Study Guides and Actual Real Exam Questions For Oracle OCP, MCSE, MCSA, CCNA, CompTIA


Advertise

Submit Braindumps

Forum

Tell A Friend

    Contact Us

 Home

 Search

Latest Brain Dumps

 BrainDump List

 Certifications Dumps

 Microsoft

 CompTIA

 Oracle

  Cisco
  CIW
  Novell
  Linux
  Sun
  Certs Notes
  How-Tos & Practices 
  Free Online Demos
  Free Online Quizzes
  Free Study Guides
  Free Online Sims
  Material Submission
  Test Vouchers
  Users Submissions
  Site Links
  Submit Site

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

Online Training Demos and Learning Tutorials for Windows XP, 2000, 2003.

 

 

 

 





Braindumps for "70-320" Exam

Developing XML Web Services and Server Components with Microsoft Visual C# .NET and the Microsoft .NET Framework

 Question 81.
You need to log when your application is restarted. Which file would interest you? 
(Select the best choice.)

A. Global.asax
B. web.config
C. Machine.xonfig
D. Global.asa

Answer: A

Explanation:
The Global.asax file enables you to manage application-level events. This file resides in the root directory of an ASP.NET Web application or ASP.NET Web service. The Global.asax.cs or Global.asax.vb class file is a hidden, dependent file of Global.asax, which contains the code for handling application events such as the Application_OnError event.

Question 82.
You create an application using C#, ITOrderFulfillment and configure ITOrderFulfillment to use Integrated Windows authentication. You write the following code to create permissions in GetSalesInfo: PrincipalPermission myPermission1 = New_PrincipalPermission(Nothing, "HRMgr")PrincipalPermission myPermission2 = New_PrincipalPermission(Nothing,
"ManagingDirector")

You need to write the remaining code in GetDailyRevenue to ensure that only users in the HRMgr group and the ManagingDirector group can access SalesInformation. Which code segment should you use?

A. myPermission1.Intersect(myPermission2).Demand()
B. myPermission1.Include(myPermission2).Demand()
C. myPermission1.Union(myPermission2).Demand()
D. myPermission1.Demand() myPermission2.Demand()
E. myPermission2 = myPermission1.Copy()
    myPermission2.Demand()

Answer: C

Explanation:
The Union method creates a permission that is the union of the current permission and the specified permission. We want a union of the HRMgr and the Director group.

Question 83.
You are creating an online application using C# to manage meetings for MeetingMakers Inc. This application will contain two fields: Date and time. Which of these codes will create a unique constraint named Events for the table named Calendar?

A. 
    
    
    
    
B. 
    
    
    
    
    
C. 
    
    
    
D. 
    
    
    
    

Answer: B

Explanation:
This code creates a unique constraint named Events for the table named Calendar. The  element defines a unique constraint. The msdata:PrimaryKey="true" attribute must be included in order to define a primary key. The xpath property of the  element points to the table element to which the constraint will be applied, and the xpath property of the  elements identifies the fields that make up the primary key. Multiple  elements must be used to specify a composite key.

Question 84.
You are creating a web service that will be used to perform online banking. The bank requires fast response and is protected by a firewall. Which should you choose? 
(Select all that apply.)

A. Use HTTP protocol
B. Use Binary-formatted messages
C. Use TCP protocol
D. Use SOAP-formatted messages

Answer: A, B

Explanation:
The Web service should use HTTP protocol and binary-formatted messages for the greatest performance and security. You must use the HTTP protocol in order to utilize the security features of IIS. Binary-formatted messages perform much faster than SOAP-formatted messages. The HTTP Channel class in the .NET Framework provides the mechanism to communicate with the HTTP protocol. To configure the Web service to use the HTTP protocol with binary-formatted messages, the Web.config file should contain text similar to the following.

Question 85.
You are creating a web based email system which assesses a web service. Which of the following methods should your Web service use to store the provided credentials by email users? (Select the best choice.)

A. Store the submitted credentials in a Credential Cache object.
B. Store the submitted credentials in an Authentication Manager object.
C. Store the submitted credentials in a string array.
D. Store the submitted credentials in a string, separating each set of credentials with semicolons 
    (;).

Answer: A

Explanation:
In order to store multiple sets of credentials, you should store the submitted credentials in a Credential Cache object. Credential Cache objects store credentials for multiple resources. Neither strings nor string arrays are the ideal choice for storing credentials. The Authentication Manager object manages the authentication modules that are called during authentication.

Question 86.
Which property of the Soap Exception class will return the SOAP fault code? 
(Select the best choice.)

A. Detail
B. Source
C. Actor
D. Code

Answer: D

Explanation:
The Actor property gets the code that causes the exception. The Source property gets the name of the application or assembly where the exception occurs. The Code property returns the SOAP fault code. 

Question 87.
Which property of the Soap Exception class will return the code that causes the exception?
(Select the best choice.)

A. Detail
B. Source
C. Actor
D. Code

Answer: C

Explanation:
The Actor property gets the code that causes the exception. The Source property gets the name of the application or assembly where the exception occurs. The Code property returns the SOAP fault code.

Question 88.
You create a serviced component named Register Student. Register Student implements the IOrderInit interface. The component and the interface contain the following code segments:

 _ Public Interface IStudent
' IStudent methods go here End Interface
Public Class RegisterStudent Inherits ServicedComponent Implements
IStudent ' RegisterStudent methods go here.

End Class
You discover that every time you rebuild RegisterStudent, existing unmanaged client code fails. The HRESULT for the exception is 0x80040154. The exception includes the following message: "Class not registered." You need to resolve this problem.
What should you do?

A. Add a Guid attribute to the IStudent interface.
B. Add a Guid attribute to the RegisterStudent class.
C. Add a COM Import attribute to the IStudent interface.
D. To the RegisterStudent class, add the following attribute:
    ClassInterface(ClassInterfaceType.DualType)
E. To the RegisterStudent class, add the following attribute:
    ClassInterface(ClassInterfaceType.Registered)
F. To the RegisterStudent class, add the following attribute:
    ClassInterface(ClassInterfaceType.AutoDual)

Answer: F

Explanation:
The class interface, which is not explicitly defined in managed code, is an interface that exposes all public methods, properties, fields, and events that are explicitly exposed on the .NET object. This interface can be a dual or dispatch-only interface. Class interfaces are only generated when the ClassInterfaceAttrribute is set to ClassInterfaceType.AutoDual.

Question 89.
Which code is a valid way to read the data in the XmlTextReader object? 
(Select the best choice.)

A. For myCounter = 0 to reader.Nodes -1
B. For myCounter = 0 to reader.RecordCount -1
C. Do Until reader.EOF
D. While reader.Read()

Answer: D

Explanation:
You should use the code While reader.Read() to read the data in the XmlTextReader object. The
XmlTextReader provides read-only, forward-only access to XML data.

Question 90.
Which XML attribute will not ensure that the IsPrimaryKey property is set to the correct value? (Select all that applies.)

A. msdata:PrimaryKey="unique"
B. msdata:Unique="PrimaryKey"
C. msdata:PrimaryKey="true"
D. msdata:Unique="true"


Answer: A, B, D

Explanation:
The msdata:PrimaryKey attribute of the  or  element determines the value of the IsPrimaryKey property of the unique constraint when a dataset is built from XML data containing a schema. If the attribute is set to true, then the property's value will also be true when the dataset is created. 

Question 91.
Which window in Visual Studio .NET should you use to select the stored procedure to debug?
(Select the best choice.)

A. Command
B. Output
C. Server Explorer
D. Task List

Answer: C

Explanation:
C is correct. You can debug Microsoft SQL Server stored procedures with version 6.5 and Service Pack 3 or later while in Visual Studio .NET. First, use the Server Explorer window to establish a connection to your database. Next, navigate through the database until you find the stored procedure that you want to debug in the stored procedure node. Then, right-click the stored procedure and choose the Step Into Stored Procedure option.

Question 92.
You are designing a robust class to handle SQL exceptions. You need access to the collection of warning messages that are sent from Microsoft SQL Server. 

What should you do? (Select the best choice.)

A. SqlTransaction.Connection
B. SqlException.Class
C. SqlError.Source
D. SqlInfoMessageEventArgs.Errors

Answer: B

Explanation:
The Errors property of the SqlInfoMessageEventArgs class is a collection of warning messages that are sent from Microsoft SQL Server. It is possible to evaluate each message in this collection, but this would not be the most efficient solution. The Connection property of the SqlTransaction class returns a Connection object for a transaction. The Source property of the SqlError class returns the provider's name that produced the error.

Question 93.
You are working on an XML application using C# which may read XML files without schemas. Which approach will you choose? (Select the best choice.)

A. Dim dsData As DataSet
    dsData. ReadXml ("myinfo.xml", XmlReadMode.Infer)
B. Dim fsMain As New SystemIO.FileStream ("myinfo.xml", System.IO.FileMode.Create)
    Dim dsData As DataSet
   dsData. ReadXml(fsMain, XmlReadMode.IgnoreSchema)
C. Dim dsData As DataSet = New dsData. ReadXml("myinfo.xml",
    XmlReadMode.IgnoreSchema)
D. Dim dsData As DataSet
    dsData. ReadXml ("myinfo.xml", XmlReadMode.DiffGram)
E. Dim dsData As DataSet
    dsData. ReadXml ("myinfo.xml", XmlReadMode. Missing Schema)
F. Dim dsData As DataSet = New dsData. ReadXml("myinfo.xml",
    XmlReadMode.Infer)
G. Dim dsData As DataSet
    dsData. ReadXml ("myinfo.xml", XmlReadMode.InferSchema)

Answer: G

Explanation:
When XML data is intended to be used in a DataSet object, it is important to know the data structure, or schema. If the schema is not available with the data, then the data can still be used if the XmlReadMode parameter of the ReadXml method is set to InferSchema. When InferSchema is used, elements and attributes in the XML help determine tables and columns.

Question 94.
You constantly update your assembly. You need a convenient way to inform all applications that utilize the assembly that the applications should use the latest version of the assembly. What should you do? (Select the best choice.)

A. Use Regsvr32.exe to register the assembly.
B. Place a publisher policy in the GAC.
C. Use the Fuslogvw.exe tool to modify assembly bindings.
D. Use the Sn.exe utility to assign the assembly a strong name.

Answer: B

Explanation:
Using a policy file, we can inform all applications that utilize the assembly that the applications should use the latest version of the assembly.

Question 95.
You are debugging your .Net remoting application using C#. Which tool will provide you with information regarding an application's inability to bind to an assembly? (Select the best choice.)

A. Use Regsvr32.exe to register the assembly.
B. Place a publisher policy in the GAC.
C. Use the Fuslogvw.exe tool to modify assembly bindings.
D. Use the Sn.exe utility to assign the assembly a strong name.

Answer: C

Explanation:
The Fuslogvw.exe tool provides information regarding an application's inability to bind to an assembly.


Google
 
Web www.certsbraindumps.com


Braindumps: Dumps for 70-290 Exam Brain Dump

Study Guides and Actual Real Exam Questions For Oracle OCP, MCSE, MCSA, CCNA, CompTIA


Advertise

Submit Braindumps

Forum

Tell A Friend

    Contact Us





Braindumps for "70-290" Exam

Managing and Maintaining a Microsoft Windows Server 2003 Environment

 Question 1.
You work as the network administrator at ITCertKeys.com. The ITCertKeys.com network consists of a single Active Directory domain named ITCertKeys.com. All servers on the ITCertKeys.com network run Windows Server 2003 and all client computers run Windows XP Professional. ITCertKeys.com contains an application server named ITCertKeys -SR23. ITCertKeys -SR23 runs an in-house application which is critical to the company's business process. ITCertKeys -SR23 contains a single physical drive that is divided into two partitions with the drive letter C and D. Both partitions are formatted as FAT32. The in-house application is installed on drive D.

During monitoring you notice that the drive D is low on free disk space. You need to create extra space for the in-house application. To maintain the functionality of the in-house application, it cannot be moved. You to add another physical disk drive to ITCertKeys -SR23. You need the disk space on the new disk drive to be available as storage space for the in-house application.

What should you do? (Select all that apply)

A. This can be accomplished by initializing the new disk as a basic disk on ITCertKeys -SR23.
B. Your best option would be to convert drive D to NTFS on ITCertKeys -SR23.
C. Your best option would be to format the new disk with NTFS on ITCertKeys -SR23.
D. You should consider converting the disk that hosts drive D to a dynamic disk.
E. On ITCertKeys -SR23 you need to extend drive D to encompass unallocated space on the new 
    disk.

Answer: B, D, E

Explanation:
In this case you must host drive D to a dynamic disk and convert drive D to NTFS. If drive D contains unallocated space, you can extend drive D to include the unallocated space. Drive D can also be extended to use the unallocated space in the new disk. 

Incorrect answers:
A: There is no need to initialize the new disk as a basic disk. You can initialize the new disk directly to dynamic disk.
C: To add the space on the new disk to drive D, you can create a spanned or a simple volume. To do this both of the disks must be dynamic disks and drive D should be formatted as NTFS. Only unformatted volumes or volumes that are formatted with NTFS can be extended.

Question 2.
You work as the network administrator at ITCertKeys.com. The ITCertKeys.com network consists of a single Active Directory domain named ITCertKeys.com. All servers on the ITCertKeys.com network run Windows Server 2003 and all client computers run Windows XP Professional. The ITCertKeys.com network contains a file server named ITCertKeys -SR12 that contains confidential data. ITCertKeys -SR12 contains of a hard disk system that consists of a software-based RAID-5 volume. 

A ITCertKeys.com user named Mia Hamm works in the administrative office. Mia Hamm needs to access data on ITCertKeys -SR12 regularly. One day Mia Hamm complains that ITCertKeys -SR12 response is much slower that before. During your investigation you discover that one of the hard disks in the RAID-5 volume on ITCertKeys -SR12 has failed. You need to improve the performance of ITCertKeys -SR12.

What should you do?

A. Your first option is to replace the failed disk on ITCertKeys -SR12.
    Then you can initialize the new disk in Disk Management.
    Your next step is to convert it into a dynamic disk.
    The last step would be to repair the volume.
B. You should break the RAID-5 volume and remove the failed disk in the Disk Management on 
    ITCertKeys -SR12.
    The next stepwould be to replace the failed disk and rebuild the RAID-5 volume.
C. Your first step should be to replace the failed disk on ITCertKeys -SR12.
    Thereafter you need to convert the new disk to a dynamic disk in Disk Management.
    The last step would be toformat the disk making use of NTFS.
D. You best option is to replace the failed disk on ITCertKeys -SR12.
    Thereafter you can reboot the computer.

Answer: A

Explanation:
In this case you must replace the failed disk. Initializing the disk means to write a master boot record and a disk signature. The disk should be converted into dynamic volumes. Only dynamic volumes can work in RAID-5. You should then right click the region of the failed RAID-5 volume and select Repair Volume.

Incorrect answers:
B: This option is incorrect. You are unable to break RAID-5 volume. Only a RAID-1 or mirrored volume can be broken.
C: This option is incorrect. You are unable to format a disk. Only volumes can be formatted.
D: This will not work. Only unallocated space on a dynamic disk can be used to repair a RAID-5 volume with failed redundancy.

Question 3.
You work as the network administrator at ITCertKeys.com. All servers on the ITCertKeys.com network run Windows Server 2003 and all client computers run Windows XP Professional. The ITCertKeys.com network contains a SQL Server 2000 named ITCertKeys -DB20. All of the hard disks of ITCertKeys -DB20 are dynamic disks. ITCertKeys -DB20 hosts a database named ITKCustomersDB that is located on a RAID-5 volume. The transaction logs for ITKCustomersDB are hosted on a separate mirrored volume. ITCertKeys.com users access ITKCustomersDB through an in-house client application. 

One day ITCertKeys -DB20 suffers a hardware failure that does not affect the hard disk subsystems. You receive instruction to move the hard disk subsystem from ITCertKeys -DB20 to a new SQL Server 2000 computer named ITCertKeys -DB21. You move the disks that host the RAID-5 volume with ITKCustomersDB and the disks that host the mirrored transaction logs to ITCertKeys -SR21. You want the users to access ITKCustomersDB without making changes to the in-house client application.

What should you do?

A. To ensure that the users are able to access ITKCustomersDB you need to reactivate the hard 
    disks in Disk Management.
B. The hard disks in Disk Management on ITCertKeys -DB21 should be repaired to ensure that  
    the users are able to access ITKCustomersDB without making changes to the in-house client 
    application.
C. You should consider importing the foreign disks in Disk Management on ITCertKeys -DB21 in 
    order to ensure that the users are able to access ITKCustomersDB without making changes to 
    the in-house client application.
D. This can be accomplished by initializing the hard disks in Disk Management to ensure that the 
    users are able to access ITKCustomersDB without making changes to the in-house client 
    application.

Answer: C

Explanation:
Moving the hard disks to a new computer will mark them as foreign disks. The volumes on the disks will not be accessible. To make it accessible you should import the foreign disks.

Incorrect answers:
A: You would have reactivated the disks if the disks become unavailable due to a hardware problem or if the data was corrupted. In this case it is not necessary.
B: Disks cannot be repaired. You are able to repair RAID-5 volumes.
D: Only new disks need to be initialized before they can be used. These disks were moved to the server and must be imported.

Question 4.
You work as the network administrator at ITCertKeys.com. The ITCertKeys.com network consists of a single Active Directory domain named ITCertKeys.com. All servers on the ITCertKeys.com network run Windows Server 2003 and all client computers run Windows XP Professional. The ITCertKeys.com network contains a server named ITCertKeys -SR18. ITCertKeys -SR18 has a single 120 GB hard disk drive named Disk0. Disk0 has been initialized as a basic disk and has been formatted with NTFS. 

The hard disk is partitioned into four logical partitions as shown in the following table:
Drive	Contents	Size	Free Space

C	System Volume	8 GB	4 GB
D	Application Data	40 GB	1 GB
E	User Data	40 GB	12 GB
F	None	32 GB	32 GB

Drive D is becoming full. You need to increase the disk space for the applications data. However, the application on Drive D cannot be reconfigured to use free space from another volume.

What should you do?

A. You should consider extending Drive D: to encompass the disk space of Drive F.
B. This can be accomplished by mounting Drive F: in an empty folder on Drive D.
C. To ensure sufficient disk space you have to extend Drive F: to encompass Drive D.
D. Your fist option would be to delete Drive F. Thereafter you will be able to extend Drive D.

Answer: B

Explanation:
Any NTFS volume can be mapped to an empty folder on another NTFS volume.

Incorrect Answers:
A, C, D: Basic volumes cannot be extended.

Question 5.
You work as the network administrator at ITCertKeys.com. The ITCertKeys.com network consists of a single Active Directory domain named ITCertKeys.com. All servers on the ITCertKeys.com network run Windows Server 2003 and all client computers run Windows XP Professional. The ITCertKeys.com network contains a Windows Server 2003 file server named ITCertKeys -SR11. During monitoring you notice that the free space on ITCertKeys -SR11 is very low. You decide to install a new 25 GB disk named disk1 on ITCertKeys -SR11. You want to convert disk1 to five logical drives of equal size. You want to be able to increase the size of the logical drives in the future without affecting the data that may already be stored on it.

What should you do?

A. Create five NTFS primary partitions on disk1.
B. Create five NTFS extended partitions on disk1.
C. Convert disk1 from basic to dynamic and create one NTFS primary partition on it.
D. Convert disk1 from basic to dynamic and create five simple volumes on it.

Answer: D

Explanation: 
If you convert from basic to dynamic, they can be extended. Creating five simple volumes on disk1 will allows you to extend each volume using the unallocated space on disk1.

Incorrect answers:
A, B: Basic disks can support up to four partitions, which consists of three primary partitions and one extended partition. You cannot create more than one extended partition on a basic disk.
C: You need to create five partitions of equal size, not one.

Question 6.
You work as the network administrator at ITCertKeys.com. The ITCertKeys.com network consists of a single Active Directory domain named ITCertKeys.com. All servers on the ITCertKeys.com network run Windows Server 2003 and all client computers run Windows XP Professional. The ITCertKeys.com network contains a file server named ITCertKeys -SR12. ITCertKeys -SR12 contains a single physical drive named Drive C on which the operating system is installed, and another drive named Drive D that contains a shared folder named UserData. 

The UserData folder is used to store ITCertKeys.com user data that is accessed by numerous in-house applications. Both drives are FAT32 drives. Both Drive C and Drive D are low on free disk space. You need to create extra disk space for the UserData folder. You cannot delete or backup the user data on ITCertKeys -SR12 because all data is currently required by the in-house applications.

What should you do?

A. Install an additional disk drive on ITCertKeys -SR12.
    Initialize the new disk drive as a basic disk.
    Extend Drive D to include unallocated space on the new disk drive.
B. Install an additional disk drive on ITCertKeys -SR12.
    Convert Drive D to NTFS.
    Convert Drive D to a dynamic disk.
    Extend drive D to include unallocated space on the new disk drive.
C. Install an additional disk drive on ITCertKeys -SR12.
    Format the new disk drive with FAT32.
    Extend Drive D to include unallocated space on the new disk drive.
D. Install an additional disk drive on ITCertKeys -SR12.
    Convert Drive D to NTFS.
    Mount the new disk dive in the UserData folder on Drive D.

Answer: B

Explanation: 
In this case you must host drive D to a dynamic disk and convert drive D to NTFS. If drive D contains unallocated space, you can extend drive D to include the unallocated space. Drive D can also be extended to use the unallocated space in the new disk.

Incorrect answers:
A: There is no need to initialize the new disk as a basic disk. You can initialize the new disk directly to dynamic disk.
C: To add the space on the new disk to drive D, you can create a spanned or a simple volume. To do this both of the disks should be must be dynamic disks and drive D should be formatted as NTFS. Only unformatted volumes or volumes that are formatted with NTFS can be extended.
D: You can only mount a drive in an empty folder. UserData is not empty so you cannot mount the new drive in that folder.

Question 7.
DRAG DROP
You work as the network administrator at ITCertKeys.com. The ITCertKeys.com network consists of a single Active Directory domain named ITCertKeys.com. The ITCertKeys.com network contains 20 servers and 1,200 client computers. All servers on the ITCertKeys.com network run Windows Server 2003, some client computers run a mixture of different Windows operating systems, and the rest run MS-DOS. You install four new servers named ITCertKeys -SR21, ITCertKeys -SR22, ITCertKeys -SR23, and ITCertKeys -SR24 on the ITCertKeys.com network.

ITCertKeys -SR21 contains a single volume that will store data that needs to be accessed by all the Windows based client computers. ITCertKeys -SR22 contains a single volume that will store data that needs to be accessed by MS-DOS client computers. No data on ITCertKeys -SR23 and ITCertKeys -SR24 will be accessed by any client computers. You intend to configure ITCertKeys -SR23 with a single partition that will span multiple disks and ITCertKeys -SR24 with two physical disks that will contains two partitions. You need to initialize the disk subsystems on the four servers to meet these requirements.

What should you do? To answer, drag the disk configuration to the appropriate location in the Work Area.
 
Answer:

Explanation:
 

A basic disk is a physical disk with primary and extended partitions. Prior to Windows 2000, Microsoft did not call disks basic because that was the only type of disk available. There were no dynamic disks. As long as you use the File Allocation Table (FAT or FAT32) file system, Windows XP Professional and Home editions, Windows 2000, Windows NT, Windows 9x, and the MS-DOS operating systems can access basic disks. The disks on ITCertKeys -SR21 and ITCertKeys -SR22 can be configured as basic. Because basic disk can support up to four partitions, the two disks of ITCertKeys -SR24 can also be configured as basic disks. Dynamic disks support five types of volumes: 
simple, spanned, mirrored, striped, and RAID-5. You can extend a volume on a dynamic disk. Dynamic disks can contain a virtually unlimited number of volumes, so you are not restricted to four volumes per disk as you are with basic disks. Regardless of the type of file system, only computers running Windows XP Professional, Windows 2000 Professional or Server, or Windows Server 2003 can directly access dynamic volumes on hard disks that are physically connected to the computer. For this reason only the disk on ITCertKeys -SR23 and ITCertKeys -SR24 can be configured as dynamic disks. 

Question 8.
You work as a network administrator at ITCertKeys.com. The ITCertKeys.com network consists of a single Active Directory domain named ITCertKeys.com. All servers on the ITCertKeys.com network run Windows Server 2003 and all client computers run Windows XP Professional. The ITCertKeys.com network contains a file server named ITCertKeys -SR34 that has two physical hard disk dives named disk0 and disk1. Disk1 contains a shared folder named ITK_Data that is used to store user data. A severe thunder storm causes a blackout disrupting all power to the ITCertKeys.com network. Fortunately, all ITCertKeys.com servers are protected by an Uninterruptible Power Supply (UPS) and you are able to perform a graceful shutdown of all ITCertKeys.com servers.

When power is restored, you bring the network back online. However, several ITCertKeys.com users report that they are unable to connect to the ITK_Data folder on ITCertKeys -SR34. You log on to ITCertKeys -34 and discover that you cannot locate the ITK_Data folder in Windows Explorer. You open Disk Management on ITCertKeys -SR34 and see the display shown in the Disk Management exhibit. Disk Management Exhibit:
 

You need to ensure that ITCertKeys.com users can access the files in the ITK_Data folder.

What should you do?

A. Select disk1 on ITCertKeys -SR34 and convert the disk to a dynamic disk.
B. Select disk1 on ITCertKeys -SR34 and regenerate the disk.
C. Select disk1 on ITCertKeys -SR34 and reactivate the disk
D. Rescan the disks on ITCertKeys -SR34.

Answer: C

Explanation: 
On any offline disk all that is required is to have the disk reactivated to gain access to the data on the disk.

Incorrect answers:
A: Converting the disk to a dynamic disk would not solve the problem of data that is unavailable.
B: On a failed disk there is no option to regenerate.
D: Rescanning disks scans all attached disks for disk configuration changes and since there was no reconfiguration of any of the disks.

Question 9.
You work as the network administrator at ITCertKeys.com. The ITCertKeys.com network consists of a single Active Directory domain named ITCertKeys.com. The ITCertKeys.com network contains six database servers named ITCertKeys -DB01 through ITCertKeys -DB06 that each run a database application named DataApp1. The ITCertKeys.com written policy requires that when a new user is added to DataApp1, they must be added to the server that has the most available disk space. ITCertKeys.com hires ten new employees. The new employees will require access to DataApp1. You need to add these users to DataApp1. 

What should you do to ensure that you meet the written policy requirements when you add the new users to DataApp1?

A. Review the application logs on each of the six database servers by using Event Viewer.
B. Record the PhysicalDisk object on all six database servers by using Performance Logs and 
    Alerts.
C. Review the performance data on each of the six database servers by using Task Manager.
D. Generate a histogram view of the LogicalDisk object on all six database servers by using 
    System Monitor.

Answer: D

Explanation:
System Monitor shows real-time performance data based on Object counters, and can display the log data recorded by Performance Logs And Alerts either in the form of Counter (interval polling) logs, or Trace (event-driven) logs. Logs written by Performance Logs And Alerts can be loaded into System Monitor for analysis. The System Monitor is designed for real-time reporting of data to a console interface, and can be reported in graph, histogram, or numeric form. This should aid you in ensuring that you meet the stated requirements.

Incorrect answers:
A: The Application log contains data written to it by software programs, it records events that are generated by application programs and network application services. Using Event Viewer to review application logs would thus not ensure that you add a new user to the server with the most available space.
B: The Performance Logs And Alerts snap-in can do no configuration, only reporting data through Counter Logs as reported by providers (object counters) on a configured interval, or through Trace Logs as reported by event-driven providers. Thus this option will not work.
C: Viewing performance data through the Task Manager is not what you need.

Reference:
Dan Balter, MCSA/MCSE Managing and Maintaining a Microsoft Windows Server 2003 Environment Exam Cram 2 (Exam 70-290), Chapter 6

Question 10.
You work as the network administrator at ITCertKeys.com. The ITCertKeys.com network consists of a single Active Directory domain named ITCertKeys.com. All servers on the ITCertKeys.com network run Windows Server 2003 and all client computers run Windows XP Professional. The ITCertKeys.com network contains a file server named ITCertKeys -SR21. ITCertKeys -SR21 has a 40-GB hard disk for system files and two 80-GB hard disks for data. The 80-GB hard disks configured as mirrored volumes and contain 65-GB of read-only data. ITCertKeys.com users connect to ITCertKeys -SR21 by using shortcuts on their desktops.

Due to the growth of the ITCertKeys.com network, the performance of ITCertKeys -SR21 has become inadequate. You receive instruction from the CIO to replace ITCertKeys -SR21. The new server must contain the current data from ITCertKeys -SR21. You disconnect ITCertKeys -SR21 from the network. You build a replacement server and name it ITCertKeys -SR21. You now need to bring the new server online and re-establish redundancy as quickly as possible. You must also ensure that users can connect to ITCertKeys -SR21 by using their existing desktop shortcuts.

What should you do?

A. Create a new mirrored volume by using two 80-GB disks. Connect ITCertKeys -SR21 to the 
    network and copy the data from the old ITCertKeys -SR21.
    When copying is complete, shut down the old ITCertKeys -SR21.
B. Move the two 80-GB disks from the old ITCertKeys -SR21 to the new ITCertKeys -SR21.
    Scan the disks for changes and import the disks.
    Connect the new ITCertKeys -SR21 to the network.
C. Break the mirror on the old ITCertKeys -SR21. Move one of the 80-GB disks from the old 
    ITCertKeys -SR21 to the new ITCertKeys -SR21.
    Scan the disk for changes and initialize the disk.
    Select the spare disk and create the mirror.
    Connect the new ITCertKeys -SR21 to the network.
D. Remove one of the 80-GB disks from the old ITCertKeys -SR21 and move it to the new    
    ITCertKeys -SR21.
    Scan the disk for changes and import the disk.
    Connect the new ITCertKeys -SR21 to the network.

Answer: B

Explanation: 
You have to make use of the existing old ITCertKeys -SR21 disks to make sure that the current data will be brought online. When moving disks from one computer to another keep in mind that before disconnecting the disks from the old ITCertKeys -SR21 you must make sure the status of all volumes on each of the disks is healthy. For any volumes that are not healthy, repair the volumes before you move the disks. After you physically connect the disks to the new ITCertKeys -SR21, in Disk Management, open the Action menu and choose Rescan Disks. The scanning will detect changes. The new disk will show up as Dynamic/Foreign. By default, Dynamic/Foreign disks and should be brought online automatically, but if not, bring it online by right-clicking the disk and selecting Online. Furthermore, to make Dynamic/Foreign disks useable, you must import it. The disk group remains as is and the database does not change. When connecting new ITCertKeys -SR21 to the network you will enable users to use their existing shortcuts.

Incorrect answers:
A: Since ITCertKeys -SR21 is scheduled for replacement you need no mirroring to be done for the question states pertinently that you have to re-establish redundancy which means that redundancy used to be in place before. A mirrored volume (also known as RAID Level 1 or RAID-1) consists of two identical copies of a simple volume, each on a separate hard disk. Mirrored volumes provide fault tolerance in the event that one physical disk fails.
C: By moving only one disk from the old ITCertKeys -SR21 to the new ITCertKeys -SR21 will affect not only the current amount of data available, but will also result in a lack of possible redundancy.
D: Removing one old ITCertKeys -SR21 disk from the mirror will not enable you to accomplish your task successfully.

Reference:
Dan Balter, MCSA/MCSE Managing and Maintaining a Microsoft Windows Server 2003 Environment Exam Cram 2 (Exam 70-290), Chapter 3



Google
 
Web www.certsbraindumps.com


Study Guides and Real Exam Questions For Oracle OCP, MCSE, MCSA, CCNA, CompTIA





              Privacy Policy                   Disclaimer                    Feedback                    Term & Conditions

www.helpline4IT.com

ITCertKeys.com

Copyright © 2004 CertsBraindumps.com Inc. All rights reserved.