What should you set the Client Configuration to when configu

题目
单选题
What should you set the Client Configuration to when configuring the ODBC Data Source for the Database Subsystem?()
A

TCP/IP  

B

Multiprotocol  

C

Named Pipes  

D

NWLink IPX/SPX

如果没有搜索结果或未解决您的问题,请直接 联系老师 获取答案。
相似问题和答案

第1题:

When you find you make a mistake in the chat room, what should you do?

_____________________________________________________________________________


正确答案:
 I should correct myself and apologize to those that I have offended.

第2题:

You plan to use Windows PowerShell scripts to configure system settings when you deploy Windows 7.   You need to ensure that Windows PowerShell scripts will run on the client computers during initial setup.   What should you do?()

  • A、Set the script execution policy to RemoteSigned.
  • B、Set the script execution policy to AllSigned.
  • C、Set the script execution policy to Restricted.
  • D、Use Group Policy preferences.

正确答案:A

第3题:

You want to debug the Windows Communication Foundation (WCF) client and server interaction through message and application tracing.You need to correlate traces generated on the client and the server. Which XML segment should you add to the system.diagnostics configuration element in the client and server application configuration file?()

A.

B.

C.

D.


参考答案:A

第4题:

Your network consists of a single Active Directory domain. You have a DHCP server named DHCP1 that runs Windows Server 2003 Service Pack 2 (SP2). All client computers run Windows XP Service Pack 3 (SP3). All client computers are configured as DHCP clients. You change the IP address on DHCP1. Users report that they cannot connect to the network. You verify that the client computers do not receive an IP address configuration from DHCP1. You need to ensure that the client computers receive an IP address configuration from DHCP1.  What should you do on DHCP1? ()

  • A、Authorize the server.
  • B、Reconcile the scope.
  • C、Enable conflict resolution.
  • D、Restore the server configuration by using the DHCP snap-in.

正确答案:A

第5题:

You work in a company which uses SQL Server 2008. You are the administrator of the company database. Now you are in charge of a SQL Server 2008 instance. There are queries that have an estimated execution cost less than 3. You intend to configure the instance, make it use a single thread for these queries. In the options below, which sp_configure configuration option should you set?()

  • A、You should set query governor cost limit
  • B、You should set cost threshold for parallelism
  • C、You should set priority boost 
  • D、You should set precompute rank

正确答案:B

第6题:

A Windows Communication Foundation (WCF) service has a callback contract. You are developing a client application that will call this service. You must ensure that the client application can interact with the WCF service. What should you do? ()

  • A、 On the OperationContractAttribute, set the AsyncPattern property value to True.
  • B、 On the OperationContractAttribute, set the ReplyAction property value to the endpoint address of the client. For interactive and self-paced preparation of exam 70-513, try our practice exams. Practice exams also include self assessment and reporting features!
  • C、 On the client, create a proxy derived from DuplexClientBase(Of TChannel).
  • D、 On the client, use GetCallbackChannel(Of T).

正确答案:C

第7题:

You just purchased a refurbished router that contains a configuration from a previous deployment. What should you do, before entering a new configuration into the router?()

  • A、RAM should be erased and the router restarted.
  • B、Flash should be erased and the router restarted.
  • C、NVRAM should be erased and the router restarted.
  • D、The new configuration should be entered and saved.

正确答案:D

第8题:

You are developing a Windows Communication Foundation (WCF) service. The service needs to access out-of-process resources.You need to ensure that the service accesses these resources on behalf of the originating caller. What should you do?()

A. Set the value of ServiceSecurityContext.Current.WindowsIdentity.ImpersonationLevel to TokenlmpersonationLevel.Impersonation

B. Set the value of ServiceSecurityContext.Current.Windowsldentity.ImpersonationLevel to TokenlmpersonationLevel.Delegation

C. Set the PrincipalPermissionAttribute on the service contract and update the binding attribute in the endpoint element of the configuration file to wsHttpBinding

D. Set the PnncipalPermissionAttribute on the service contract and update the bindingConfiguration attribute in the endpoint element of the configuration file to wsHttpBinding


参考答案:B

第9题:

You are creating a Windows Communication Foundation (WCF) service. The service endpoints change frequently. On the service, you add a new ServiceDiscoveryBehavior to the Behaviors collection of the ServiceHost Description property. You need to ensure that client applications can communicate with the service and discover changes to the service endpoints. What should you do?()

  • A、Add a new ServiceDiscoveryBehavior to the Behaviors collection in the client application.
  • B、Add a new AnnouncementClient to the Behaviors collection in the client application.
  • C、Use the FindCriteria class and the UdpDiscoveryEndpoint class to set up the binding in the client application.
  • D、Use the DiscoveryProxy class and the EndpointDiscoveryMetadata class to set up the binding in the client application.

正确答案:C

第10题:

A user named Marie uses a Windows 2000 Professional computer named Client1 to process payroll records. Marie reports that she can no longer run her financial applications. You determine that file permissions have been applied incorrectly to her computer. You want to configure Client1 to have the same security configuration and file permission settings that were applied when the computer was installed.  What should you do?()

  • A、Grant usersFull Controlpermission to the C drive and all child folders
  • B、Use the Recovery Console to restore system files
  • C、Use Security Configuration and Analysis to apply the Secure security template to Client1
  • D、Use Security Configuration and Analysis to apply the Default security template to Client 1

正确答案:D

更多相关问题