Microsoft Certification Questions

Q:

You responsible for maintaining an application that was written by a former colleague at XYZ.

 

The application reads from and writes to log files located on the local network. The original author included the following debugging code to facilitate maintenance:

try {
Debug.WriteLine(“Inside Try”);
throw(new IOException());}
catch (IOException e) {
Debug.WriteLine (“IOException Caught”);}
catch (Exception e) {
Debug.WriteLine(“Exception Caught”);}.
finally {
Debug.WriteLine (“Inside Finally”);}
Debug.WriteLine (“After End Try”);

 

Which output is produced by thus code?

A) Inside Try Exception Caught IOException Caught Inside Finally After End Try B) Inside Try Exception Caught Inside Finally After End Try
C) Inside Try IOException Caught Inside Finally After End Try D) Inside Try IOException Caught Inside Finally
 
Answer & Explanation Answer: C) Inside Try IOException Caught Inside Finally After End Try

Explanation:

First the try code runs. Then one single exception, the IOException occurs, not two exceptions.Then the Finally code segments executes. After Finally code bas been executed normal application resumes at the next line after the line that called the error. In this case, the After End Try code runs.

Report Error

View Answer Report Error Discuss

0 1855
Q:

You want to assign a mandatory user profile to a user. What must you do?

A) Rename the user's NTUSER.DAT file B) Rename the user's ntuser.ini file
C) Copy the Default User profile folder to the user's profile folder D) Copy the user's profile folder to the Default User profile folder
 
Answer & Explanation Answer: A) Rename the user's NTUSER.DAT file

Explanation:

To make a user's profile mandatory, you must rename the user's NTUSER.DAT file as NTUSER.MAN

Report Error

View Answer Report Error Discuss

0 1850
Q:

The status bar of Word 2010 provides useful information about the current document you are working on. You can customize the status bar to add or remove options to suit your needs. By default, which of these options is NOT present on the status bar?

A) Line Number B) Page Number
C) Word Count D) Language
 
Answer & Explanation Answer: A) Line Number

Explanation:
Report Error

View Answer Report Error Discuss

1 1850
Q:

You ASP.NET application manages order entry data by using a DataSet object named EXorderEntry. The EXorderEntry object includes two DataTable objects named orderNames and OrderDetails. A ForeignKeyConstraint object named orderDetailsKey is defined between the two DataTable objects.


You attempt to delete a row in orderNames while there are related rows in OrderDetails, and an exception is generated.What is the most likely cause of the problem?

A) The current value of OrderDetails.KeyDeleteRule is Rule.Cascade. B) The current value of OrderDetails.KeyDeleteRule is Rule.SetNull.
C) The current value of OrderDetails.KeyDeleteRule is Rule.SetDefault. D) The current value of OrderDetails.KeyDeleteRule is Rule.None.
 
Answer & Explanation Answer: D) The current value of OrderDetails.KeyDeleteRule is Rule.None.

Explanation:

The rule enumeration indicates the action that occurs when a ForeignKeyConstraint is enforced.None specifies that no action will occur, but exceptions are generated. This is what has occurred in this scenario.

 

Incorrect Answers:

 

A: Cascade specifies that all rows containing that value are also deleted.

B: SetNull specifies that values in all child columns are set to null values.

C: SetDefault specifies that all child columns be set to the default value for the column.

Report Error

View Answer Report Error Discuss

0 1839
Q:

Which authentication method provides the highest level of security?

A) Microsoft encrypted authentication version 2 (MS-CHAP v2) B) Microsoft encrypted authentication (MS-CHAP)
C) Encrypted authentication (CHAP) D) Shiva password Authentication Protocol (SPAP)
 
Answer & Explanation Answer: A) Microsoft encrypted authentication version 2 (MS-CHAP v2)

Explanation:

Microsoft encrypted auhentication version 2 (MS-CHAP v2) is the most secure authentication method.

Report Error

View Answer Report Error Discuss

0 1837
Q:

You are the administrator of a SQL Server 2000 computer named CorpSQL. The server is a member of a Microsoft Windows NT domain named CORPORATE. Franz maintains a local user account on CorpSQL and is a member of the local Power Users group. He requests access to the SQL Server databases that are stored on CorpSQL.You need to allow Franz to access CorpSQL. Which Transact-SQL statement should you execute?

A) EXEC sp_grantlogin CorpSQL\Franz B) EXEC sp_grantlogin Franz
C) EXEC sp_grantlogin [Power Users\Franz] D) EXEC sp_grantlogin CORPORATE\Franz
 
Answer & Explanation Answer: A) EXEC sp_grantlogin CorpSQL\Franz

Explanation:
Report Error

View Answer Report Error Discuss

0 1824
Q:

You are experiences problems when starting Word 2010. The software just keeps on crashing and never fully loads. Your colleague has recommended that you start Word in a particular mode. What could this be?

A) Safe Mode B) Private Mode
C) Easy Mode D) Invulnerable mode
 
Answer & Explanation Answer: A) Safe Mode

Explanation:
Report Error

View Answer Report Error Discuss

1 1822
Q:

You plan to deploy your ASP.NET application over XYZ’s intranet. The application uses data retrieved from a Microsoft SQL Server database. You want to use SQL Server connection pooling to optimize performance. You also need to protect confidential data stored on the server while minimizing administrative costs.

 

You need to configure security for your application. What should you do?

A) Use Microsoft Windows authentication in the application. Enable impersonation for users to access the SQL Server database from your application. B) Use Microsoft Windows authentication in the application. Use a single Windows account for users to access the SQL Server database from your application.
C) Use form-based authentication in the application. Use the system administrator (sa) SQL Server login for users to access the SQL Server database from your application. D) Use form-based authentication in the application. Assign each user a separate SQL Server login to use to access the SQL Server database from your application.
 
Answer & Explanation Answer: B) Use Microsoft Windows authentication in the application. Use a single Windows account for users to access the SQL Server database from your application.

Explanation:

We should only use one account to access the SQL Server database. This ensures that connection pooling is optimized.

 

Incorrect Answers:

A: We should only use a single account to access the SQL Server database.

C: Form-based authentication is less secure. Furthermore, running as the System Administrator with the sa login would compromise security.

D: Form-based authentication is less secure. Furthermore, creating a separate SQL Server login for each user is a daunting administrative task.

Report Error

View Answer Report Error Discuss

0 1817