During the implement phase, systems acceptance testing does which of the following for the customer? Select exactly 1 answer(s) from the following:()。
第1题:
An administrator has been having problems with server security. Many of the servers have been infected with viruses in the past. Which of the following can be done to ensure that systems avoid OS exploits?()
A. Implement an intrusion detection system (IDS).
B. Implement a dual-factor authentication method.
C. Implement a patch management process.
D. Implement stronger user passwords.
第2题:
You are the administrator of a SQL Server 2000 computer. Your company purchased an accounting application from a vendor. The application stores its data in a database named Accounting on the server. The tables in this database contain columns that function as primary keys, but PRIMARY KEY and FOREIGN KEY constraints are not used.
You need to replicate data from this database to another SQL Server computer. This server will use the replicated data to generate reports. Most reports will run each month, but the accounting department needs to have the ability to run reports at any time. Reports should be accurate through the last full working day.
You cannot make any changes to the database, but you need to implement replication. Which two actions should you take? (Each correct answer presents part of the solution. Choose two)
A.Implement merge replication.
B.Implement snapshot replication.
C.Implement transactional replication.
D.Schedule replication to run continuously.
E.Schedule replication to run during off-peak hours.
第3题:
A. They consist of one or more Scheduler programs.
B. They are used to implement dependency scheduling.
C. They are used to implement time-based scheduling.
D.They are used to implement event-based scheduling.
E.None of the above.
第4题:
You need to design a PKI solution that meets business and security requirements. What should you do?()
第5题:
What are two methods of mitigating MAC address flooding attacks?()
第6题:
A. Implement an application exception.
B. Implement an access control list (ACL).
C. Open the corporate firewall to allow port 80.
D. Implement port blocking on port 80.
第7题:
下列各宏命令中,应该放在类实现中以支持序列化特性的宏命令是()。
第8题:
Extends与implement
第9题:
Which two service components are performed during the wireless implement phase?()
第10题:
You are developing a Windows Communication Foundation (WCF) service. One of the parameters used with the service operations is a security token. The security token is not sensitive. The monitoring software tracks security tokens and can read tokens in clear text only.The company security policy requires that you validate all clear text data passed over the corporate network.You need to ensure that the service verifies that the security token is not changed during transit. What should you do?()