You are the administrator of two Microsoft Windows 2000 computers. One computer is running Internet Information Services (IIS), and the other is running SQL Server 2000. Company partners need to connect by means of the Internet and query data stored on the SQL Server computer. Some of these partners have computers that do not use Microsoft operating systems or Web browsers.
You need to configure the IIS and SQL Server 2000 computers to allow access to data by means of the IIS virtual directory. IIS uses Basic Authentication to allow access to the virtual directory.
Only company partners should have access to the SQL Server computer by means of the Internet. The partners should not be allowed to make ad hoc queries. You want to be able to audit successful and failed logins to the SQL Server computer.
You want to allow the partners access to the SQL Server computer while keeping your security scheme as simple as possible. Which two actions should you take? (Each correct answer represents part of the solution. Choose two.)
A.Configure the IIS virtual directory to allow URL queries.
B.Configure the IIS virtual directory to allow template queries.
C.Create a new Windows user account. Create a corresponding Windows Authenticated login on the SQL Server computer. Configure the IIS virtual directory to always use this login when connecting to the SQL Server computer.
D.Create a Windows Authenticated login on the SQL Server computer for the IIS Internet Guest Account. Configure the IIS virtual directory to always use the Internet Guest Account when connecting to the SQL Server computer.
E.Create a Windows Authenticated login for each company partner on the SQL Server computer. Configure the IIS virtual directory to use Windows Integrated Authentication when connecting to the SQL Server computer.
第1题:
You are the administrator of a SQL Server 2000 computer. The server contains confidential information about contracts on which your company has placed bids.
Company policy requires that bid information be removed permanently from the database one year after the bid closes. You need to comply with this policy and minimize server overhead.
What should you do?
A.Create a Data Transformation Services (DTS) package to remove bids that have a closing data older than one year.
B.Create a trigger to delete any bids that have a closing data older than one year. Bind the trigger to the bids table for all INSERT, UPDATE, and DELETE events.
C.Create a stored procedure to delete any bids that have a closing data order than one year. Use SQL server agent to schedule the stored procedure to run every night.
D.Create a view that contains a WHERE clause to exclude bids that have a closing date older than one year.
第2题:
You are the administrator of two Microsoft Windows 2000 advanced server computers. On these servers, you are configuring a database that will store accounting information for your company.
The data must be available at all times. Interruptions in data connectivity should not last longer than five minutes. Any changes to the database should not require you to reconfigure the client computers.
How should you configure the database?
A.Configure the database on the two servers as a SQL Server 2000 cluster.
B.Configure the database on one server, and then configure a standby database on the second server.
C.Configure the database on each server. Use Microsoft Distributed Transaction Coordinator to keep the two servers perfectly synchronized.
D.Configure the database as a federated database, and then partition half the data on each server.
第3题:
You are the administrator of the Coho Vineyard network. The network consists of 10 Windows 2000 Advanced Server computers and 250 Windows 2000 Professional computers.
Your company has two domains cohovineyard.com and westcoastsales.com.
The company's intranet site is on a Windows 2000 Advanced Server computer named ServerA. ServerA is in the cohovineyard.com domain and is running Internet Information Services (IIS) and Microsoft Proxy Server 2.0
You want to configure the Windows 2000 Professional computers in the westcoastsales.com domain to access the intranet site. You want users to be able to connect to the intranet site by using the URL http://serverA rather than its fully qualified domain name.
What should you do?
A.Add cohovineyard.com to the Domain Suffix Search Order on the computers.
B.Add westcoastsales.com to the Domain Suffix Search Order on the computers.
C.Add westcoastsales.com to the exceptions list in the proxy server settings on the computers.
D.Configure the proxy server settings on the computers to bypass the proxy server for intranet addresses.
第4题:
You are the network administrator for Company. Company’s network consists of 200 Windows 2000 Professional computers. CompanyW1 is a Windows 2000 Server computer that hosts Company’s intranet site. CompanyP1 is a computer running Microsoft Proxy Server that is used by all computers on the network to access the Internet. You discover that CompanyP1 is experiencing performance degradation due to large number of requests to authenticate with the proxy server. You want to minimize the number of authentication requests to the proxy server. What should you do on each computer?()
第5题:
You are the administrator of a SQL Server 2005 computer named SQL1. All servers run Microsoft Windows Server 2003 and belong to a Microsoft Active Directory domain. The companys written security policy mandates strong passwords for all domain, local, and application accounts. The appropriate domain password policy has been deployed through the use of a Group Policy object (GPO). Many of the company’s computers run MS-DOS-based or UNIX-based operating systems. These computers require varying levels of access to a database named Services on SQL1. You need to ensure that these computers can access the Services database without violating the company’s written security policy. What should you do?()
第6题:
You need to design the consolidation plan for SQL1, SQL2, and SQL3. You need to identify the appropriate combination of SQL Server instances and SQL Server 2005 computers that are needed to fulfill the company’s consolidation plans and security requirements.Which combination should you use?()
第7题:
You are a network administrator for your company. You manage a computer named Server6 that runs Windows Server 2003 with the default settings.You install Terminal Services on Server6. You attempt to connect to Server6 by using the URLhttp://Server6/Tsweb. You cannot connect to Server6. You need to be able to access Terminal Services on Server6 by using Internet Explorer 6.0.Which two actions should you perform? ()(Each correct answer presents part of the solution. Choose two.)
第8题:
You work as a network Exchange administrator at Company.com.The Company.com network currently consists of a single Active Directory forest containing a single domain named Company.com.The Company.com organization makes use of Microsoft Exchange Server as their messaging solution.During the course of the business week you receive instruction from Company.com to install the Microsoft Exchange Server 2010 management tools on a computer running Microsoft Windows 7. What should you do?()
第9题:
Certkiller .com has a software evaluation lab. There is a server in the evaluation lab named as CKT. CKT runs Windows Server 2008 and Microsoft Virtual Server 2005 R2. CKT has 200 virtual servers running on an isolated virtual segment to evaluate software. To connect to the internet, it uses physical network interface card. Certkiller .com requires every server in the company to access Internet. Certkiller .com security policy dictates that the IP address space used by software evaluation lab must not be used by other networks. Similarly, it states the IP address space used by other networks should not be used by the evaluation lab network. As an administrator you find you that the applications tested in the software evaluation lab need to access normal network to connect to the vendors update servers on the internet. You need to configure all virtual servers on the CKT server to access the internet. You also need to comply with company’s security policy. Which two actions should you perform to achieve this task()
第10题:
You are a professional level SQL Server 2005 database administrator in an international corporation named Wiikigo. You are experienced in implementing high-availability solutions, monitoring the database server, and design deployment. In the company, you major job is the deployment, maintenance and support of Microsoft SQL Server 2005. You work as the administrator of a SQL Server 2005 computer, and the computer is named SQL1. Microsoft Windows Server 2003 is run by all servers. All the servers belong to a Microsoft Active Directory domain. According to the company written security policy, strong passwords are mandated for all domain, local, and application accounts. The company utilizes a Group Policy object (GPO) to deploy the proper domain password policy. MS-DOS-based or UNIX-based operating systems are run by many of the company’s computers. Varying levels of access to a database named Services on SQL1 is requested by the computers. Since you are the database administrator, you are required to confirm that the Services database can be accessed by these computers. And the company’s written security policy should not be violated. Which action should be performed by you?()
第11题:
You should consider having the Net.TCP Port Sharing service set to Automatic.
You should consider having Microsoft .NET Framework 3.5.1 and the Internet Information Services (IIS) 6.0 Management console installed first.
You should consider having the Telnet Client installed first.
You should consider having the Exchange Best Practices Analyzer run first.
第12题:
Internet Information Services
SQL Server Browser
SQL Server Agent
Microsoft Distributed Transaction Coordinator
第13题:
You are the administrator of a SQL server computer. The server is running SQL Server 6.5 and SQL Server 7.0.
You install a named instance of SQL Server 2000, and then run the SQL server upgrade wizard. On the database selection screen, some of the SQL Server 6.5 databases are not listed.
You cancel the SQL Server upgrade wizard.
You need to ensure that the SQL Server 6.5 databases are listed in the wizard. What should you do?
A.Uninstall SQL Server 7.0, and then rerun the SQL Server upgrade wizard.
B.Run the Microsoft SQL Server-switch application, and then rerun the SQL Server upgrade wizard.
C.Create a data transformation services package that imports the databases from SQL Server 6.5 to SQL Server 2000, and then execute the package.
D.Uninstall SQL Server 2000, and then reinstall SQL Server 2000 as the default instance.
第14题:
You are the administrator of a SQL Server 2000 computer. Your company uses the server to store service contract information for its customers.
You are also the administrator of Oracle relational database management system (RDBMS) server.
This server is used to store your company’s financial information. The financial information is updated frequently throughout the day.
You need to create a series of reports that combine the service contract information and the financial information. These reports will be updated several times a day.
You want to create reports on the SQL Server computer by using the minimum amount of disk space.
What should you do?
A.Set up SQL server replication to replicate the data from the oracle server to the SQL server computer.
B.Set up the oracle server as a linked server. Create a view that joins the service contract information and the financial information.
C.Set up data transformation services (DTS) package that imports and transforms the database from the oracle server to the SQL server computer. Use SQL server agent to execute the DTS package throughout the day as needed.
D.Set up Microsoft ActiveX script. that connects to the oracle server and imports the financial information into SQL server temporary table. Create a view that joins the service contract information and the temporary table.
第15题:
You are the administrator of Microsoft Windows 2000 computer. You are preparing to install SQL Server 2000 on the computer.
Your company contains a variety of client computers that will connect to the SQL server 2000 computer by using a specific Net-Library, as shown in the following table.
You need to allow the client computers to connect to the SQL Server 2000 computer. You also want to minimize the number of configuration changes required on the client computers.
Which three actions should you take? (Each correct answer presents part of the solution. Choose three)
A. Install SQL Server 2000 as a named instance.
B. Install SQL Server 2000 as the default instance.
C. Configure the new instance for Mixed Mode Authentication.
D. Configure the new instance for Windows Authentication.
E. Configure the server to use the Named Pipes, IPX/SPX, and TCP/IP Net-Libraries.
F. Configure the server to use the Multiprotocol Net-Library.
第16题:
Your application must access data that is located on two SQL Server 2005 computers. One of these servers is named SQL1 and the other is SQL2. You have permissions to create a stored procedure on SQL1 to support your application. However,on SQL2 you only have permissions to select data. You write the stored procedure on SQL1. The stored procedure accesses SQL2 by using the OPENQUERY Transact-SQL statement. However,the query fails when executed.You need to troubleshoot the cause of the error. What should you do?()
第17题:
You are the administrator of the Coho Vineyard network. The network consists of 10 Windows 2000Advanced Server computers and 250 Windows 2000 Professional computers.Your company has two domains cohovineyard.com and westcoastsales.com.The company’s intranet site is on a Windows 2000 Advanced Server computer named Server A. ServerA is in the cohovineyard.com domain and is running Internet Information Services and Microsoft Proxy Server2.0 You want to configure the Windows 2000 Professional computers in the westcoastsales.com domain to ccess the intranet site. You want users to be able to connect to the intranet site by using the URL http://serverA rather than its fully qualified domain name. What should you do?()
第18题:
You are the network administrator for your company. The network consists of a single Active Directory domain. All servers run Windows Server 2003. All client computers run either Windows XP Professional or Windows 2000 Professional. All client computer accounts are located in an organizational unit (OU) named Workstation. A written company policy states that the Windows 2000 Professional computers must not use offline folders. You create a Group Policy object (GPO) to enforce this requirement. The settings in the GPO exist for both Windows 2000 Professional computers and Windows XP Professional computers. You need to configure the GPO to apply only to Windows 2000 Professional computers. What are two possible ways to achieve this goal?()
第19题:
You are a professional level SQL Server 2005 database administrator in an international corporation named Wiikigo. You are experienced in implementing high-availability solutions, monitoring the database server, and design deployment. In the company, you major job is the deployment, maintenance and support of Microsoft SQL Server 2005. You work a database administrator for your company. There is a Data Transformation Services (DTS) package, and the DTS package is stored in SQL Server 2000. And you plans to have the SQL Server 2000 migrated into SQL Server 2005. The DTS package dynamically configures precedence constraints by utilizing complex Microsoft Visual Basic Scripting Edition (VBScript). The SQL Server 2005 Package Migration Wizard is run by you, but the wizard cannot convert the package from SQL Server 2000 to SQL Server 2005. You are required to make sure that the DTS package runs in SQL Server 2005. And the package should be run in the shortest time. Which action should be utilized?()
第20题:
You are the network administrator for. The network consists of a single Active Directory forest that contains two domains. You have not modified the default Active Directory site configurations. The functional level of both domains is Windows 2000 native. Servers run either Windows Server 2003 or Windows 2000 Server. TestKing's internal domain is named testking.local. Testking's external domain is named . The external domain is accessed only by TestKing's business partners. You install a Windows Server 2003 computer named Testking7 in the domain. You install and configure Terminal Services on Testking7. Testking7 is configured as a member server in the domain. You install a secure database application on Testking7 that will be accessed by TestKing's business partnersA few months later, users report that they can no longer establish Terminal Services session to Testking7. You verify that only the default ports for HTTP, HTTPS, and Terminal Services on your firewall are open to the Internet. You need to ensure that TestKing's business partners can establish Terminal Services sessions to Testking7. What are two possible ways to achieve this goal?() (Each correct answer presents a complete solution. Choose two)
第21题:
You want to connect to your branch office printer through the browser. Your Windows 2000 Professional computer is running Peer Web Server. You were told the share name of the printer is HPColorL. You are unable to see it when you type its URL. What do you need to do to connect to this printer? ()
第22题:
You are a database administrator for your company. You are configuring a new SQL Server 2005 computer named SQL1. SQL1 will run Reporting Services. It will also be configured to automatically perform database backups and other maintenance tasks. There are no other SQL Server computers in the network environment. All access to SQL1 will be made by using SQL1s DNS name. You need to disable any unnecessary services on SQL1. Which service or services should you disable?()
第23题:
A domain account should be created for each of the company’s users. And then, each domain account should be offered with access to SQL1 and the Services database.
A local logon account should be created on SQL1 for each of the company’s users. And then, each logon account should be offered with access to SQL1 and the Services database.
One SQL Server logon account should be created for all of the company’s computers running MS-DOS or UNIX-based operating systems. And then, the Enforce password policy option should be enabled for users’ accounts. At last, the logon accounts should be provided with access to the Services database.
A SQL Server logon account should be created for each of the company’s users. And then, the Enforce password policy option should be enabled for each logon account. At last, each logon account should be offered with access to the Services database.
A virtual directory should be configured through Internet Information Services (IIS) for access to SQL1. And then, users should be directed to the virtual directory for data access.