When should you create a role? ()
第1题:
In which two situations should you run the command sync group?() (Choose two.)
第2题:
You want to create a role to meet these requirements: 1:The role is to be protected from unauthorized usage. 2:The password of the role is not to be embedded in the application source code or stored in a table. Which method would you use to restrict enabling of such roles()
第3题:
You need to perform these tasks: 1. Create and assign a MANAGER role to Blake and Clark 2. Grant CREATE TABLE and CREATE VIEW privileges to Blake and Clark Which set of SQL statements achieves the desired results?()
第4题:
.Your companys virtual environment includes Windows Server 2008 R2 Hyper-V servers. You manage the environment by using Microsoft System Center Virtual Machine Manager (VMM) 2008 R2. You need to provide a user with the ability to perform only the Create, Delete, Start, Stop, Pause, Resume, and Shut Down virtual machine (VM) management tasks on your host servers . What should you do?()
第5题:
You manage Hyper-V host servers and virtual machines (VMs) by using Microsoft System Center Virtual Machine Manager (VMM) 2008 R2. Developers are members of an AD security group named Development. You need to ensure that on a specific host server, members of the Development group can perform only the Create,Modify,and Remove VM management tasks. What should you do?()
第6题:
You are designing a Windows Azure application that will use a worker role. The worker role will create temporary files. You need to recommend an approach for creating the temporary files that minimizes storage transactions. What should you recommend?()
第7题:
You have an Exchange 2010 organization.You have an administrative user named Admin1.You need to ensure that Admin1 can move mailboxes in the organization.The solution must assign the minimum amount of permissions to Admin1. What should you do?()
第8题:
Your company has a main office and a branch office. All branch office administrators are members of a custom management role group.The role group is configured to allow members to manage recipients.The branch office administrators are also members of The Domain Admins security group. The organization contains one Exchange Server 2010 server. You discover that the branch office administrators can manage recipients in both offices. You need to ensure that the branch office administrators can manage recipients in their assigned branch office only.What should you do?()
第9题:
CREATE ROLE manager; GRANT create table, create view TO manager; GRANT manager TO BLACK, CLARK;
CREATE ROLE manager; GRANT create table, create voew TO manager; GRANT manager ROLE TO BLACK, CLARK;
GRANT manager ROLE TO BLACK, CLARK; GRANT create table, create voew TO BLACK CLARK; ***MISSING***
第10题:
You should create a discover image
You should create an install image
You should create a capture image
You should create a CD-ROM that contains PXE drivers
第11题:
When Windows Azure initializes the worker role instance.
When the worker role instance receives its first request.
When the worker role instance instantiates the WCF service.
When the worker role instance enters the main execution thread.
第12题:
Create the files on a Windows Azure Drive.
Create the files in Windows Azure local storage.
Create the files in Windows Azure Storage page blobs.
Create the files in Windows Azure Storage block blobs.
第13题:
You are designing a Windows Azure application. The application includes two web roles and three instances of a worker role. The web roles will send requests to the worker role through one or more Windows Azure Queues. You have the following requirements: - Ensure that each request is processed exactly one time. - Minimize the idle time of each worker role instance. - Maximize the reliability of request processing. You need to recommend a queue design for sending requests to the worker role. What should you recommend?()
第14题:
You want to create a role to meet these requirements: 1. The role is to be protected from unauthorized usage. 2. The password of the role is not to be embedded in the application source code or stored in a table. method would you use to restrict enabling of such roles()
第15题:
You work as the IT professional in an international company which is named Wiikigo. You are experiencedin implementing and administering a network operating system. You are specialized in deploying servers,configuring Windows Server 2008 Terminal services and network application services,and configuring aweb services infrastructure. You have the Windows Deployment Services (WDS) role installed on a serverthat runs Windows Server 2008. You plan to install Windows Vista on a computer that does not supportPreboot Execution Environment (PXE). You have a Windows Vista image that is stored on the WDS server. You have to start the computer and install the image that is stored on the WDS server. What should you create?()
第16题:
You are planning the migration of an existing application to Windows Azure and SQL Azure. The application produces report files at the request of remote systems. Requests for report files will be placed into a single Windows Azure Queue. You must minimize the compute resources and storage transactions required to process the requests. You need to recommend an approach for processing the requests. What should you recommend?()
第17题:
You have an Exchange Server 2010 organization.You need to use Role Based Access Control (RBAC) to provide a user the ability to manage recipients in a specific organizational unit (OU). What should you do first?()
第18题:
Your company has a main office and a branch office.The branch office administrators are the only members of a custom management role group.The role group is configured to allow members to manage recipients. You notice that the branch office administrators can manage recipients in both offices.You need to ensure that the branch office administrators can manage recipients in the branch office only. What should you do?()
第19题:
You plan to host a Windows Communication Foundation (WCF) service in a Windows Azure worker role. Custom code is necessary to initialize and configure the service endpoint. You need to recommend the point at which the application should initialize the WCF service. What should you recommend?()
第20题:
Create a worker role for each report file that constantly polls the queue for requests.
Create a workerrole for each report file that checks the queue at scheduled intervals for requests.
Create a single worker role that constantly polls the queue for requests and executes the requests on multiple threads.
Create a single worker role that checks the queue at scheduled intervals for requests and executes the requests on multiple threads.
第21题:
Implement a RADIUS request attribute policy to assist with realm selection and create different role-mapping rules for the user in each realm.
Implement a directory/attribute server on the realm and set up this server to determine by group membership the proper role to which a user should be mapped.
Reorder the role-mapping rules to allow for the more open role to be mapped first and then enable the stop processing rules when this rule matches function on this role.
Implement a Host Checker policy on the realm that determines the geographic location of the device and restricts the user based on the results of the policy.
第22题:
Add the DNS Server role.
Join the server to the domain.
Add the Web server (IIS) role and the AD CS role.
Add the Active Directory Lightweight Directory Service (AD LDS) role.
第23题:
Pass the user names and passwords to Membership.ValidateUser.
Pass the role names to User.IsInRole.
Pass the role names to Roles.RoleExists.
Pass the user names to Membership.GetUser.
第24题:
To simplify the process of creating new users using the CREATE USER xxx IDENTIFIED by yyy statement.
To grant a group of relate privileges to a user.
When the number of people using the database is very high.
To simplify the process of granting and revoking privileges.
To simplify profile maintenance for a user who is constantly traveling.