During the implement

题目

During the implement phase, systems acceptance testing does which of the following for the customer? Select exactly 1 answer(s) from the following:()。

  • A、installation, configuration, and testing, as well as the commissioning of tools and processes in accordance with the operations implementation plan
  • B、provision of information regarding customer-specified design requirements and configuration
  • C、the migration of network services from an existing state to a future state in accordance with the migration plan
  • D、the provision of an objective means of measuring system operability and functionality
如果没有搜索结果或未解决您的问题,请直接 联系老师 获取答案。
相似问题和答案

第1题:

An administrator has been having problems with server security. Many of the servers have been infected with viruses in the past. Which of the following can be done to ensure that systems avoid OS exploits?()

A. Implement an intrusion detection system (IDS).

B. Implement a dual-factor authentication method.

C. Implement a patch management process.

D. Implement stronger user passwords.


参考答案:C

第2题:

You are the administrator of a SQL Server 2000 computer. Your company purchased an accounting application from a vendor. The application stores its data in a database named Accounting on the server. The tables in this database contain columns that function as primary keys, but PRIMARY KEY and FOREIGN KEY constraints are not used.

You need to replicate data from this database to another SQL Server computer. This server will use the replicated data to generate reports. Most reports will run each month, but the accounting department needs to have the ability to run reports at any time. Reports should be accurate through the last full working day.

You cannot make any changes to the database, but you need to implement replication. Which two actions should you take? (Each correct answer presents part of the solution. Choose two)

A.Implement merge replication.

B.Implement snapshot replication.

C.Implement transactional replication.

D.Schedule replication to run continuously.

E.Schedule replication to run during off-peak hours.


正确答案:BE
解析:Explanation:
B: Snapshot replication is the best solution since we will not be making changes to the Accounting database but need to replicate data from the database to another SQL Server computer and as the accounting department needs to have the ability to run reports that only need to be accurate through the last full working day.

E: Only one snap-shot replication would be necessary per day, and to make as little impact on the daily use of the server this replication should be scheduled during off-peak hours.

Note: SQL Server 2000 provides three types of replication that can be used in distributed applications. These are snapshot replication, transactional replication and merge replication. Each type provides different capabilities.

Snapshot replication is the process of copying and distributing data and database objects exactly as they were at the time the snapshot was taken. Snapshot replication does not require continuous monitoring of changes because changes made to published data are not propagated to the Subscriber incrementally. Subscribers are updated with a complete data set and not individual transactions. As snapshot replication replicates an entire data set at one time, it may take longer to propagate data modifications to Subscribers. This type of replication in helpful in situations when data is mostly static and does not change often; it is acceptable to have copies of data that are out of date for a period of time; replicating small volumes of data; and when sites are often disconnected and high latency (the amount of time between when data is updated at one site and when it is updated at another) is acceptable.

In transactional replication, an initial snapshot of data is propagated to Subscribers, and then when data modifications are made at the Publisher, the individual transactions are captured and propagated to Subscribers. SQL Server 2000 monitors INSERT, UPDATE, and DELETE statements, and changes to stored procedure executions and indexed views. SQL Server 2000 stores the transactions affecting replicated objects and then it propagates those changes to Subscribers continuously or at scheduled intervals. Transaction boundaries are preserved. Transactional replication is used when data modifications must be propagated to Subscribers, often as they occur; transactions must be atomic; subscribers are mostly connected to the Publisher and when the application will not tolerate high latency for Subscribers receiving changes.

Merge replication allows various sites to work autonomously and merge data modifications made at multiple sites into a single, uniform. result at a later time. The initial snapshot is applied to Subscribers and then SQL Server 2000 tracks changes to published data at the Publisher and at the Subscribers. The data is synchronized between servers either at a scheduled time or on demand. Updates are made independently at more than one server, so the same data may have been updated by the Publisher or by more than one Subscriber. Therefore, conflicts can occur when data modifications are merged. This type of replication is helpful when multiple Subscribers need to update data at various times and propagate those changes to the Publisher and to other Subscribers; Subscribers need to receive data, make changes offline, and synchronize changes later with the Publisher and other Subscribers; the application latency requirement is either high or low, and when site autonomy is critical.

Incorrect Answers:
A: No data at the second server will not be changed so there is no need to use merge replication.

C: We don’t need the accuracy of transactional replication. In this scenario high latency is permissible as the reports must be accurate only through the last full working day.

Note: Transactional replication is used when data modifications must be propagated to Subscribers, often as they occur; transactions must be atomic; subscribers are mostly connected to the Publisher and when the application will not tolerate high latency for Subscribers receiving changes.

D: As the reports must be accurate through the last full working day, it not necessary to run replication continuously. Running replication continuously will place locks on the destination database, which would hamper the performance of queries and actions run against the destination database.

第3题:

Which of the following is true about job chains?()

A. They consist of one or more Scheduler programs.

B. They are used to implement dependency scheduling.

C. They are used to implement time-based scheduling.

D.They are used to implement event-based scheduling.

E.None of the above.


参考答案:B

第4题:

You need to design a PKI solution that meets business and security requirements. What should you do?()

  • A、Implement an enterprise root CA in the corp.woodgrovebank.com domain.Implement subordinate CAs in each child domain. Take the root CA offline
  • B、Implement an enterprise root CA in the corp.woodgrovebank.com domain
  • C、Implement an enterprise root CA in each of the child domains. Take the enterprise CA in each domain offline
  • D、Implement an enterprise root CA in the corp.woodgrovebank.com domain. Implement a stand-alone root CA in each of the child domains

正确答案:A

第5题:

What are two methods of mitigating MAC address flooding attacks?()

  • A、Place unused ports in a common VLAN.
  • B、Implement private VLANs.
  • C、Implement DHCP snooping.
  • D、Implement port security.
  • E、Implement VLAN access maps.

正确答案:D,E

第6题:

Which of the following is the BEST way to allow web software through the server firewall?()

A. Implement an application exception.

B. Implement an access control list (ACL).

C. Open the corporate firewall to allow port 80.

D. Implement port blocking on port 80.


参考答案:B

第7题:

下列各宏命令中,应该放在类实现中以支持序列化特性的宏命令是()。 

  • A、IMPLEMENT_DYNAMIC(class_Name)
  • B、IMPLEMENT_DYNCREATE(class_Name)
  • C、IMPLEMENT_SERIAL(class_Name)
  • D、IMPLEMENT_MESSAGE_MAP()

正确答案:C

第8题:

Extends与implement


正确答案:
              

第9题:

Which two service components are performed during the wireless implement phase?()

  • A、project planning
  • B、configuration management
  • C、wireless readiness assessment
  • D、systems acceptance testing
  • E、site readiness specification

正确答案:A,D

第10题:

You are developing a Windows Communication Foundation (WCF) service. One of the parameters used with the service operations is a security token. The security token is not sensitive. The monitoring software tracks security tokens and can read tokens in clear text only.The company security policy requires that you validate all clear text data passed over the corporate network.You need to ensure that the service verifies that the security token is not changed during transit. What should you do?()

  • A、For all the security-sensitive members, set the ProtectionLevel parameter of the MessageBodyMember or MessageHeader attribute to EncryptAndSign.
  • B、Implement IEndpointldentityProvider in the message contract class.
  • C、Implement ISecureConversationSession in the message contract class.
  • D、For all the security-sensitive members, set the ProtectionLevel parameter of the MessageBodyMember or MessageHeader attribute to Sign.

正确答案:D

更多相关问题