|
Please uploade some questions.
|
Question 1. Which multicast address does RIPv2 use for route updates by default? A. 224.0.0.2 B. 224.0.0.5 C. 224.0.0.9 D. 255.255.255.255 Answer: C Question 2. What are three methods for managing a Juniper Enterprise Router? (Choose three.) A. CLI B. SDX C. SAP D. J-Web E. J-Config Answer: A, B, D Question 3. Which IGP should you use to achieve scalability in a large enterprise network using Juniper enterprise routers? A. RIP B. BGP C. OSPF D. EIGRP Answer: C Question 4. Which configuration statement allows local non-root users access to the router only when the RADIUS server is unreachable? A. [edit] system { authentication-order radius; } B. [edit] system { authentication-order [ radius password ]; } C. [edit] system { authentication-order [ radius if-authenticated ]; } D. [edit] system { authentication-order [ radius local ]; } Answer: A Question 5. Which two statements about the Adaptive Services PIC are true? (Choose two.) A. The Adaptive Services PIC supports the Layer 3 service package by default. B. The Adaptive Services PIC is required when using the secure shell to access an M-series router. C. The Adaptive Services PIC can be configured for the Layer 2 and Layer 3 service packages simultaneously. D. The Adaptive Services PIC can be configured for either the Layer 2 or the Layer 3 service package but not both at the same time. Answer: A, D Question 6. What are two benefits of MLPPP? (Choose two.) A. Cost-efficient solution when incrementing bandwidth. B. Provides for fail over when the primary link goes down. C. Evenly distributes traffic over participating member links. D. Guarantees that the link will remain up during failure scenarios. Answer: A, C Question 7. Which major J-Web menu should you use to upgrade the JUNOS software on the router? A. Monitor B. Manage C. Diagnose D. Configuration Answer: B Question 8. How are multiple policies evaluated within the JUNOS software? A. alphabetically B. as an ordered list C. in a round robin manner D. numerically from lowest to highest Answer: B Question 9. Which statement is true about accessing a Juniper enterprise router using a Web browser? A. J-series routers are accessible by default. B. M7i and M10i routers are accessible by default. C. You need to install a license before accessing a J-series router. D. You need to enable the HTTP service on M7i, M10i, and J-series routers before accessing them. Answer: A Question 10. What are two ways to create a rescue configuration on a J-series router? (Choose two.) A. Use the J-Web System > Rescue menu. B. Use the J-Web Configuration > Rescue menu. C. Issue the configure rescue save command. D. Issue the request system configuration rescue save command. Answer: B, D
|
Question 1. Which statement is correct regarding Transmit Load Balancing (TLB)? A. TLB teaming has a maximum of four NICs in a team. B. TLB requires an 802.3ad-capable switch to support TLB teaming. C. NICs in TLB do not have Network Fault Tolerance (NFT) capability. D. TLB can receive at 1000Mb/s (theoretical throughput) using four teamed Gigabit Ethernet NICs. Answer: D Question 2. Which type of memory protection calculates a 72-bit syndrome for every 64 bits of data? A. Automatic Parity Checking (APC) B. Error Checking and Correcting (ECC) C. Error Detecting and Correction (EDC) D. Battery Backed Write Cache (BBWC) Answer: B Question 3. Which script is sent securely by CPQLOCFG to iLO over the network? A. RIBCL B. RIBdos.vbs C. HPONCFG D. CPQLODOS Answer: A Question 4. What is a feature of SATA? A. PIN efficiency is lower than ATA hard drives. B. SATA host controllers recognize SCSI protocols. C. SATA drives are daisy-chained during configuration. D. It uses the same electrical and physical interfaces as Serial Attached SCSI. Answer: D Question 5. Arrange the tasks for iSCSI tunneling in sequential order by dragging and dropping the boxes. The Exhibit button for instructions on how to complete drag and drop items. Answer: Question 6. A customer requires a Linux file server to be accessed by Windows and UNIX workstations. Which services should be installed to support this requirement? (Select two.) A. MD B. NFS C. NSS D. SMB E. CUPS F. AutoFS Answer: B, D Question 7. A customer wants to connect an MSA30 DB storage solution to a ProLiant DL380 G5 server. Which Smart Array controller is required to connect both MSA connectors? A. Smart Array 6i B. Smart Array 641 C. Smart Array 642 D. Smart Array 6402 Answer: D Question 8. Which resource gathers information for sizing, recommends tools, and helps to deploy a business solution? A. ActiveAnswers B. Product Bulletin C. Enterprise Configurator D. Sales Builder for Windows Answer: A Question 9. Which advanced memory protection technology avoids unplanned downtime due to a complete memory chip failure? A. Online Spare B. Standard ECC C. Advanced ECC D. Mirrored Memory Answer: D Question 10. From which HP resource can you access a set of tools, e-Services and solution sizers to help plan and implement a suitable server solution for a customer? A. HP Support Center B. ActiveAnswers website C. Solutions Programs Portal website D. Channel Services Network website E. Support and Troubleshooting website Answer: B
|
Question 1. You need to propose the most cost-effective licensing solution for Courseware Publishers. What should you do? (Choose TWO.) A. Propose that the company obtain user client access licenses (CALs). B. Propose that the company obtain device client access licenses (CALs). C. Propose that the company obtain Windows Server 2003 licensed in Per User mode. D. Propose that the company obtain Windows Server 2003 licensed in Per Server mode. Answer: B, D Question 2 You need to propose the best licensing solution for Courseware Publishers. What should you do? A. Propose license acquisition through an Open Business agreement. B. Propose license acquisition through an Open Volume agreement. C. Propose license acquisition through a Select License agreement. D. Propose license acquisition through an Original Equipment Manufacturer (OEM) channel. Answer: A Question 3. You are busy sorting out the licensing for the computers at Courseware Publishers. You need to determine which computers at Courseware Publishers are qualified desktops. Which of the following would be qualified desktops? A. All computers and mobile devices. B. All computers that the company uses for work purposes and are able to run enterprise products. C. All computers that are bought by the company during the term of its licensing agreement. D. All computers that are running a Microsoft Windows operating system. E. Not the computers that are running as a server, computers running line-of-business software only, and systems running an embedded operating system. Answer: B, E Question 4. The owner of Courseware Publishers wants to know which license agreement offers downgrade rights in case the company wants to downgrade CP-SR01. What would you reply? A. All agreements on Select License agreements, Open License agreements and Software Assurance agreements. B. Only Original Equipment Manufacturer (OEM) licenses. C. Small Business Server Client Access Licenses and Open License agreements. D. User client access licenses, Open License agreements and Software Assurance agreements. Answer: A Question 5. The Courseware Publishers CEO wants to know what the main factors are that would require the company to change its licensing acquisition process. What would you reply? A. Budget considerations and licensing management concerns. B. The upgrading to Windows Server 2003. C. The need to hire two additional full-time employees and licensing management concerns. D. The upgrading to Windows Server 2003 and Access 2003 and the desktops to Office 2003 Professional. Answer: A Question 6. Should Courseware Publishers acquire license through an Open Business agreement that includes Software Assurance, how much time will the company have to renew only the Software Assurance agreement once the Open Business agreement expires. A. 10 days after the Open Business agreement expires. B. 60 days after the Open Business agreement expires. C. 90 days after the Open Business agreement expires. D. 2 months after the Open Business agreement expires. E. 6 months after the Open Business agreement expires. Answer: C Question 7. You need to propose a licensing solution for City Central, Inc. Which of the following issues would you need to resolve before you can propose a license solution? A. Are there any remote or mobile users? B. How much does the company want to spend? C. What version of Exchange Server is currently in use? D. For which products does the company have a Software Assurance agreement? E. What third-part software is the company using? Answer: A Question 8. You want to implement a license agreement that would allow City Central, Inc to standardize the client computers without activating them. What should you do? A. Obtain licenses and Software Assurance for the Windows XP Professional and Office 2003 Professional. B. Obtain licenses and acquire a Software Assurance agreement from an Original Equipment Manufacturer (OEM). C. Obtain a Software Assurance agreement for the client computers. D. Obtain a Services Provider Licensing Agreement (SPLA) to run Windows XP Professional and Office 2003 Professional. Answer: B Question 9. Should Clive Wilson replace the client computers in the Marketing department with new client computers from an Original Equipment Manufacturer (OEM) channel with Windows XP Professional and Office 2003 Professional preinstalled, what would be the most suitable licensing solution for all client computers at City Central, Inc? A. Obtain licenses and Software Assurance agreements for the Windows XP Professional upgrade and Office 2003 Professional for the client computers in the Recruitment and the Sales departments. B. Obtain licenses and Software Assurance agreements for Office 2003 Professional for the Marketing department's new client computers. C. Obtain licenses and Software Assurance agreements for the Windows XP Professional and Office 2003 Professional upgrade for the client computers in the Sales department. D. Obtain Software Assurance agreements only for the Marketing department's new client computers. E. Obtain Software Assurance agreements only for the client computers in the Recruitment department. Answer: A, D Question 10. Which of the following server solutions would you recommend at the end of three years? A. Obtain another server running the latest version of Small Business Server. B. Obtain a suitable Transition Pack and Transition Client Access Licenses (CALs). C. Obtain additional Small Business Server Client Access Licenses (CALs). D. Obtain a new Small Business Server license and appropriate client access licenses (CALs). Answer: B
|
Question 1. You work as a Microsoft licensing specialist at ITCertKeys.com. ITCertKeys.com consists of a Sales department and a Marketing department. The Sales department has 500 Windows XP Professional client computers while the Marketing department has 200 Windows 2000 Professional client computers. The licenses for the client computers in the Sales department have Software Assurance and were obtained under a Select License agreement. ITCertKeys.com wants to standardize all client computers on the latest version of Windows. However, the Marketing department uses an in-house accounting application that is not compatible with Windows XP Professional. What should you suggest is a cost-effective license solution for the Marketing department? A. Use ITCertKeys.com's Select License agreement and obtain a Virtual PC 2004 licenses. B. Acquire licenses and Software Assurance for Windows 2000 Professional in Sales department. C. Acquire only Software Assurance for the Sales department, which are licensed for Windows XP Professional. D. Use the Independent Software Vendor (ISV) Royalty Licensing Program for the custom software solutions and obtain a Services Provider Licensing Agreement (SPLA) for Windows 2000 Professional. Answer: A Question 2. You work as a Microsoft licensing specialist at ITCertKeys.com. The ITCertKeys.com network consists of a single Active Directory domain named ITCertKeys.com. ITCertKeys.com consists of two department named Research and Finance. ITCertKeys.com has hired a new technician named Mia Hamm. Mia Hamm wants to know which offers downgrade rights. A. All agreements on Select License, Open License and also Software Assurance. B. Original Equipment Manufacturer (OEM) licenses. C. Small Business Server Client Access Licenses. D. User client access licenses Answer: A Question 3. You work as a Microsoft licensing specialist at ITCertKeys.com. The ITCertKeys.com network consists of a single Active Directory domain named ITCertKeys.com. A ITCertKeys.com customer named Rory Allen as contact you. Their company named AB Motors Software Assurance is expiring today. Currently AB Motors has and an Enterprise 5.x Agreement, a Select 5.x License agreement with Software Assurance. Rory Allen wants to know the time-window in which to renew the Software Assurance. What should you tell him? A. 1 month and 30 days. B. 2 month. C. 90 days. D. 1 month. Answer: C Question 4. You work as a Microsoft licensing specialist at ITCertKeys.com. The ITCertKeys.com network consists of a single Active Directory domain named ITCertKeys.com. A ITCertKeys.com customer named Andy Booth as contact you. You need to calculate the cost per year of Software Assurance for Systems, Applications, and Servers licenses. What should you do? A. Calculate 29% of the Systems license price and Applications license price, and 25% of the Servers license price. B. Calculate 14% of the Systems license price, Applications license price, and of the Servers license price. C. Calculate 20% of the Systems license price, 25% of the Applications license price, and 30% of the Servers license price. D. Calculate 10% of the Systems license price, 12% of the Applications license price, and 12% of the Servers license price. Answer: A Question 5. You work as a Microsoft licensing specialist at ITCertKeys.com. The ITCertKeys.com network consists of a single Active Directory domain named ITCertKeys.com. All servers on the ITCertKeys.com network run Windows Server 2003 and all client computers run Windows 2000 Professional. ITCertKeys.com wants to replace the client computers and standardize it to run Microsoft Windows XP Professional and Microsoft Office Professional 2003 without activating the client computers. Which of the following is the best licensing solution? A. Obtain licenses and Software Assurance for the Windows XP Professional upgrade and Office 2003 Professional. B. Use Original Equipment Manufacturer (OEM) to obtain licenses and add Software Assurance. C. Obtain only Software Assurance for the client computers. D. Obtain a Services Provider Licensing Agreement (SPLA) to run Windows XP Professional upgrade and Office 2003 Professional. Answer: B Question 6. You work as a Microsoft licensing specialist at ITCertKeys.com. The ITCertKeys.com network consists of a single Active Directory domain named ITCertKeys.com. A ITCertKeys.com customer named Dean Austin as contact you. Dean Austin wants to know more about the Enterprise Agreement. With regards to Enterprise Agreement, what is the least amount number of qualified desktops to qualify for it? A. 25 desktops. B. 50 desktops. C. 100 desktops. D. 250 desktops. Answer: D Question 7. You work as a Microsoft licensing specialist at ITCertKeys.com. The ITCertKeys.com network consists of a single Active Directory domain named ITCertKeys.com. All servers on the ITCertKeys.com network run Windows Server 2003. ITCertKeys.com consists of a Sales department. The laptop of ITCertKeys.com is used by the sales representatives that has Office XP Professional preinstalled and is running Microsoft Windows 2000 Professional. ITCertKeys.com is using a Select License agreement, which is in use for 24 months. A few weeks ago, ITCertKeys.com acquired 150 desktops with Windows XP Professional and Office 2003 Professional OEM licenses. The CIO of ITCertKeys.com wants to know which are eligible to be enrolled in Software Assurance. What should you tell him? A. The laptop computers with the Select License agreement. B. The Microsoft Windows 2000 Professional laptops. C. The laptops and the new desktops. D. The 150 desktops with Windows XP Professional and Office 2003 Professional OEM licenses. Answer: D Question 8. You work as a Microsoft licensing specialist at ITCertKeys.com. The ITCertKeys.com network consists of a single Active Directory domain named ITCertKeys.com. A ITCertKeys.com customer named Clive Wilson as contact you. Clive Wilson has acquired 50 new client computers that have Microsoft Windows XP Professional preinstalled. The licences of Clive Wilson's company needs to be enroll in Software Assurance. What is the time limit to enroll these licenses in Software Assurance? A. 2 months. B. 1 month. C. 90 days. D. 3 months. Answer: C Question 9. You work as a Microsoft licensing specialist at ITCertKeys.com. The ITCertKeys.com network consists of a single Active Directory domain named ITCertKeys.com. ITCertKeys.com contains 20,000 desktop computers that run Microsoft Office Professional 2003. ITCertKeys.com has quite a few branch offices in Columbia, Germany, Japan and USA. The ITCertKeys.com users need to adjust the user interface languages often. You need to assign an Enterprise Agreement. Which of the following language licensing solution should you choose? A. On the Enterprise Agreement enrolment you should use the All Languages option. B. Choose the Listed Languages option on the Enterprise Agreement enrolment and the Cross Language use rights. C. Use the Cross Language use rights in the Enterprise Agreement and the All Languages option. D. Use the Platform Independent use rights in the Enterprise Agreement and the All Languages option. Answer: A Question 10. You work as a Microsoft licensing specialist at ITCertKeys.com. The ITCertKeys.com network consists of a single Active Directory domain named ITCertKeys.com. A year ago, ITCertKeys.com has signed a Select License agreement. Because of the abundance of the license acquisitions, ITCertKeys.com had qualified for Select Level B in the Server pool. Last week ITCertKeys.com only purchased only 780 points in the Server pool. How will the licensing agreement be affected? A. ITCertKeys.com need to assign a new enrollment under the name. B. ITCertKeys.com will be re-leveled to Select Level A. C. ITCertKeys.com needs to purchase software under its current agreement until the agreement expires. D. ITCertKeys.com must re-negotiate the Select License agreement and must forecast Select Level A. Answer: B
|
Question 1. You work as the exchange administrator at ITCertKeys.com. The ITCertKeys.com network contains an Exchange Server 2007 Organization. The Active Directory structure of ITCertKeys.com consists of a root domain and a single child domain. The root domain is in ITCertKeys1 and the child domain in ITCertKeys2. You are in the process of installing Exchange Server 2007 in the child domain. In order to accomplish this task you decide to run the Setup /PrepareADcommand in the root domain. In your solution you need to ensure that Exchange can be installed on the child domain as well. What should you do? (Each correct answer presents a complete solution. Choose TWO.) A. You should run the Setup /ForestPrep command in the root domain. B. You should run the Setup /PrepareAllDomains command in the root domain. C. You should run the Setup /PrepareDomain command in the root domain. D. You should run the Setup /PrepareDomain command in the child domain. Answer: B, D Question 2. You work as the exchange administrator at ITCertKeys.com. The ITCertKeys.com network contains an Exchange Server 2007 Organization. The Active Directory forest of ITCertKeys.com contains a single site named ITCertKeys A. ITCertKeys A consists of a root domain and a single child domain. You have received instruction from the CIO to prepare the Active Directory as well as the domains. This task needs to be accomplished before you install the Exchange Server 2007 server. What should you do? (Each correct answer presents part of the solution. Choose TWO.) A. You should run the Setup /PrepareAllDomains command. B. You should run the Setup /ForestPrep command. C. You should run the Setup /PrepareAD command. D. You should run the Setup /DomainPrep command. Answer: A, C Question 3. You are employed as the exchange administrator at ITCertKeys.com. The ITCertKeys.com network contains an Exchange 2007 Organization. ITCertKeys.com has its headquarters in StoITKholm where you are located. Due to company growth ITCertKeys.com opens a branch office in Athens and hires another administrator named Amy Wilson. You have received instruction from the CIO to configure the least amount permissions necessary for Amy Wilson who must be enabled to prepare Active Directory for Exchange Server 2007. What should you do? A. You must add the user account of the administrator to an Enterprise Admins group. You must add the administrator to an Exchange Full Administrator at the organizational level. B. You must add the user account of the administrator to the Exchange Enterprise Server group. You must add the user account of the administrator to the Domain Admins group. C. You must add the user account of the administrator to an Enterprise Admins group. You must add the user account of the administrator to a Schema Admins group. D. You must add the user account of the administrator to the Domain Admins group. You must add the administrator to an Exchange Full Administrator at the organizational level. Answer: C Question 4. You are employed as the exchange administrator at ITCertKeys.com. The ITCertKeys.com Exchange Server network has just been migrated to Exchange Server 2007. You are responsible for managing the Exchange network for ITCertKeys.com. Every mailbox server on the ITCertKeys.com network is configured with two storage groups as well as two databases for each of the storage groups. You have received instruction from the CIO to ensure that the ITCertKeys.com Exchange Server network is fault tolerant. You thus decide to implement local continuous replication (LCR). Now you need to configure the Mailbox server with LCR. What should you do? A. First change the ratio to a single database per storage group. Then run the Enable-DatabaseCopy cmdlet. Then run the Enable-StorageGroupCopy cmdlet. B. First run the Disable-StorageGroupCopy cmdlet. Then change the databases into a single storage group. Then run the Enable-StorageGroupCopy cmdlet. C. First change the database ratio to a single database per storage group. Then run the Disable-StorageGroupCopy cmdlet. Then run the Enable-DatabaseCopy cmdlet. D. First run the Disable-StorageGroupCopy cmdlet. Then change the databases ratio into a single storage group. Then run the Enable-DatabaseCopy cmdlet. Answer: A Question 5. You are employed as the exchange administrator at ITCertKeys.com. You are in the process of installing a new Exchange Server 2007 Organization. The native Exchange Server 2007 environment of ITCertKeys.com has the following server roles installed: * One Edge Transport server named ITCertKeys-EX01 * One Hub Transport server named ITCertKeys-EX02 You have received instruction from the CIO to configure the e-mail routing. In your solution you need to ensure that ITCertKeys-EX01 is configured is such a way so as to route e-mail between the Exchange organization and the Internet; and that ITCertKeys-EX02 is configured in such a way so as to route Internet e-mail to ITCertKeys-EX01. What should you do? (Each correct answer presents part of the solution. Choose TWO.) A. On ITCertKeys-EX02, first open the Exchange Management Console. Then import the Edge Subscription file. B. On ITCertKeys-EX01, first create a new Send connector named ITKEdge - Internet. Then add the *domain as an address space and specify to use DNS to route e-mail automatically. Then add ITCertKeys-EX01 as a source server. C. On ITCertKeys-EX02, first create a new Send connector named ITKHub. Then add the *domain as an address space and specify to use DNS to route e-mail automatically. Then add ITCertKeys-EX02 as a source server. D. On ITCertKeys-EX01, first open the Exchange Management Shell. Then export a new Edge Subscription file. Answer: A, D Question 6. You work as the exchange administrator at ITCertKeys.com. The ITCertKeys.com network contains an Exchange Server 2007 Organization. You are responsible for managing the Exchange network for ITCertKeys.com. You are currently preparing your Exchange 2007 organization in order to install the Mailbox server role on a newly purchased Exchange Server 2007 server named ITCertKeys-EX10. You have received instruction from the CIO to ensure that the ITCertKeys-EX10 read and write performance is optimal. In addition you also need to implement redundancy on ITCertKeys-EX10. You thus have to choose the appropriate type of array on which the mailbox database should be placed. What should you do? A. Make use of a dedicated RAID 10 array. B. Make use of a dedicated RAID 0 array. C. Make use of a dedicated RAID 1 array. D. Make use of a RAID 1 array that contains the operating system partition. Answer: A Question 7. You are employed as the exchange administrator at ITCertKeys.com. You are in the process of converting your Exchange 2000 Server environment to Exchange Server 2007. The ITCertKeys.com network contains a Windows 2000 native mode Active Directory domain as well as an Exchange 2000 organization. The Exchange 2000 organization is configured to run in mixed mode. You have been informed by the CIO that the schema master, the domain naming master as well as the PDC emulator all run on a Microsoft Windows 2000 Server domain controller. You receive instructions to prepare the environment for Exchange 2007. What should you do? (Each correct answer presents part of the solution. Choose TWO.) A. You should change the mixed mode Exchange 2000 organization to native mode. B. You should move the PDC emulator role to a Windows Server 2003 domain controller that has Service PaITK 1 installed. C. You should move the schema master role to a Windows Server 2003 domain controller that has Service PaITK 1. D. You should move the domain naming master role to a Windows Server 2003 domain controller that has Service PaITK 1. Answer: A, C Question 8. You are employed as the exchange administrator at ITCertKeys.com. The ITCertKeys.com network contains an Exchange 2007 Organization. You are responsible for managing the Exchange network for ITCertKeys.com. You decide to install a two-node Single Copy Cluster (SCC) Mailbox server on the Exchange Server 2007 organization of ITCertKeys.com. You then name the network adapters ITKPublic and ITKPrivate. You have received instruction from the CIO to configure the TCP/IP binding order for the cluster servers. What should you do? A. You should move the Public connection to the top of the Adapters and Bindings tab. B. You should move the Private connection to the top of the Adapters and Bindings tab. C. You should open the properties of the cluster and move the ITKPrivate network to the top of the Network Priority tab. D. You should open the properties of the cluster and move the ITKPublic network to the top of the Network Priority tab. Answer: B Question 9. You are employed as the exchange administrator at ITCertKeys.com. The ITCertKeys.com network contains an Exchange Server 2007 Organization. ITCertKeys.com has its headquarters in Chicago and a branch office in Dallas. You have been assigned to the Dallas site office. Your instructions are to install Exchange Server 2007 on the new server. To ensure that no problems occur that might hinder the users of the Dallas site to perform their duties you decide to install the required components on the new server before you install Exchange Server 2007. What should you do? (Each correct answer presents part of the solution. Choose THREE.) A. Install Windows PowerShell 1.0. B. Install Network News Transfer Protocol (NNTP). C. Install Simple Mail Transfer Protocol (SMTP). D. Install Microsoft Management Console (MMC) 3.0. E. Install Microsoft .NET Framework 1.1. F. Install Microsoft .NET Framework 2.0 Answer: A, D, F Question 10. You work as the exchange administrator at ITCertKeys.com. The ITCertKeys.com network contains an Exchange Server 2007 Organization. You are responsible for managing the Exchange network for ITCertKeys.com. The ITCertKeys.com network contains a stand-alone server named ITCertKeys-EX01. You have received instruction from the CIO to install the appropriate Exchange Server 2007 server role on ITCertKeys-EX01. What should you do? A. The Hub Transport server role should be installed on ITCertKeys-EX01. B. The Mailbox server role should be installed on ITCertKeys-EX01. C. The Client Access server role should be installed on ITCertKeys-EX01. D. The Edge Transport server role should be installed on ITCertKeys-EX01. Answer: D
|
Question 1. You need to set up the Bid_Archive database. What should you do? A. Configure merge replication to move the data between the Bids and Bid_Archive databases. B. Set up DML triggers to move rows from the Bids database to the Bid_Archive database when the Completed column in the Bid_Tracking table is set to 1 and the Successful column is set to 0. C. Configure snapshot replication to move all data from the Bids to the Bid_Archive database. D. Create a job that is scheduled to run every hour to check for rows in the Bid_Tracking table where the Completed column is set to 1 and the Successful column is set to 0. Answer: B Question 2. You need to identify the combinations of the Windows operating system and SQL Server 2005 version that will be the most appropriate for the new R&D configuration, which will include the Research, Parts, and Engineering databases. Which two combinations will be the most appropriate? (Each correct answer presents a complete solution. Choose two.) A. Windows Server 2003 Enterprise Edition with SQL Server 2005 Enterprise Edition B. Windows Server 2003 Datacenter Edition with SQL Server 2005 Enterprise Edition C. Windows Server 2003 Standard Edition with SQL Server 2005 Enterprise Edition D. Windows Server 2003 Enterprise Edition with SQL Server 2005 Standard Edition Answer: A, D Question 3. Your account name is Pat and you are a member of the db_owner database role. You have the permissions that are required to create the assembly for the new custom application that manages the replication for the Customer database. You need to minimize the attack surface on the server, while creating the assembly for the CLR to use. You need to ensure that your solution fulfills the companys security requirements. Which two options should you use? (Each correct answer presents part of the solution. Choose two.) A. WITH PERMISSION_SET = External_Access B. WITH PERMISSION_SET = Unsafe C. WITH PERMISSION_SET = Safe D. AUTHORIZATION dbo E. AUTHORIZATION Pat Answer: A, D Explanation: D: Case study text: All assemblies should be created with dbo as the owner. Question 4. You are a member of the DBAdmins group. You need to configure the HTTP endpoints for the new Web services application that will access the Customer database. You want to accomplish this goal by using the minimum amount of administrative effort, while fulfilling the companys technical requirements. Which two actions should you perform? (Each correct answer presents part of the solution. Choose two.) A. Install Internet Information Services (IIS) 6.0 on ITCertKeys B. B. Create an implicit namespace reservation while executing the CREATE ENDPOINT command. C. Ask the Windows administrator to create an explicit namespace reservation for the HTTP endpoint. D. Assign the Control permission on the endpoint to all users that will use the Web services application. E. Assign the Connect permission on the endpoint to all users that will use the Web services application. Answer: C, E Question 5. You need to define the data type and the table options for a new column named Annual Review in the HR database. Which two options should you select? (Each correct answer presents part of the solution. Choose two.) A. Use the text data type. B. Use the nvarchar(max) data type. C. Use the varchar(max) data type. D. Set the large value types out of row option to Off. E. Set the large value types out of row option to On. F. Set the text in row option to Off. G. Set the text in row option to 7000. Answer: B, E Question 6. DRAG DROP Your boss, Mrs. ITCertKeys, wants you to design the backup schedule for the Customer database. Not all locations have to be filled. Answer: Question 7. You need to design the consolidation plan for ITCertKeys A, ITCertKeys B, and ITCertKeys C. You need to identify the appropriate combination of SQL Server instances and SQL Server 2005 computers that are needed to fulfill the companys consolidation plans and security requirements. Which combination should you use? A. one SQL Server 2005 computer with one instance B. two SQL Server 2005 computers, each with two instances C. two SQL Server computers, one with one instance and one with three instances D. one SQL Server 2005 computer with two instances Answer: D Question 8. You need to review the list of expected services for SQLCLUST and disable any nonessential services. Which two services should be disabled? (Each correct answer presents part of the solution. Choose two.) A. Cluster service B. World Wide Web Publishing service C. SQL Server Agent service D. Messenger service E. Server service Answer: B, D Question 9. You configure the new server named SQLCLUST with test versions of the Research, Engineering, and Parts databases. The data in these databases is for test purposes only and is not current. You need to move the new Research, Engineering, and Parts databases from the test stage to the production stage as efficiently as possible. Prior to making the databases available to users, which three actions should you perform? (Each correct answer presents part of the solution. Choose three.) A. Use the DELETE statement to remove all test data from the three databases. B. Run scripts on the production server to build all tables, views, and stored procedures. C. Schedule one or more jobs to move all data from the mainframe computer databases to the new databases. D. Build all indexes, and update the statistics on all tables. E. Manually move all data from the mainframe computer to the new databases by using the SELECT INTO command. Answer: B, C, D Question 10. You need to configure the security for the HR database to support current security needs, while minimizing the impact of future security changes that might be caused by user and table additions. Which two actions should you perform? (Each correct answer presents part of the solution. Choose two.) A. Grant the SELECT permission on all current tables to the public database role. B. Create an HR_Readers role, add all employees in the HR department to this role, and grant the SELECT permission on all current tables to this role. C. Add all employees to the db_datareader database role. D. Add all hiring managers to the db_datawriter database role. E. Create a Hiring_Managers role, add all hiring managers to this role, and grant the role the SELECT, INSERT, UPDATE, and DELETE permissions on the five tables the hiring managers need to manage. Answer: B, E
|
Question 1. You work as the database administrator at ITCertKeys.com. The ITCertKeys.com network consists of a single Active Directory domain named ITCertKeys.com. All servers on the ITCertKeys.com network run Windows Server 2003 and all client computers run Windows XP Professional. The ITCertKeys.com network contains a SQL Server 2005 database server named ITCertKeys-DB01. ITCertKeys-DB01 hosts a database named ITK_Sales that stores sales data for the company. ITCertKeys-DB01 also hosts two financial applications. You need to optimize the performance of ITCertKeys-DB01 and increase the performance of the two financial applications. You need to modify the SQL Server configuration to accomplish this goal. What should you do? A. Configure the max worker threads server option. B. Configure the min memory per query server option. C. Configure the max server memory server option. D. Configure the min server memory server option. Answer: C Explanation: The max server memory option is used to specify the maximum amount of system memory that SQL Server 2005 is allowed to consume. Setting this option will ensure that the SQL Server 2005 does not consume all the available memory and can be used to ensure that sufficient memory is remains available for the other applications to run. Incorrect Answers: A: The max worker threads option is used to specify the number of processor threads that are used to supported users connected to SQL Server. This does not assist in optimizing performance for other applications. B: The min memory per query option is used to specify the minimum amount of memory that is allocated to the execution of a query. This is useful if there are several concurrent queries but it does not assist in optimizing performance for other applications. D: The min server memory option is used to ensure that SQL Server 2005 does not release memory below the min server memory value once it is reached. This ensures that SQL Server 2005 always has sufficient memory but it will not ensure that the other applications have sufficient memory. Reference: Microsoft SQL Server 2005 Books Online (2007), Index: max server memory option Microsoft SQL Server 2005 Books Online (2007), Index: min server memory option Microsoft SQL Server 2005 Books Online (2007), Index: min memory per query option Microsoft SQL Server 2005 Books Online (2007), Index: max worker threads option Question 2. You work as the database administrator at ITCertKeys.com. The ITCertKeys.com network consists of a single Active Directory domain named ITCertKeys.com. All servers on the ITCertKeys.com network run Windows Server 2003 and all client computers run Windows XP Professional. The ITCertKeys.com network contains a SQL Server 2005 database server named ITCertKeys-DB01. ITCertKeys-DB01 hosts a database named ITK_Sales that stores sales data for the company. ITCertKeys-DB01 also hosts two financial applications. Several ITCertKeys.com users in the Sales department complain that queries against the ITK_Sales database perform very poorly at times. You use System Monitor to monitor the performance of by using ITCertKeys-DB01 and discover that SQL Server 2005 does not have sufficient memory to run efficiently. You need to ensure that SQL Server 2005 always has sufficient memory to run efficiently. What should you do? A. Decrease the min memory per query server option. B. Increase the min server memory server option. C. Increase the max worker threads server option. D. Decrease the max server memory server option. Answer: B Explanation: The min server memory option is used to ensure that SQL Server 2005 does not release memory below the min server memory value once it is reached. This ensures that SQL Server 2005 always has sufficient memory. By default, min server memory is set to 0. Incorrect Answers: A: The min memory per query option is used to specify the minimum amount of memory that is allocated to the execution of a query. This is useful if there are several concurrent queries. Decreasing this option will increase the possibility that the SQL Server 2005 will perform poorly. C: The max worker threads option is used to specify the number of processor threads that are used to supported users connected to SQL Server. Increasing this option will not address the memory problem. D: The max server memory option is used to specify the maximum amount of system memory that SQL Server 2005 is allowed to consume. Decreasing this option will increase the possibility that the SQL Server 2005 will perform poorly. Reference: Microsoft SQL Server 2005 Books Online (2007), Index: min server memory option Microsoft SQL Server 2005 Books Online (2007), Index: min memory per query option Microsoft SQL Server 2005 Books Online (2007), Index: max worker threads option Microsoft SQL Server 2005 Books Online (2007), Index: max server memory option Question 3. You work as the database administrator at ITCertKeys.com. The ITCertKeys.com network consists of a single Active Directory domain named ITCertKeys.com. All servers on the ITCertKeys.com network run Windows Server 2003 and all client computers run Windows XP Professional. The ITCertKeys.com network contains a SQL Server 2005 database server named ITCertKeys-DB01. ITCertKeys-DB01 hosts a database named ITK_Sales that stores sales data for the company. The tables in the ITK_Sales database are shown in the following database diagram. The recent increase in database usage at the company has resulted in several ITCertKeys.com users complaining of timeouts when they try to retrieve sales orders from the ITK_Sales database. You need to determine whether partitioning the Orders table would improve database performance. What should you do? (Each correct answer presents part of the solution. Choose TWO.) A. Run Database Engine Tuning Advisor. B. Create a performance log file to monitor SQL Server:Buffer Manager:Page reads/sec. C. Run SQL Server Profiler to replay the trace file and the log file. D. Use the SQL Server Profiler Tuning template to create a trace file. E. Create a performance log file to monitor Logical Disk: Disk Read Bytes/sec Answer: A, D Explanation: You can use the Database Engine Tuning Advisor to determine whether indexing and partitioning of a table would improve database performance. The Database Engine Tuning Advisor analyzes a workload file that you can create by running SQL Server Profiler and creating a trace based on the SQL Server Profiler Tuning template. Incorrect Answers: B: The SQL Server:Buffer Manager:Page reads/sec counter is used to monitor the read activity on an instance of SQL Server. It does not help you determine whether partitioning a table will improve database performance. C: You can use the SQL Server Profiler to analyze a trace file and a log file to determine which queries are causing excessive resource utilization. However, this information does not help you determine whether partitioning a table will improve database performance. E: The Logical Disk: Disk Read Bytes/sec counter is used to monitor the read activity on a logical disk. It does not help you determine whether partitioning a table will improve database performance. Reference: Microsoft SQL Server 2005 Books Online (2007), Index: Database Engine Tuning Advisor [SQL Server] Microsoft SQL Server 2005 Books Online (2007), Index: SQL Server Profiler Microsoft SQL Server 2005 Books Online (2007), Index: performance counters [SQL Server] Microsoft SQL Server 2005 Books Online (2007), Index: max server memory option Question 4. You work as the database administrator at ITCertKeys.com. The ITCertKeys.com network consists of a single Active Directory domain named ITCertKeys.com. All servers on the ITCertKeys.com network run Windows Server 2003 and all client computers run Windows XP Professional. The ITCertKeys.com network contains a SQL Server 2005 database server named ITCertKeys-DB01. ITCertKeys-DB01 hosts a database named ITK_Sales that stores sales data for the company. The tables in the ITK_Sales database are shown in the following database diagram. Several ITCertKeys.com users start complaining of slow response time when they run queries against the ITK_Sales database. You run the sys.dm_os_schedulers view on ITCertKeys-DB01 and discover that the runnable_tasks_count is consistently at or above ten. You run System Monitor on ITCertKeys-DB01 and receive the output as shown in the exhibit. You need to improve database performance. What should you do? A. Increase the Random Access Memory (RAM). B. Add an additional processor. C. Upgrade the disk subsystem. D. Use the Database Engine Tuning Advisor to suggest new indexes. Answer: B Explanation: The Processor:% Processor Time counter in the exhibit indicates that the processor is often running at over 80%. This indicates that the processor is causing a bottleneck. Adding an additional processor to the system will improve overall system performance. Incorrect Answers: A: The Memory:Avg. Disk Queue Length counter in the exhibit is low. This indicates that the RAM is not causing a bottleneck. Therefore, adding additional RAM to the system will not improve overall system performance. C: The PhysicalDisk:Pages/sec counter in the exhibit is low. This indicates that the disk subsystem is not causing a bottleneck. Therefore, upgrading the disk subsystem will not improve overall system performance. D: The Processor:% Processor Time counter in the exhibit indicates that the processor is often running at over 80%. This indicates that the processor is causing a bottleneck. Indexing the tables will not reduce the load on the processor and will not improve overall system performance. Reference: Microsoft SQL Server 2005 Books Online (2007), Index: CPU [SQL Server], monitoring Microsoft SQL Server 2005 Books Online (2007), Index: Database Engine Tuning Advisor [SQL Server] Question 5. You work as the database administrator at ITCertKeys.com. The ITCertKeys.com network consists of a single Active Directory domain named ITCertKeys.com. All servers on the ITCertKeys.com network run Windows Server 2003 and all client computers run Windows XP Professional. You use a client computer named ITCertKeys-WS444. The ITCertKeys.com network contains a SQL Server 2005 database server named ITCertKeys-DB01. ITCertKeys-DB01 hosts a database named ITK_Products. The recent increase in database usage at the company has resulted in several ITCertKeys.com users complaining of poor query performance and query timeouts try to retrieve data from the ITK_Products database. You need to determine the cause of the poor performance. You need to minimize the effect of your monitoring strategy on system performance. What should you do? A. Run the SQL Server Profiler from ITCertKeys-WS444 and create a trace that monitors ITCertKeys-DB01. Save the trace file to a table. B. Run the Performance tool on ITCertKeys-DB01 to create a log that monitors ITCertKeys – DB01. Save the log file to a folder on ITCertKeys-DB01. C. Run the SQL Server Profiler on ITCertKeys-DB01 and create a trace that monitors ITCertKeys -DB01. Save the trace file to a table. D. Run the Performance tool on ITCertKeys-WS444 to create a log that monitors ITCertKeys – DB01. Save the log file to a folder on ITCertKeys-WS444. Answer: D Explanation: You can use the Windows Performance tool on a client computer to monitor system performance on the database server without negatively affecting the performance of the database server. You can use the Windows Performance tool to create a log on the client computer that you can analyze to determine the cause of a resource bottleneck. Incorrect Answers: A, C: SQL Server Profiler is used to trace SQL Server events. It is not used to troubleshoot resource bottlenecks. B: You should run the Windows Performance tool from you client computer and save the log file to your computer. This will reduce the impact of monitoring on the database server. Reference: Microsoft SQL Server 2005 Books Online (2007), Index: CPU [SQL Server], monitoring Microsoft SQL Server 2005 Books Online (2007), Index: Database Engine Tuning Advisor [SQL Server] Question 6. You work as the database administrator at ITCertKeys.com. The ITCertKeys.com network consists of a single Active Directory domain named ITCertKeys.com. All servers on the ITCertKeys.com network run Windows Server 2003 and all client computers run Windows XP Professional. The ITCertKeys.com network contains a SQL Server 2005 database server named ITCertKeys-DB01. ITCertKeys-DB01 is running a default SQL Server instance and a named instance named ITK_Sales. ITCertKeys.com users complain that performance for both instances has deteriorated over the last six months. You want to determine the memory and processor resource requirements of the two instances as well as any resource conflicts between the two instances. What should you do? A. Use SQL Server Profiler to create a trace and capture typical activity for each instance with both instances running. B. Use Windows Performance to create counter log that captures performance counters for each instance with both instances running. C. Use Windows Performance to create counter log that captures performance counters for each instance separately with each instance running on its own. D. Use SQL Server Profiler to create a trace and capture typical activity for each instance separately with each instance running on its own. Answer: B Explanation: You can use the Windows Performance to monitor system performance on the database server but you must capture the counters with both instances running at the same time to collect accurate data. Incorrect Answers: A, D: SQL Server Profiler is used to trace SQL Server events. It is not used to troubleshoot memory and processor resource bottlenecks. C: Multiple SQL Server instances share system resources and interact with each other; therefore you must capture the counters with both instances running at the same time to collect accurate data. Question 7. DRAG DROP You work as the database administrator at ITCertKeys.com. The ITCertKeys.com network consists of a single Active Directory domain named ITCertKeys.com. All servers on the ITCertKeys.com network run Windows Server2003. The ITCertKeys.com network contains a SQL Server 2005 on a server named ITCertKeys-DB01. ITCertKeys-DB01 has five 120 GB hard disk drives. Two of the hard disks are configured as a mirrored volume that contains the operating system. The other three hard disks are configured as a RAID-5 volume. All database files are located on the RAID-5 volume while the transaction log files are located on the mirrored volume. ITCertKeys-DB01 is running a default SQL Server instance and a named instance named ITK_DB. The default instance hosts an Online Transaction Processing (OLTP) database named ITK_Sales while the named instance hosts historical data used for reporting. ITCertKeys.com users complain that database performance is deteriorating. You suspect that a disk problem might be causing the bottleneck. You want to determine which SQL Server instance is using the most disk time. What should you do? (To answer, select the appropriate performance counters that you should monitor in the left pane and drag them to the right pane.) Answer: Explanation: The SQL Server:Buffer Manager object is used to monitor resource usage for each SQL Server instance. You need to monitor the SQL Server:Buffer Manager:Page reads/sec counter to determine the number of page reads performed by each instance and the SQL Server:Buffer Manager:Page writes/sec counter to determine the number of page writes performed by each instance. Incorrect Answers: The Logical Disk:Disk Write Bytes/sec and Logical Disk:Disk Read Bytes/sec counters can be used to monitor the total number of disk reads or writes per second for a volume. Neither can be used to determine instance is using the most disk time. The PhysicalDisk counters can be used to monitor a RAID volume but this cannot used to determine instance is using the most disk time. Question 8. You work as the database administrator at ITCertKeys.com. The ITCertKeys.com network consists of a single Active Directory domain named ITCertKeys.com. All servers on the ITCertKeys.com network run Windows Server 2003 and all client computers run Windows XP Professional. The ITCertKeys.com network contains a SQL Server 2005 database server named ITCertKeys-DB01 that hosts a database named ITK_Sales. The ITK_Sales database stores sales data for the company. ITCertKeys.com users complain that the performance of the ITK_Sales database has deteriorated over the last few weeks. You use System Monitor to monitor the performance of ITCertKeys-DB01 and receive the output as shown in the exhibit. You also notice that the ratio of SQL Recompilations/sec to Batch Requests/sec is unusually high. You suspect that the number of recompiles is causing the high processor time value. You need to improve the performance of the ITK_Sales database. What should you do? A. Turn off automatic updates of statistics for all tables in the ITK_Sales database. B. Install an additional processor on ITCertKeys-DB01. C. Run the Database Engine Tuning Advisor. D. Use SQL Server Profiler to identify the stored procedures being recompiled. Answer: D Explanation: You can use SQL Server Profiler to identify the stored procedures that are being recompiled. SQL Profiler will indicate which stored procedures are being recompiled and why each recompilation is occurring. Incorrect Answers: A: Turning off automatic updates of statistics for the tables may improve performance but it does not address the problem caused by the recompiles. B: The high processor usage could be caused by the high number of recompiles. You should first reduce the number of recompiles before installing extra hardware on the server. C: You can use the Database Engine Tuning Advisor to determine whether indexing and partitioning of a table would improve database performance but you cannot use it to identify which stored procedures are being recompiled. Question 9. You work as the database administrator at ITCertKeys.com. The ITCertKeys.com network consists of a single Active Directory domain named ITCertKeys.com. All servers on the ITCertKeys.com network run Windows Server 2003 and all client computers run Windows XP Professional. The ITCertKeys.com network contains a SQL Server 2005 database server named ITCertKeys-DB01 that has a single 120 GB hard disk, 1 GB of random access memory (RAM), and has a single 2.8 GHz Pentium 4 processor. ITCertKeys-DB01 hosts a database named ITK_Sales that stores sales data for the company. ITCertKeys.com users complain that the performance of the ITK_Sales database has deteriorated over the last six months. You use System Monitor to monitor the performance of ITCertKeys-DB01 and receive the output as shown in the exhibit. You need to improve server performance. What should you do? A. Add an additional processor. B. Add more Random Access Memory (RAM). C. Upgrade the disk subsystem. D. Install a second hard disk and split data between the disks. Answer: B Explanation: A value of 62.8 for the SQL Server: Buffer Manager: Buffer Cache Hit Ratio counter indicates that the system requires more RAM. This counter should be above 90. A lower value indicates that you need more RAM. Incorrect Answers: A: A value of 43.8% for the Processor:% Processor Time and System:%Total Processor Time counters are well below the 80% threshold that indicates a processor problem. C, D: A value of 1.4 for the PhysicalDisk:Avg. Disk Queue Length is close to indicating a bottleneck, but this is probably caused by insufficient memory than by hard disk performance. Disk activity is likely to drop when you add more memory. Question 10. DRAG DROP You work as the database administrator at ITCertKeys.com. The ITCertKeys.com network consists of a single Active Directory domain named ITCertKeys.com. All servers on the ITCertKeys.com network run Windows Server 2003 and all client computers run Windows XP Professional. The ITCertKeys.com network contains a SQL Server 2005 database server named ITCertKeys-DB01 that has a RAID-5 disk array, 2 GB of random access memory (RAM), and has a single 3.2 GHz Xeon processor. ITCertKeys-DB01 hosts a database named ITK_Sales that stores sales data for the company. ITCertKeys.com users complain that the performance of the ITK_Sales database becomes sluggish at certain times of the day. You use System Monitor to monitor the performance of ITCertKeys-DB01 during a typical day and compare them to baseline results collected shortly after the database was deployed. You identify times during the day when the hardware resources on ITCertKeys-DB01 become a performance bottleneck. You need to determine which database activities are causing the hardware bottlenecks. You want to accomplish this using minimal amount of administrator effort and do not want to consume any more system resources than necessary. What should you do? (To answers, select the appropriate actions from the pane on the left and place them in the pane on the right.) Answer: Explanation: You should capture a SQL Profiler trace and Windows counter log over the same time period. You can open the trace in SQL Server Profiler and the counter log in the Windows Performance utility at the same time and compare the two.
|
Question 1. You work as DBA at ITCertKeys.com. You administer two Windows Server 2003 computers named ITCertKeys A and ITCertKeys B. You install SQL Server 2005 on both ITCertKeys A and ITCertKeys B to host a new company database. ITCertKeys A hosts a read-write copy of the company database in which all changes are made. ITCertKeys B subscribes to a publication on ITCertKeys A and is only used for reporting. A Windows domain administrator provides you with a domain user account named SQLSRV to use as the security context for the SQL Server services. A password policy of 42 days exists in the Default Domain Group Policy object (GPO). You install the database on ITCertKeys A and ITCertKeys B and configure replication. Everything works fine for six weeks, but then all SQL Server services fail. You need to correct the problem. What should you do? A. Ask the Windows domain administrator to grant the Log on as service right to the SQLSRV domain user account. B. Configure the SQLSRV domain user account with a new strong password. Configure the new password in the properties of each SQL Server service that failed. C. Create a local user account on ITCertKeys A named ITCertKeys A and a local user account on ITCertKeys B named ITCertKeys B. Configure ITCertKeys A and ITCertKeys B to run under the context of the appropriate local user account. D. Ask the Windows domain administrator to grant the SQLSRV domain user account membership in the Domain Admins group. Answer: B Explanation: The Default Domain Group Policy object requires that passwords are changed every 42 days. In order to correct this problem you have to change the password in the Active Directory AND configure the new password on both you SQL Servers to the newly changed password. Question 2. You are a database administrator of two SQL Server 2005 computers named ITCertKeys A and ITCertKeys B. You have a Microsoft .NET application that has been modified so that it now accesses a database on ITCertKeys B in addition to ITCertKeys A. You do not want the user application to connect directly to ITCertKeys B. You need to enable the data retrieval from ITCertKeys B while maintaining the ability to assign different permissions to different users who use the .NET application. What should you do? A. Change the .NET application to define a new server connection to ITCertKeys B. B. Configure a linked server on ITCertKeys A to point to ITCertKeys B. C. Change the stored procedures called by the .NET application to include the OPENXML command. D. Configure a linked server on ITCertKeys B to point to ITCertKeys A. Answer: B Explanation: SQL Server lets you access external data sources from your local Transact-SQL code. You need to define a linked server for each external data source you want to access and then configure the security context under which your distributed queries will run. After you create a linked server, you can use the Transact-SQL OPENQUERY function to execute your distributed queries. Question 3. You are a database administrator for ITCertKeys.com. Your company uses a different company's application that is based on SQL Server 2005 Standard Edition. The application executes a query that uses an index query hint. The index query hint is not suitable for your environment, but you cannot modify the query. You need to force the application to use a different query execution plan. What should you do? A. Create a plan guide for the query. B. Clear the procedure cache. C. Create a new covering index on the columns that the query uses. D. Update the statistics for all of the indexes that the query uses. Answer: A Over the past few years, Microsoft SQL Server has increased its presence in the industry and has reduced its TCO. This reduced TCO is a direct result, primarily, of the numerous self-tuning mechanisms built into Microsoft(r) SQL Server. These mechanisms automatically perform tasks that would otherwise have to be performed by experienced database administrators. One such mechanism is the cost-based optimizer (CBO) that is used to dynamically generate query execution plans. The CBO probes several system-wide resource states and employs many complex, heuristical algorithms to generate the best possible plan for a given query and the underlying table and index structures. This mechanism works well for the vast majority of user queries, but there are times when experienced users need to force a particular query plan, based on some prior knowledge or insights into future uses. Question 4. You are a database administrator for ITCertKeys.com. Your SQL Server 2005 computer contains one user database that holds sales transaction information. Users report that the queries and stored procedures that they use every day are taking progressively longer to execute. You also notice that the amount of free disk space on the SQL Server computer is decreasing. You need to create a maintenance plan to correct the performance and storage problems. What are two possible ways to achieve this goal? (Each correct answer presents a complete solution. Choose two.) A. In the SQL Server Maintenance Plan Wizard, use the Check Database Integrity option. B. In the SQL Server Maintenance Plan Wizard, use the Reorganize Index option. C. In the SQL Server Maintenance Plan Wizard, use the Shrink Database option. D. In the SQL Server Maintenance Plan Wizard, use the Clean Up History option. E. In the SQL Server Maintenance Plan Wizard, use the Execute SQL Server Agent Job option. Answer: B, C Explanation: When you indexes are not heavily fragmented you can reorganize indexes, which uses few system resources and runs automatically online. In SQL Server 2005, certain operations such as large delete operations or -one-time data loads might leave database files larger than they need to be. SQL Server 2005 enables a DBA to shrink each file within a database to remove unused pages and regain disk space. Question 5. You are a database administrator for ITCertKeys.com. You are responsible for a SQL Server 2005 database that has several indexes. You need to write a stored procedure that checks the indexes for fragmentation. Which Transact-SQL statement should you use? A. DBCC INDEXDEFRAG B. SELECT * FROM sys.dm_db_index_physical_stats C. SELECT * FROM sys.indexes D. DBCC DBREINDEX Answer: B Explanation: The index_physical_stats function takes five parameters: database_id, object_id, index_id, partition_id, and mode. This function returns row size and fragmentation information. Question 6. You work as DBA at ITCertKeys.com. You administer two SQL Server 2005 computers named ITCertKeys A and ITCertKeys B. ITCertKeys A and ITCertKeys B contain a copy of a database named Sales. The database is replicated between ITCertKeys A and ITCertKeys B by using transactional replication. A full backup of each database is performed every night. Transaction log backups are performed every hour. Replication latency is typically less than two minutes. One afternoon, the Sales database on ITCertKeys A becomes corrupted. You are unable to repair the database. The Sales database on ITCertKeys B is unaffected. You need to return the Sales database on ITCertKeys A to normal operation as quickly as possible. You must ensure a minimum loss of data and minimal impact to users of either server. What should you do? A. Perform a full database backup on ITCertKeys B. Restore the backup to ITCertKeys A. B. Restore the most recent full database backup and all transaction logs made since the full backup was made. C. Restore only the most recent transaction log backup. D. Detach the Sales database on ITCertKeys B. Copy the database file to ITCertKeys A, and attach the database on both servers. Answer: A Explanation: Detaching the database will not apply to the minimal impact on users as it will be offline during copy. Restoring only the latest transaction log will not give you a working database and restoring last full backup and all transaction logs after that will not apply to the restore normal operations as quickly as possible part of the requirements. Question 7. You are a database administrator for ITCertKeys.com. The company runs a popular database-driven Web site against a SQL Server 2005 computer named ITCertKeys B. You need to ensure a quick response time and appropriate audit trail in the event that ITCertKeys B experiences excessive traffic due to denial-of-service (DoS) attacks. Which two actions should you perform? (Each correct answer presents part of the solution. Choose two.) A. Configure the new performance alert to start a SQL Server Profiler trace. B. Create a new performance alert to monitor the Current Bandwidth counter. C. Configure the new performance alert to start a Network Monitor capture. D. Create a new performance alert to monitor the Bytes Total/sec counter. Answer: C, D Explanation: Using alerts, System Monitor tracks specific events and notifies you of these events as requested. An alert log can monitor the current performance of selected counters and instances for objects in SQL Server. When a counter exceeds a given value, the log records the date and time of the event. An event can also generate a network alert. Characteristic for a typical DoS attack is a large number of Bytes/sec. Characteristic for a DDoS attack is also a large number of Bytes/sec but also a large number of connections made from a large number of hosts. Question 8. You are a database administrator for ITCertKeys.com. One of the databases on a SQL Server 2005 computer contains a stored procedure. Users run this stored procedure to import data into a table. The stored procedure needs to use the TRUNCATE TABLE command before importing new data into the table. However, the users who run the stored procedure do not have permission to truncate the table. You need to provide a way for the stored procedure to truncate the table before it imports new data. What should you do? A. Configure the stored procedure to use the EXECUTE AS command. B. Configure the stored procedure to be owned by the same database user as the table. C. Assign the users DELETE permission in the table. D. Add the users to the db_datawriter fixed database role. Answer: A Explanation: In SQL Server 2005 you can implicitly define the execution context of the following user-defined modules: functions (except inline table-valued functions), procedures, queues, and triggers. By specifying the context in which the module is executed, you can control which user account the SQL Server 2005 Database Engine uses to validate permissions on objects that are referenced by the module. This provides additional flexibility and control in managing permissions across the object chain that exists between user-defined modules and the objects referenced by those modules. Permissions must be granted to users only on the module itself, without having to grant them explicit permissions on the referenced objects. Only the user that the module is running as must have permissions on the objects accessed by the module. Syntax: Functions (except inline table-valued functions), Stored Procedures, and DML Triggers { EXEC | EXECUTE } AS { CALLER | SELF | OWNER | 'user_name' } Question 9. You are a database administrator for ITCertKeys.com. You have separate SQL Server 2005 development and production environments. You use the Business Intelligence Development Studio to create a SQL Server Integration Services (SSIS) package in your development environment. Then, you use the SSIS package to import data into your development environment from one of your company's trading partners. You need to deploy the SSIS package to your production environment. Your production environment uses different table names than your development environment. What should you do? A. Save the SQL Server Integration Services (SSIS) package to a file. Copy the file to the production server. Configure the SSIS package on the production server to use the new file. B. Back up the master database and restore it to the production server. Rename the appropriate tables inside the master database. C. Create a SQL Server Integration Services (SSIS) package configuration. Build a deployment utility. Copy the deployment folder for your SSIS project to your production server. Execute the manifest file. D. Back up the msdb database and restore it to the production server. Rename the appropriate tables inside the msdb database. Answer: C Explanation: You have to use a SSIS package to accomplish this but you can not use the package built for your development environment as the table names differ. Question 10. You are a database administrator for ITCertKeys.com. You notice that one of the data files on a SQL Server 2005 computer is corrupted. You need to restore the database from the most recent set of backups. You want to perform this task as quickly as possible, with a minimum loss of data. What should you do first? A. Restore the most recent transaction log backup. B. Restore the most recent full database backup. C. Perform a full database backup. D. Perform a transaction log backup. Answer: D Explanation: In order to restore from the most recent set of backups, you have to first ensure that you can restore all transactions that have occurred between the time of the backup and the time when the database went corrupt. In order to accomplish this you should backup the transaction log.
|
Question 1. You work as the Microsoft.NET developer at ITCertKeys.com. The ITCertKeys.com network consists of a single Active Directory domain named ITCertKeys.com. All servers in the domain run Windows Server 2003. The access control to Web services is part of your responsibility. To this end you are currently exposing an existing class as an Extensible Markup Language (XML) Web service. You need to ensure that this Web service is accessible exclusively accessible to Web service clients within the ITCertKeys.com domain. To comply with this requirement you need to change the access modifiers on methods that must be exposed as Web methods. What should you do? A. For each Web method, use the Internal or Friend Access modifier. B. For each Web method, use the Private Access modifier. C. For each Web method, use the Public Access modifier. D. For each Web method, use the Protected Access modifier. Answer: C Explanation: Since only Public methods can be exposed as Web methods, you should make use of the Public Access modifier for each Web method. Incorrect answers: A: You cannot use the Internal or Friend Access method, only Public Access method can be exposed as Web methods. B: You cannot use the Private Access method, only Public Access method can be exposed as Web methods. D: You cannot use the Protected Access method, only Public Access method can be exposed as Web methods. Question 2. You work as the Microsoft.NET developer at ITCertKeys.com. The ITCertKeys.com network consists of a single Active Directory domain named ITCertKeys.com. All servers in the domain run Windows Server 2003. The development and deployment of Extensible Markup Language (XML) Web Services forms part of your responsibilities at ITCertKeys.com. The following exhibit illustrates a class definition: Exhibit: public class MarketService { internal string ObtainMarket(string mobilePhoneNumber) { return string.Empty; } } You received instruction to modify this class so that it becomes a Web service, a Web service that will allow internal applications to invoke ObtainMarket as a Web method. You need to ensure that the Web method does not make use of session state and that it must make use of the default namespace. What should you do? A. Change the access modifier for the ObtainMarket method to Public. Then apply the WebService attribute to the MarketService class. B. Change the access modifier for the ObtainMarket method to Protected. Then apply the WebMethod attribute to the ObtainMarket method. C. Change the access modifier for the ObtainMarket method to Public. Then apply the WebMethod attribute to the ObtainMarket method. D. Derive the MarketService class from SoapHttpClientProtocol. Then apply the WebMethod attribute to the ObtainMarket method. E. Derive the MarketService class from WebService. Then apply the WebMethod attribute to the ObtainMarket method. Answer: C Explanation: Only public methods can be exposed as Web methods. Thus you need to change the access modifiers to public. And you should also apply the WebMethod attribute to the ObtainMarket method as this attribute will indicate that the public method should be exposed as Web methods. Incorrect answers: A: The WebService attribute will allow you to specify the namespace and description for the Web service. This is not required to invoke Web methods. (In cases where no namespace has been specified, use will be made of the default namespace.) B: Since only Public methods can be exposed as Web methods, you should not change the access modifier to Protected. D: The SoapHttpClientProtocol base class allows for Web service clients to make SOAP calls to Web methods. This is not what is required. E: The WebService base class is an optional class as it provides direct access to session and application instances for session state. It is mentioned in this question that the Web methods does not make use of session state. Question 3. You work as the Microsoft.NET developer at ITCertKeys.com. The ITCertKeys.com network consists of a single Active Directory domain named ITCertKeys.com. All servers in the domain run Windows Server 2003. The following exhibit illustrates the class definition for a data processing Web service: Exhibit: [WebService(Namespace-"urn:DataProcessingService")] Public class DataProcessingService : Webservice { [WebMethod(MessageName-"ProcessDataSet")] Public void Process(DataSet dataset) { } } You have been instructed to apply an attribute to the Process method that will result in an immediate return to the caller without invoking a SOAP response. You need to ensure that the attribute that you apply in your solution is Web Services-Interoperability (WS-1) compliant. You thus need to make use of a code segment. What should you do? A. Use the [OneWay] code segment. B. Use the [WebMethod(BufferResponse=false)] code segment. C. Use the [WebMethod(BufferResponse=true)] code segment. D. Use the [SoapDocumentMethod(OneWay=true)] code segment. E. Use the [SoapRpcMethod(OneWay=true)] code segment. Answer: D Explanation: If you want the Web method to be WS-1 compliant then you should apply the SoapDocumentMethod attribute to the Process method. Setting the attribute of the OneWay property to true indicates an immediate return to the caller without a response when it is invoked. Incorrect answers: A: You should not apply the OneWay attribute to the Process method. This attribute is used with .NET Remoting components when a method should immediately return to the caller without a return value. B: You should not apply a second Web method. Only one WebMethod attribute can be applied to a Web method. Furthermore, the BufferResponse property of the WebMethod attribute does not determine if execution returns to the caller immediately when the associated method is invoked. It determines whether the entire response is placed in memory before it is sent to the caller. However, in this case no responses should be returned. C: One does not apply a second Web method as suggested in this option. E: RPC style is not WS-1 compliant. Question 4. You work as the Microsoft.NET developer at ITCertKeys.com. The ITCertKeys.com network consists of a single Active Directory domain named ITCertKeys.com. All servers in the domain run Windows Server 2003. ITCertKeys.com is a Publishing and distribution company and works in joint ventures with many book stores that carries it products. The provision of stock on hand updates to third party companies (the book stores) forms part of your responsibilities at ITCertKeys.com. You are currently developing an Extensible Markup Language (XML) Web Service that provides stock on hand updates. To this end you created a Web method named GetStock that accesses the third party company's XML Web service to retrieve the required information. Following are some factors that you need to keep in mind: 1. The third parties' XML Web Service updates it information regarding stocks once every hour. 2. ITCertKeys.com is charged for each call to the third party Web service. It is thus essential that you limit the number of calls that the ITCertKeys.com Web service makes to the third party company's Web service: 1. Thus you apply the Webmethod attribute to the GetStock method. 2. You need to configure the attribute to limit the number of calls to the third party Web service. 3. You must ensure that no cookies are required. What should you do? A. The CacheDuration property should be set to 3600 B. The EnableSession property should be set to true. C. The MessageName property should be set to "ClientCache". D. The BufferResponse property should be set to false. Answer: A Explanation: This property specifies the number of seconds that a response from a Web method should be cached on a server. With this property set to 3600, you will limit the number of calls to the third party Web service by limiting the number of invocations of your GetStock Web method to once every hour. Incorrect answers: B: The EnableSession property indicates whether a session should be enabled to the Web method. Server-side session state, which includes the Application and Session objects, can use a lot a memory on the Web server. Session state requires the use of cookies as well. Thus you should not use this property. C: The MessageName property distinguishes overloaded Web methods. In Web services Description Language (WSDL) documents, each Web method must be named uniquely and the MessageName property is involved in meeting this requirement. This is not what should happen in this scenario. D: The BufferResponse property determines whether the entire response is placed in memory on the server before it is sent to the Web Service client. You should thus not set this property to false. Question 5. You work as the Microsoft.NET developer at ITCertKeys.com. The ITCertKeys.com network consists of a single Active Directory domain named ITCertKeys.com. All servers in the domain run Windows Server 2003. The Extensible Markup Language (XML) Web service development forms part of your responsibilities at ITCertKeys.com. You are currently developing an Extensible Markup Language (XML) Web Service that contains four Web methods. Each of these four methods accepts a different number of parameters and each method is configured to make use of remote procedure call (RPC) SOAP formatting. You must ensure that each of these four Web methods is capable of being exposed as a Web method by the Web service. What should you do? A. The SoapDocumentMethod attribute should be applied to each of the four methods. Then set the RequestNamespace property of each attribute to a different value. B. The WebService attribute should be applied to the Web service's class. Then set the Namespace property of the attribute to "RPC". C. The WebMethod attribute should be applied to each of the four web methods. Then set the MessageName property of each attribute to a different value. D. The SoapRpcService attribute should be applied to the Web service's class. Then set the RoutingStyle property of the attribute to SoapServiceRoutingStyleRequestElement. Answer: C Explanation: When you overload Web methods, you need to specify a distinct message name for each web method because Web Services Description Language (WSDL) does not support overloaded operations. You thus need to apply the WebMethod attribute to each of the four methods and set the MessageName property of each of these attributes to a different value. Incorrect answers: A: Because the Web methods must make use of RPC formatting, you should apply the SoapRpcMethod attribute to each of the four methods, you cannot apply both a SoapDocumentMethod attribute and a SoapRpcMethods attribute to the same method. B: The Namespace attribute of the WebService attribute allows you to designate an XML namespace for the operations that are supported by the Web Service, not to ensure exposure. D: Though it is possible to apply the SoapRpcService attribute to the class OR the SoapRpcMethod attribute to each method to support RPC formatting, it does not allow for overloaded methods to be exposed as Web methods. In this case the methods are already configured to make use of RPC formatting which actually indicates that one of the two attributes is already applied. Question 6. You work as the Microsoft.NET developer at ITCertKeys.com. The ITCertKeys.com network consists of a single Active Directory domain named ITCertKeys.com. All servers in the domain run Windows Server 2003. The development and deployment of Extensible Markup Language (XML) Web Services forms part of your responsibilities at ITCertKeys.com. The following exhibit illustrates a class definition in a Web service project: Exhibit: public class MarketService { public Point ObtainMarket(string mobilePhoneNumber) { throw new soapException("Not implemented", New XmlQualifiedName("error")); } } You have received instruction to configure the class in such a way so as to allow SOAP clients to invoke the ObtainMarket method. What should you do? A. The class should be derived from WebService. B. The class should be derived from SoapHttpClientProtocol. C. The WebMethod attribute should be applied to the method. D. The WebService attribute should be applied to the class. Answer: C Explanation: The Webmethod attribute applied to the method will indicate that a public method should be exposed as a Web method of a Web service. Thus you should apply the WebMethod attribute to the method. Incorrect answers: A: Since the WebService base class is optional, and it provides direct access to the Session and Application instances, you should not derive the class from WebService. B: You should derive a proxy class from this class in a SOAP client application. This will allow the client application to make SOAP calls via the proxy class to the Web service. Thus you should not derive the class from SoapHttpClientProtocol. D: The WebService attribute will allow you to specify a namespace and description for the Web service; you should not apply the WebService attribute to the class. Question 7. You work as the Microsoft.NET developer at ITCertKeys.com. The ITCertKeys.com network consists of a single Active Directory domain named ITCertKeys.com. All servers in the domain run Windows Server 2003. The development and deployment of Extensible Markup Language (XML) Web Services forms part of your responsibilities at ITCertKeys.com. The following exhibit illustrates a configuration. Exhibit:You have just added the above configuration to a new file by means of using a text editor. You need to save this file to a production server to provide the Web service discovery. What should you do? A. Use the .disco extension to save the file. B. Use the .vsdisco extension to save the file. C. Use the .wsdl extension to save the file. D. Use the .asmx extension to save the file. Answer: B Explanation: Dynamic discovery documents are denoted by a file with .vsdisco extension. This will allow the Web service client to discover all Web services that exist at and below the virtual directory that contains the document. You should thus save the file using a .vsdisco extension. Incorrect answers: A: The .disco extension is used to denote a static discovery document. This will not suffice under the circumstances. C: The .wsdl extension represents files what are Web Services Description Language (WSDL) documents. You should not make use of this extension to save the file to the production server. D: The .asmx extension represents a Web service endpoint. These types of files thus so not allow for dynamic discovery. Question 8. You work as the Microsoft.NET developer at ITCertKeys.com. The ITCertKeys.com network consists of a single Active Directory domain named ITCertKeys.com. All servers in the domain run Windows Server 2003. The development and deployment of Extensible Markup Language (XML) Web Services forms part of your responsibilities at ITCertKeys.com. After receiving instruction you have just finished developing an ASP.NET Web application named WebServices. WebServices contains the Web services for each of the ITCertKeys.com clients. Microsoft Internet Information Services (IIS) 6.0 is hosting the Web application. And the Web application is configured in such a way so as to map host header names to client-specific virtual directories. Each ITCertKeys.com client has its own virtual directory. These virtual directories are located in a root virtual directory named WebServices. The following exhibit illustrates an example of the virtual directory structure: Exhibit: WebSite WebServices (Web Application) Client A (VirtualDirectory) WebService1.asmx WebService2.asmx Client B (VirtualDirectory) WebService3.asmx WebService4.asmx Client C (VirtualDirectory) WebService5.asmx WebService6.asmx You received further instructions to ensure that all ITCertKeys.com clients have the ability to discover all of the Web services that are implemented in the Web application for that client. You need to accomplish this task while also making provision for those Web services that is intended for future implementation. However, you also need to ensure that the ITCertKeys.com clients should not have the ability to discover implemented Web services intended for other clients. What should you do? (Each correct answer presents part of the solution. Choose two.) A. A .vsdisco file should be added to each ITCertKeys.com client's virtual directory. B. A .disco file should be added to each ITCertKeys.com client's virtual directory. C. Both a .vsdisco and a .disco file should be added to the WebServices directory D. No .vsdisco or .disco files should be placed in the WebServices directory. E. A .vsdisco file should be placed in the WebServices directory. Answer: A, D Explanation: A file with a .vsdisco extension will allow for dynamic discovery. This will result in the ITCertKeys.com clients having the ability to discover all the Web services that exist at en below the virtual directory that contains the document. This means that each client will be able to discover all Web services that exist at and below its own virtual directory. Incorrect answers: B: You should not place a .disco file to each ITCertKeys.com client's virtual directory because this is a static discovery document. You should manually specify the Web services that should be discovered in this document and the clients will then not be able to automatically discover the Web services that will be added in the future. C: You should not place a .disco or a .vsdisco file in the WebServices directory. This will result in the violation of one of the requirements in the questions that states the no one ITCertKeys.com client should be able to discover Web services that are not intended for that specific client. E: You should not place a .vsdisco file in the WebServices directory because you do not want the ITCertKeys.com clients to be able to discover the Web services that are not implemented for them. Question 9. You work as the Microsoft.NET developer at ITCertKeys.com. The ITCertKeys.com network consists of a single Active Directory domain named ITCertKeys.com. All servers in the domain run Windows Server 2003. The development and deployment of Extensible Markup Language (XML) Web Services forms part of your responsibilities at ITCertKeys.com. After receiving instructions you have just completed the development and the deployment of an Extensible Markup Language (XML) Web service application. This XML Web service application contains ten (10) Web services. At present dynamic discovery on the Web server that hosts the application has been disabled. To this end you now need to configure the Web.config file of the application to allow Web service clients the ability to dynamically discover all the Web services. You also want to ensure that the Web service clients will be able to discover any future Web services that will be added. What should you do? (Choose the correct configuration.) A. B. C. D. Answer: B Explanation: An Http handler should be added for all .vsdisco files. DiscoveryRequestHandler is the default handler class in ASP.NET 2.0. A file with the .vsdicso extension will allow a Web service client to dynamically discover all Web services that exist at and below the virtual directory that contains the document. Incorrect answers: A: A .disco file extension denotes a static discovery document. You will need to manually specify the Web services that should be discovered in this document. This will result in clients being unable to automatically discover the Web services that will be added in future. C: A .wsdl handler denotes a Web Services Description Language (WSDL) document. This type of file will not provide for dynamic discovery of Web services. D: An .asmx handler denotes a Web service endpoint and will thus not provide clients with the ability to automatically discover Web services. Question 10. You work as the Microsoft.NET developer at ITCertKeys.com. The ITCertKeys.com network consists of a single Active Directory domain named ITCertKeys.com. All servers in the domain run Windows Server 2003. The development and deployment of Extensible Markup Language (XML) Web Services forms part of your responsibilities at ITCertKeys.com. After receiving instructions, you have just finished developing and deploying public and private Extensible Markup Language (XML) Web services to a production server. This production server has been configured with Microsoft Internet Information Services (IIS) 6.0. The Web services are located on different IIS virtual directories. Each of these IIS virtual directories hosts either public Web services or private Web services, but not both. Part of the instructions that you received also states that Web service clients must have the ability to discover the public Web services dynamically, but not the private Web services. The Web Service clients should also be granted the ability to ability to dynamically discover any new public Web services that are added to an existing virtual directory. To this end you now need to configure the server to meet these requirements. You should take care that your configuration does not prevent the discovery of Web services in new virtual directories unless you reconfigure the server. What should you do? (Each correct answer presents part of the solution. Choose three.) A. Add a .disco file to the Web site's virtual root directory. B. Add a .vsdisco file to the Web site's virtual root directory. C. Do not add .vsdisco files anywhere on the server. D. Add the .vsdisco files to each virtual root directory that exposes public Web services. E. Configure the .disco file with reference to each public Web service. F. Configure the .disco file with reference to each .vsdisco file. Answer: A, D, F Explanation: You need to add a static discovery document, i.e. a .disco file to the IIS root directory and dynamic discovery documents, i.e. .vsdisco files to each virtual directory that exposes public Web services. This way you can ensure that Web service clients have the ability to only discover the public Web services. Incorrect answers: B: You should not add .vsdisco files to the IIS root directory. C: Adding a .vsdisco file anywhere on the server will expose the private Web services. E: .disco files should not be configured to reference to each public Web service. This means that Web clients will not be able to not automatically discover new Web services that are added to existing virtual directories.
Copyright © 2004 CertsBraindumps.com Inc. All rights reserved.