Inheritance
Tight coupling
Low cohesion
High cohesion
Loose coupling
第1题:
Your company has an Active Directory forest that contains eight linked Group Policy Objects (GPOs). One of these GPOs publishes applications to user objects. A user reports that the application is not available for installation. You need to identify whether the GPO has been applied What should you do()
第2题:
A team of programmers is involved in reviewing a proposed design for a new utility class, After some discussion, they realize that the current design allows other classes to access methods in the utility class that should be accessible only to methods within the utility class itself. What design issue has the team discovered?()
第3题:
A company has a business application that provides its users with many different reports: receivables reports, payables reports, revenue projects, and so on.The company has just purchased some new, state-of-the-art,wireless printers, and a programmer has been assigned the task of enhancing all of the reports to use not only the company’s old printers, but the new wireless printers as well.When the programmer starts looking into the application, the programmer discovers that because of the design of the application, it is necessary to make changes to each report to support the new printers. Which two design concepts most likely explain the situation?()
第4题:
A team of programmers is involved in reviewing a proposed design for a new utility class. After some discussion, they realize that the current design allows other classes to access methods in the utility class that should be accessible only to methods within the utility class itself. What design issue has the team discovered?()
第5题:
Your company has an internal Web application that uses a self-signed SSL certificate. The company has an internal certification authority (CA) with autoenrollment.When users attempt to start the Web application, Internet Explorer displays an error message that recommends closing the Web page rather than continuing to the application. You need to ensure that Internet Explorer does not display the error message. What should you do?()
第6题:
You need to design the network to support the company’s VPN requirements for mobile users who connect to the network in Seattle. Which two actions should you perform?()
第7题:
include the hostname in the resource group definition.
include the license key in the resource group definition.
obtain a second license key for a standby system from the application vendor.
Set the hostname to be one of the TCP/IP interface included in a resource group.
第8题:
Issue a certificate from the internal CA and install it on the application server
Install the Web application’s certificate into the computer store on each client computer
Install the Web application’s certificate into the personal store on each client computer. Add the application’s URL to the Trusted Sites zone in Internet Explorer
Purchase a commercial certificate and install it on the internal CA
第9题:
Run the Group Policy Results utility for the user.
Run the Group Policy Results utility for the computer.
Run the GPRESULT /SCOPE COMPUTER command at the command prompt.
Run the GPRESULT /S
第10题:
Tight coupling
Low cohesion
High cohesion
Loose coupling
Weak encapsulation
第11题:
Run the Dcpromo utility on the five member servers.
Run the Regsvr32 command on the five member servers
Run the Webadmin command on the five member servers
Run the RacAgent utility on the five member servers
第12题:
Tight coupling
Low cohesion
High cohesion
Loose coupling
Weak encapsulation
Strong encapsulation
第13题:
A technician works for a company that has recently been affected by a virus. The virus entered the network by using port 6000. Port 6000 is used by an application located on a server. The technician has been asked to block this port on all servers and computers except for the one server which uses this port. Which of the following should the technician do?()
第14题:
Company.com is implementing an HACMP solution. The application ahs a license key based on The hostname. The hostname is also the name used for one of the TCP/IP interfaces. The application vendor has worked with HACMP systems before and is aware of the issue. The preferred method for resolving this issue is to:()
第15题:
A company that makes Computer Assisted Design (CAD) software has, within its application, some utility classes that are used to perform 3D rendering tasks. The company's chief scientist has just improved the performance of one of the utility classes' key rendering algorithms, and has assigned a programmer to replace the old algorithm with the new algorithm. When the programmer begins researching the utility classes, she is happy to discover that the algorithm to be replaced exists in only one class. The programmer reviews that class's API, and replaces the old algorithm with the new algorithm, being careful that her changes adhere strictly to the class's API. Once testing has begun, the programmer discovers that other classes that use the class she changed are no longer working properly. What design flaw is most likely the cause of these new bugs?()
第16题:
A company that makes Computer Assisted Design (CAD) software has, within its application, some utilityclasses that are used to perform 3D rendering tasks. The company’s chief scientist has just improved theperformance of one of the utility classes’ key rendering algorithms, and has assigned a programmer toreplace the old algorithm with the new algorithm. When the programmer begins researching the utilityclasses, she is happy to discover that the algorithm to be replaced exists in only one class. The programmer reviews that class’s API, and replaces the old algorithm with the new algorithm, being carefulthat her changes adhere strictly to the class’s API. Once testing has begun, the programmer discovers thatother classes that use the class she changed are no longer working properly. What design flaw is mostlikely the cause of these new bugs?()
第17题:
Certkiller has an Active Directory forest with six domains. The company has 5 sites. The company requires a new distributed application that uses a custom application directory partition named ResData for data replication. The application is installed on one member server in five sites. You need to configure the five member servers to receive the ResData application directory partition for data replication. What should you do()
第18题:
Update the antivirus application
Install critical update security patches
Adjust the software firewall settings
Replace the current antivirus program
第19题:
NFS
CIFS
iFCP
iSCSI
第20题:
Inheritance
Tight coupling
Low cohesion
High cohesion
Loose coupling
第21题:
Deploy version 2 of the application by using Microsoft Application Virtualization (App-V).
Deploy version 2 of the application as a Remote Desktop Services RemoteApp.
Deploy version 2 of the application by using a Group Policy Software Installation policy.
Deploy version 2 of the application by using a Microsoft System Center Configuration Manager package.
第22题:
Inheritance
Low cohesion
Tight coupling
High cohesion
Loose coupling
Object immutability
第23题:
Inheritance
Tight coupling
Low cohesion
High cohesion
Loose coupling
Object immutability
第24题: