niusouti.com

单选题You need to design a strategy for identifying the number of instances that any one SQL Server 2005 computer will support. What should you do?()A Specify that each server must have one instance for each customer.B Specify that each server must each have

题目
单选题
You need to design a strategy for identifying the number of instances that any one SQL Server 2005 computer will support. What should you do?()
A

Specify that each server must have one instance for each customer.

B

Specify that each server must each have only one instance.

C

Specify that each server must have one instance for each database that is hosted on that server.

D

Specify that each server must have one instance for each customer who has one or more databases that are hosted on that server.


相似考题
更多“You need to design a strategy for identifying the number of ”相关问题
  • 第1题:

    You are using Oracle Database 10g. Which statement regarding an incomplete recovery is true?()

    • A、 You do not need to restore all the data files.
    • B、 You do not need to open the database with the RESETLOGS operation
    • C、 You do not need to perform a full backup after the RESETLOGS operation.
    • D、 You do not need to recover all the data files to the same system change number (SCN).

    正确答案:C

  • 第2题:

    You need to design an access control strategy for the marketing application. You solution must minimize impact on server and network performance. What should you do?()

    • A、Require client computers to connect to the marketing application by using a VPN connection
    • B、Use IPSec to encrypt communications between the servers in the New York and Atlanta offices
    • C、Require the high security setting on Terminal Services connections to the marketing application
    • D、Configure all marketing application Web pages to require SSL

    正确答案:D

  • 第3题:

    You need to design the restrictions on the Bank.Customers table. Which three actions should you perform?()

    • A、Design a trigger that verifies that the first names and surnames are not empty strings.
    • B、Design a check constraint that verifies that the first names and surnames are not empty strings.
    • C、Design a check constraint that uses a CLR user-defined function to verify that either the phone number is a null value or the format of the phone number is valid.
    • D、Design a trigger that uses a CLR user-defined function to verify that either the phone number is a null value or the format of the phone number is valid.
    • E、Design a check constraint that ensures that the phone number cannot be changed from a valid format to a null value or to an invalid format.
    • F、Design a trigger that ensures that the phone number cannot be changed from a valid format to a null value.

    正确答案:B,C,F

  • 第4题:

    Your company has a single Active Directory Domain Services (AD DS) domain with Windows Server 2008 R2 member servers and 1,000 Windows 7 client computers. You are designing the deployment of a custom application.   You have the following requirements:   The application must be available to only users who need it. Minimize network traffic during deployment.   You need to design a deployment strategy that meets the requirements.   Which deployment method should you use?()

    • A、RemoteApp and Desktop Connections
    • B、software installation in Group Policy
    • C、Microsoft Application Virtualization (App-V)
    • D、Microsoft System Center Configuration Manager 2007

    正确答案:A

  • 第5题:

    You need to recommend a strategy to ensure that the administration of AD LDS is encrypted.  What should you include in the recommendation?()

    • A、a server authentication certificate
    • B、client authentication certificates
    • C、Digest authentication
    • D、Windows Integrated authentication

    正确答案:A

  • 第6题:

    单选题
    You need to design an access control strategy for the Payment folder for the Sales Managers group. What should you do?()
    A

    Use IPSec in transport mode

    B

    Use Encrypting File System (EFS) over Web Distributed Authoring and Versioning (WebDAV)

    C

    Use PEAP-EAP-TLS

    D

    Use Encrypting File System (EFS) remote encryption


    正确答案: C
    解析: 暂无解析

  • 第7题:

    多选题
    You need to design a strategy to increase security for the client computers in the finance department. Which two actions should you perform?()
    A

    Enable automatic certificate enrollment

    B

    Enforce smart card logons

    C

    Enable Encrypting File System (EFS) for offline files

    D

    Enable a screen saver password


    正确答案: A,D
    解析: 暂无解析

  • 第8题:

    单选题
    You are designing a group management strategy for users in the finance department. You need to  identify the appropriate changes that need to be made to the current group management strategy. You want to accomplish this goal by using the minimum number of groups.  What should you do?()
    A

     Add the finance users to the financeData group to which the necessary permissions have been assigned.

    B

     Add the finance users to the financeGG group to which the necessary permissions have been assigned.

    C

     Add the finance users to the financeGG group. Then add the financeGG group to the financeData group to which the necessary permissions have been assigned.

    D

     Add the finance users to the financeGG group. Add the financeGG group to the financeUG group to the financeDat group to which the necessary permissions have been assigned.


    正确答案: B
    解析: 暂无解析

  • 第9题:

    单选题
    Your company has 1,000 client computers. Each client computer has 1 GB of RAM. You are planning to deploy Windows 7 Enterprise.   You need to design a zero-touch deployment strategy to increase the number of client computers that can be imaged at one time.   What should you do?()
    A

    Increase the amount of RAM on the client computers.

    B

    Change from unicast to multicast deployment of images.

    C

    Change from multicast to unicast deployment of images.

    D

    Decrease the trivial file transfer protocol (TFTP) block size on the TFTP server.


    正确答案: B
    解析: 暂无解析

  • 第10题:

    多选题
    You are evaluating the implementation of two Hyper-V hosts for the application servers. You need to design a solution that will move the application servers automatically between the Hyper-V hosts based on the physical resources available. The solution must minimize the number of Microsoft System Center products deployed to the network. Which software should you include in the design?()
    A

    Microsoft System Center Operations Manager

    B

    Microsoft System Center Virtual Machine Manager

    C

    Microsoft System Center Data Protection Manager

    D

    Microsoft System Center Configuration Manager


    正确答案: D,C
    解析: 暂无解析

  • 第11题:

    单选题
    You are designing a strategy for migrating domain user accounts to the new Windows Server 2003 Active Directory environment. You want to identify the minimum number of trust relationships that need to be manually created to perform this operation.  Which design should you use? ()
    A

     one external trust relationship

    B

     two external trust relationships

    C

     six external trust relationships

    D

     twelve external trust relationships

    E

     one two-way cross-forest trust relationship


    正确答案: B
    解析: 暂无解析

  • 第12题:

    单选题
    You need to design a group membership strategy for the EditorialAdmins group. What should you do?()
    A

    Move the EditorialAdmins group to the Servers OU in the editorial department

    B

    Move the members of the EditorialAdmins group to the Editorial OU

    C

    Move the members of the EditorialAdmins group to the New York OU

    D

    Move the EditorialAdmins group to the New York OU


    正确答案: B
    解析: 暂无解析

  • 第13题:

    You design a Business Intelligence (BI) solution by using SQL Server 2008. You plan to design the report strategy for a new report project that will be used by a financial application. The application uses five calculations that are implemented in Microsoft .NET Framework 3.5 assemblies. The assemblies are written in the C# language and use the static methods. You need to ensure that the calculations can be used by the expressions in all reports. You also need to ensure consistency within the reports by using the least amount of development effort. What should you do?()

    • A、 Add a reference to the assemblies in the Report Properties References tab. 
    • B、 Write the calculation logic used by the calculations by using T-SQL functions. 
    • C、 Write the code of the calculation logic into the Report Properties Custom Code tab.
    • D、 Write the calculation logic in each report by using the mathematical functions available natively to SQL Server 2008 Reporting Services (SSRS).

    正确答案:A

  • 第14题:

    You need to design an e-mail access strategy for remote users. What should you do? () 

    • A、 Instruct remote users to connect to their e-mail by using RPC
    • B、 Instruct remote users to connect to Outlook Web Access by using only HTTPS
    • C、 Instruct remote users to connect to the company network by using PPTP connections
    • D、 Instruct remote users to connectd to their e-mail by using RPC over HTTP Configure the HTTP servers to require encryption.

    正确答案:D

  • 第15题:

    You need to design a strategy for identifying the number of instances that any one SQL Server 2005 computer will support. What should you do?()

    • A、Specify that each server must have one instance for each customer.
    • B、Specify that each server must each have only one instance.
    • C、Specify that each server must have one instance for each database that is hosted on that server.
    • D、Specify that each server must have one instance for each customer who has one or more databases that are hosted on that server.

    正确答案:D

  • 第16题:

    You are designing a strategy for migrating domain user accounts to the new Windows Server 2003 Active Directory environment. You want to identify the minimum number of trust relationships that need to be manually created to perform this operation.  Which design should you use?()

    • A、one external trust relationship
    • B、two external trust relationships
    • C、six external trust relationships
    • D、twelve external trust relationships
    • E、one two-way cross-forest trust relationship

    正确答案:B

  • 第17题:

    You need to design a password policy that meets business requirements. What should you do? Select all that apply.()

    • A、Increase the number of passwords that are remembered
    • B、Disable reversible encryption
    • C、Set the minimum password age to zero days
    • D、Increase the maximum password age

    正确答案:A,C

  • 第18题:

    单选题
    Your company has client computers that run Windows XP Professional.   You are planning to install Windows 7 Enterprise on the existing client computers.   You have the following requirements:   Migrate user data and operating system components.  Encrypt and password-protect the migration store.   You need to design a user state migration strategy that supports the requirements. What should you do?()
    A

    Use a hard-link migration store

    B

    Use a compressed migration store

    C

    Perform an offline migration by using Windowsold

    D

    Perform an offline migration by using Windows PE


    正确答案: B
    解析: 暂无解析

  • 第19题:

    单选题
    You are analyzing the performance of a SQL Azure database.   You need to recommend an approach for identifying the indexes that should be added to improve database performance.  What should you recommend?()
    A

     Use SQL Server Profiler to identify missing indexes.

    B

     Use the Database Engine Tuning Advisor to identify missing indexes.

    C

     Use a Dynamic Management View to analyze query plans.

    D

     Use a DynamicManagement View to ascertain the number of pending I/O requests.


    正确答案: C
    解析: 暂无解析

  • 第20题:

    单选题
    You need to recommend a Group Policy strategy for the Remote Desktop servers. What should you include in the recommendation?()
    A

    block inheritance

    B

    loopback processing

    C

    security filtering

    D

    WMI filtering


    正确答案: B
    解析: 暂无解析

  • 第21题:

    单选题
    Your company has a single Active Directory Domain Services (AD DS) domain and 1,000 client computers.  You are planning to deploy Windows 7 Enterprise to the client computers.    You need to design a zero-touch installation strategy.()
    A

    unattended installation

    B

    custom Windows 7 image on DVD

    C

    Windows Deployment Services (WDS)

    D

    Microsoft System Center Configuration Manager 2007 R2


    正确答案: D
    解析: 暂无解析

  • 第22题:

    单选题
    You need to design the consolidation strategy for the Promotions and Partners databases. You want to choose a strategy that results in the best database performance while maintaining the permissions of end users in each database.What consolidation strategy should you choose?()
    A

    Place each database in a separate instance running on SQL2.

    B

    Place each database in a separate instance running on SQL3.

    C

    Place both databases in a single instance running on SQL2.

    D

    Place both databases in a single instance running on SQL3.


    正确答案: C
    解析: 暂无解析

  • 第23题:

    单选题
    You design a Business Intelligence (BI) solution by using SQL Server 2008. You plan to design the report strategy for a new report project that will be used by a financial application. The application uses five calculations that are implemented in Microsoft .NET Framework 3.5 assemblies. The assemblies are written in the C# language and use the static methods. You need to ensure that the calculations can be used by the expressions in all reports. You also need to ensure consistency within the reports by using the least amount of development effort. What should you do?()
    A

     Add a reference to the assemblies in the Report Properties References tab. 

    B

     Write the calculation logic used by the calculations by using T-SQL functions. 

    C

     Write the code of the calculation logic into the Report Properties Custom Code tab.

    D

     Write the calculation logic in each report by using the mathematical functions available natively to SQL Server 2008 Reporting Services (SSRS).


    正确答案: A
    解析: 暂无解析

  • 第24题:

    单选题
    VTP devices in a network track the VTP revision number. What is a VTP configuration revision  number?()
    A

    A number for identifying changes to the network switch.

    B

    A number for identifying changes to the network router.

    C

    A number for identifying changes to the network topology.

    D

    None of the other alternatives apply.


    正确答案: B
    解析: 暂无解析