1z0-599

单选题A customer has a WebTrade application that initially uses the embedded LDAP to authenticate users. To enhance security, the customer decides to use OAM to authenticate some of the users against an external LDAP store. For this to work, a customer confi

题目
单选题
A customer has a WebTrade application that initially uses the embedded LDAP to authenticate users. To enhance security, the customer decides to use OAM to authenticate some of the users against an external LDAP store. For this to work, a customer configured an OAMAuthenticator, but was not sure what to select for the Control Flag. What Control Flag should the customer choose?()
A

OPTIONAL

B

REQUISITE

C

REQUIRED

D

SUFFICIENT

E

MANDATORY

如果没有搜索结果,请直接 联系老师 获取答案。
如果没有搜索结果,请直接 联系老师 获取答案。
相似问题和答案

第1题:

Which two statements apply to dynamic access lists?()

A.they offer simpler management in large internetworks.

B.you can control logging messages.

C.they allow packets to be filtered based on upper-layer session information.

D.you can set a time-based security policy.

E.they provide a level of security against spoofing.

F.they are used to authenticate individual users.


参考答案:A, F

第2题:

A customer wants to know what version of DirectX the current workstation has installed. Which of the following command line tools would the customer use?()

  • A、edit
  • B、systeminfo
  • C、gpedit.msc
  • D、dxdiag

正确答案:D

第3题:

A frustrated and angry customer calls in with a system that does not work. Which of the following is the FIRST course of action for a technician to take?()

A. Transfer the customer to another technician, who can allocate more time to the issue.

B. Maintain a positive attitude and offer them the cheapest solution possible to satisfy them.

C. Listen to what the customer has to say and calmly recommend the best course of action.

D. Use technical language to demonstrate knowledge and expertise to the customer.


参考答案:C

第4题:

A customer has an 8-way p650 running an application for about 200 users.  In the past, the requiredamount of memory and processors has increased proportionally to the number of new users.  The customer plans to increase users by 10% each year for the next three years.  Next year, a database will be added to the workload to support the users directly rather than being on a separate machine. What is the most likely result of this projected growth?()

  • A、Disk usage will increase in proportion to memory.
  • B、The new database will demand much more memory.
  • C、Memory demand will increase 10% for the next year.
  • D、Processor demand will increase about 10% for the next year.

正确答案:B

第5题:

A Customer has a functional server deployment solution that uses a combination of disk imaging and application pushing technology. They need to get a working Windows 2003 image for their new servers as soon as possible. What method can achieve this?()

  • A、Install Windows 2003 using the F6 supply Mass Storage Controller option
  • B、Replace Customer’s deployment solution with Tivoli Provisioning Manager for OS Deployment Director Edition
  • C、Deploy Customer’s existing image and use UXSPi to update IBM specific drivers
  • D、Use ServerGuide to install Windows 2003

正确答案:D

第6题:

Your customer wants to build a network for a financial trading floor that has a requirement formultiple high-value transactions, which are also vital to the customer. What are the two mostcritical requirements?() (Choose two.)

  • A、no single point of failure
  • B、trading database server location
  • C、redundant application servers location
  • D、deterministic response to all failures
  • E、determine which protocol to use

正确答案:A,D

第7题:

The pSeries sales representative has done an excellent job in educating the customer on the benefits of working with IBM.  The customer is planning to implement their first ERP application.  This new application will be critical to running their business.  The customer has only a competitor’s UNIX systemcurrently installed.  They are interested in obtaining a proposal from IBM. In addition to the AIX hardware and HACMP software, what else should be included in the IBM proposal for the new ERP solution?()

  • A、I/T services and education to help with the implementation of the hardware and software
  • B、A Supportline specialist to work directly with the customer to manage any issues that arise
  • C、The services required to move the currently installed applications from the competitor’s systems to the IBM systems
  • D、A slimmed down solution to ensure that the IBM solution is less expensive than the competitor’s solution

正确答案:A

第8题:

You are the administrator of a SQL Server 2000 computer. One of the databases on the server contains a table named complaints. This table is used to store information about customer complaints.

The customer service representatives in your company add and edit the information in the complaints table. They work with this table by using a number of client applications, including a web-based application and a Microsoft Windows 32-bit application.

The customer service manager discovers that some customer complaints are marked as closed before they are resolved to the customer’s satisfaction.

You need to notify the customer service manager whenever a complaint is marked as closed. You do not want to make any changes to the client applications.

What should you do?

A.Create an UPDATE trigger that sends an e-mail message.

B.Create a stored procedure that sends an e-mail message. Use the stored procedures to make changes to the data.

C.Create a user-defined function that sends an e-mail message. Use the function to make changes to the data.

D.Create a rule that validates data entry. Bind the rule to the CompliantClosed column.


正确答案:A
解析:Explanation: Adding an appropriate UPDATE trigger that notifies the service manager whenever a complaint is marked is closed would accomplish the requirements. The client applications application would not have to be changed.

Note: In SQL Server 2000, triggers are a special type of stored procedure that fire automatically when an UPDATE, INSERT, or DELETE statement is issued against a table or view. Triggers are powerful tools that can be used to enforce business rules automatically when data is modified and can automate the processing for a company. Like stored procedures, triggers contain Transact-SQL statements which can include instructions to send an e-mail message when a particular column is updated

Incorrect Answers:
B: If a stored procedure is created and used the client application would have to be adjusted
accordingly. But we don’t want to make any changes in the client application.

Note: A stored procedure is a set of Transact-SQL statements compiled into a single execution plan and can return data as output parameters, which can return either data or a cursor variable; return codes, which are always an integer value; a result set for each SELECT statement contained in the stored procedure or any other stored procedures called by the stored procedure; or as a global cursor that can be referenced outside the stored procedure.

Stored procedures assist in achieving a consistent implementation of logic across applications as the SQL statements and logic needed to perform. a task can be coded and tested once in a stored procedure. Thereafter each application or user that needs to perform. that task can execute the stored procedure.

Coding business logic into a single stored procedure also offers a single point of control for ensuring that business rules are correctly enforced. Stored procedures can also be used to customize security permissions in much the same way as views. Stored procedure permissions can be used to prevent users from modifying data in certain columns and then grant users permissions to execute the procedure.

C: If a user defined function is created and used the client application would have to be adjusted accordingly. But we don’t want to make any changes in the client application.

Note: In programming languages, functions are subroutines used to encapsulate frequently performed logic. Any code that must perform. the logic incorporated in a function can call the function rather than having to repeat all of the function logic. SQL Server 2000 supports built-in functions and user-defined functions.

Built-in functions operate as defined in the Transact-SQL Reference and cannot be modified while user-defined functions allow the user to define their own Transact-SQL functions using the CREATE FUNCTION statement. User-defined functions take zero or more input parameters, and return a single value. Some user-defined functions return a single, scalar data value, such as an int, char, or decimal value.

D: Just creating a rule would only check the input, it would not notify the service manager as required.

Note: Rules are a backward-compatibility feature of SQL Server 2000 and performs the same functions as CHECK constraints. CHECK constraints are the preferred, standard way to restrict the values in a column as they are more concise than rules.

第9题:

You are designing a Windows Azure web application.  All users authenticate by using their Active Directory Domain Services (AD DS) credentials.  You need to recommend an approach for enabling single sign-on for domain-authenticated users.   Which two actions should you recommend?()

  • A、 Use Forms authenticationto generate claims.
  • B、 Use Active Directory Federation Services (AD FS) to generate claims.
  • C、 Use SqlMembershipProvider in the web application.
  • D、 Use Windows Identity Foundation in the web application.

正确答案:B,D

第10题:

When determining a customer’s security requirements using the security site survey from the steps for success methodology, which three of theses should be included in the customer’s security policy and procedures?()

  • A、Third-party due diligence policy review
  • B、Remote Access Policy
  • C、Encryption Policy
  • D、Application change control policy
  • E、Security Personnel policy

正确答案:A,B,D

更多相关问题