logo

CuriousTab

CuriousTab

Discussion


Home Certification Microsoft Certification Comments

  • Question
  • You have a computer named Computer1 that runs Windows 7. You need to ensure that Computer1 can connect to File Transfer Protocol (FTP) servers only while it is connected to a private network. What should you do?


  • Options
  • A. From Windows Firewall with Advanced Security, create a new rule.
  • B. From the local Group Policy, modify the application control policies.
  • C. From Windows Firewall, modify the Allowed Programs and Features list.
  • D. From Network and Sharing Center, modify the Advanced Sharing settings.

  • Correct Answer
  • From Windows Firewall with Advanced Security, create a new rule. 


  • Microsoft Certification problems


    Search Results


    • 1. You develop an inventory management application called XYZManagement that will call a Microsoft SQL Server stored procedure named sp_GetDailyXYZSales. The stored procedure will run a query that returns your daily sales total as an output parameter. This total will be displayed to users in a message box. Your application uses a SqlCommand object to run sp_GetDailyXYZSales. You write the following code to call sp_GetDailyXYZSales: SqlConnection cnn = new SqlConnection(myConnString); SqlCommand cmd = new SqlCommand(?sp_GetDaily XYZ Sales?, cnn); cmd.CommandType = CommandType.StoredProcedure; SqlParameter prm = cmd.Parameters.Add(?@ItemTotal?,SqlDbType.Int); prm.Direction = ParameterDirection.Output; cnn.Open(); cmd.ExecuteNonQuery(); Now you must write additional code to access the output parameter. Which code segment should you use?

    • Options
    • A. MessageBox.Show(?Total is: ? + cmd.Parameters[?@Output?].Value.ToString());
    • B. MessageBox.Show(?Total is: ? + cmd.Parameters[?@Output?].ToString());
    • C. MessageBox.Show(?Total is: ? + cmd.Parameters[?@ItemTotal?
    • D. MessageBox.Show(?Total is: ? + cmd.Parameters[?@ItemTotal?
    • Discuss
    • 2. You develop an enterprise application, called XYZApplication that includes a Windows Form presentation layer, middle-tier components for business logic and data access, and a Microsoft SQL Server database. You are in the process of creating a middle-tier component that will execute the data access routines in your application. When data is passed to this component, the component will call several SQL Server stored procedures to perform database updates. All of these procedure calls run under the control of a single transaction. The code for the middle-tier component will implement the following objects: SqlConnection cn = new SqlConnection(); SqlTransaction tr; If two users try to update the same data concurrently, inconsistencies such as phantom reads will occur. You must now add code to your component to specify the highest possible level of protection against such inconsistencies. Which code segment should you use?

    • Options
    • A. tr = cn.BeginTransaction(?ReadCommitted?);
    • B. tr = cn.BeginTransaction(IsolationLevel.ReadCommitted);
    • C. tr = cn.BeginTransaction(IsolationLevel.Serializable);
    • D. tr = cn.BeginTransaction(?Serializable?);
    • Discuss
    • 3. You use Visual Studio .NET to create an assembly, called XYZAssembly, that will be used by other applications, including a standard COM client application. You must deploy your assembly on the COM application to a client computer. You must ensure that the COM application can instantiate components within the assembly as COM components. What should you do?

    • Options
    • A. Create a strong name of the assembly by using the Strong Name tool (Sn.exe).
    • B. Generate a type library for the assembly by using the Type Library Importer (Tlbimp.exe). Register the file on the client computer.
    • C. Generate a registry file for the assembly by using the Assembly Registration tool (Regasm.exe) Register the file on the client computer.
    • D. Deploy the assembly to the global assembly cache on the client computer. Add a reference to the assembly in the COM client application.
    • Discuss
    • 4. You create an assembly by using Visual Studio .NET. The assembly is responsible for writing and reading order entry information to and from an XML data file. The assembly also writes and reads values to and from the Windows registry while it is being consumed. The assembly will be distributed to client computers by using your company, XYZ, intranet. All client computers are configured to implement the default .NET security policy. You need to implement security in the assembly. What should you do?

    • Options
    • A. Implement declarative security and execute the permission demand to allow access to the file system and Windows registry.
    • B. Implement declarative security and execute the minimum permission request to allow access to the file system and Windows registry.
    • C. Implement imperative security and execute the permission demand to allow access to the file system and Windows registry.
    • D. Implement imperative security and execute the minimum permission request to allow access to the file system and Windows registry.
    • Discuss
    • 5. You use Visual Studio .NET to create a Windows-based application. The application includes a form named XYZProcedures (EXP). EXP allows users to enter very lengthy text into a database. When users click the Print button located on EXP, this text must be printed by the default printer. You implement the printing functionality by using the native .NET System Class Libraries with all default settings. Users report that only the first page of the text is being printed. How should you correct this problem?

    • Options
    • A. In the BeginPrint event, set the HasMorePages property of the PrintEventArgs object to True.
    • B. In the EndPrint event, set the HasMorePages property of the PrintEventArgs object to True.
    • C. In the PrintPage event, set the HasMorePages property of the PrintPageEventArgs object to True.
    • D. In the QueryPageSettings event, set the HasMorePages property of the QueryPageSettingEventArgs object to True.
    • Discuss
    • 6. How many-shares of market value RS.25 each can be purchased for Rs.12750, brokerage being 2% ?

    • Options
    • A. Rs.450
    • B. Rs.500
    • C. Rs.550
    • D. Rs.600
    • Discuss
    • 7. You are the database administrator for a financial services company. Employees enter data 24 hours a day into a SQL Server 2000 database. These employees report slower response times when new account information is gathered from branch offices and added to the database. You currently use the following BULK INSERT statement to add the account information.BULK INSERT finance.dbo.customersFROM 'd:bulkaccts143_10142000.txt'WITH DATAFILETYPE = 'char', FIELDTERMINATOR = 't', ROWTERMINATOR = 'n', TABLOCK You want to ensure that response times do not slow when new account information is added to the database. What should you do?

    • Options
    • A. Add the BATCHSIZE option to the BULK INSERT statement, and then set the option equal to 10 percent of the number of rows to be loaded.
    • B. Add the ROWS_PER_BATCH option to the BULK INSERT statement, and then set the option equal to 10 percent of the number of rows to be loaded.
    • C. Drop the indexes for the Customers table before the data load, and then re-create the indexes after the data load is complete.
    • D. Remove the TABLOCK option from the BULK INSERT statement.
    • Discuss
    • 8. You are the administrator of a SQL Server 2000 computer. The server contains a database named FinanceData that is used by a client/server application. Each employee has a SQL Server login that the application uses to access the server.Your company hires a new employee named Andrew. You create a SQL Server login named Andrew. You also create a database user named Andrew in the database and grant the database user full permissions in the database.Whenever Andrew runs the client/server application, he receives the following error message: "Invalid object name." Andrew also reports that he cannot access the database by using the application.You need to ensure that Andrew can use the application. Which Transact-SQL statement should you execute?

    • Options
    • A. EXEC sp_defaultdb 'Andrew','FinanceData'
    • B. GRANT ALL ON FinanceData TO Andrew
    • C. EXEC sp_addlogin 'Andrew'
    • D. EXEC sp_grantdbaccess 'FinanceData','Andrew'GOsp_addrolemember 'db_datareader','Andrew'
    • Discuss
    • 9. You are the administrator of a Microsoft Windows NT Server 4.0 computer. The server is the PDC in your domain and also runs SQL Server 2000. The server has four processors and 1 GB of RAM.Your network consists of 500 client computers that are running Microsoft Windows Millennium Edition. Users report that when they log on in the morning their computers respond slowly and occasionally return error messages.You use System Monitor to monitor processor performance and RAM utilization. You discover that the % Total Time and % User Time counters average 90 percent and the % Privileged Time counter averages 20 percent. The Available Mbytes counter averages 800 MB. You need to improve server performance for user logons. What should you do?

    • Options
    • A. Increase the physical RAM on the computer to 2 GB.
    • B. Increase the virtual RAM on the computer to 4 GB.
    • C. Configure SQL Server to use only processors 0, 1, and 2.
    • D. Configure SQL Server to use only processors 1, 2, and 3.
    • Discuss
    • 10. You are an administrator of a SQL Server 2000 computer. The server contains a database that stores inventory data. Another database administrator has created a number of scheduled jobs to maintain the inventory database. Each weeknight the following jobs occur. - A BULK INSERT job imports data at 10:00 P.M - Indexes are rebuilt at 10:15 P.M - Data integrity checks are performed at 10:30 P.M - A differential backup is performed at 10:45 P.M - A DBCC SHRINKDATABASE job runs at 11:00 P.M. You notice that the final job often fails and returns the following error message: "Server: Msg 3140, Level 16, State 3. Could not adjust the space allocation for file 'inventory_data'."You need to ensure that the final job runs without errors. What should you do?

    • Options
    • A. Modify the DBCC SHRINKDATABASE job so that it uses DBCC SHRINKFILE statement to shrink each file individually.
    • B. Create a new DBCC SHRINKFILE job to shrink the inventory_data file. Schedule the new job to run at the same time as the DBCC SHRINKDATABASE job.
    • C. Increase the time between the differential backup and the DBCC SHRINKDATABASE job.
    • D. Increase the time between the data integrity checks and the differential backup.
    • Discuss


    Comments

    There are no comments.

Enter a new Comment