server.WINS serverGatewayRouterQ2. Required: Reduce the utilization by 50%Options:Continue growthMaintain new network utilization.Minimize costs.Proposal: Reduce the packet size from 1514 to 576 bytes. Increase the TCP/IP window size from 4096 to 16384. Replace the Cat 3 cables with Cat 5.Required plus all options.Required plus 2 of the options.Required plus none of the options.Not the required.Q3. You want to monitor and manage hubs, bridges and routers on the network.What do you use?Performace MonitorSNMP implementationProtocol analyzerTDRQ4. 3 Servers using NT. 75 Clients using NetBEUI. You want to connect a UNIX network that uses NFS.BridgeBrouterRouterGatewayQ5. You have a network using NetBEUI and TCP/IP. The server and client are in different subnets. The client can PING the server, but cannot access the server using its name.Client and the server have the same IP addressServer has the wrong subnet mask.Server’s name not registered with the name server.Client’s name not registered with the name server.Q6. You have a network that uses T1 and is connected to the internet. Which backup connection could you use to support e-mail in the event of failure.T3ATMISDN?Q7. You have 3 branches that you want to connect to the main office. The branches will need 150 meters of cable and the distance between the main office and the branches is 20 miles.The solution was to install UTP in the offices and use fiber optic cable between the office and the branches.I chose would not provide the required result.Q8. Which network topology provides guaranteed access for each computer on the network?A. star.B. bus.C. ring.D. linear.Q9. Your company's network uses a 100Mbps backbone. Network traffic is nearly at capacity. Users report that network time is slow. You are planning to upgrade the network. Which WAN technology should you implement?A. EthernetB. token-ring.C. FDDI.D. X.25.E. ATM.Q10. You manage a network that has 1 NetWare server and。