Microsoft Certification Questions

Q:

You responsible for maintaining an application that was written by a former colleague at XYZ.

 

The application reads from and writes to log files located on the local network. The original author included the following debugging code to facilitate maintenance:

try {
Debug.WriteLine(“Inside Try”);
throw(new IOException());}
catch (IOException e) {
Debug.WriteLine (“IOException Caught”);}
catch (Exception e) {
Debug.WriteLine(“Exception Caught”);}.
finally {
Debug.WriteLine (“Inside Finally”);}
Debug.WriteLine (“After End Try”);

 

Which output is produced by thus code?

A) Inside Try Exception Caught IOException Caught Inside Finally After End Try B) Inside Try Exception Caught Inside Finally After End Try
C) Inside Try IOException Caught Inside Finally After End Try D) Inside Try IOException Caught Inside Finally
 
Answer & Explanation Answer: C) Inside Try IOException Caught Inside Finally After End Try

Explanation:

First the try code runs. Then one single exception, the IOException occurs, not two exceptions.Then the Finally code segments executes. After Finally code bas been executed normal application resumes at the next line after the line that called the error. In this case, the After End Try code runs.

Report Error

View Answer Report Error Discuss

1 2064
Q:

You want to search for a specific shared folder object in Active Directory. Which tool should you use?

A) Search B) Windows Explorer
C) Active Directory Sites and Services D) Active Directory Users and Computers
 
Answer & Explanation Answer: D) Active Directory Users and Computers

Explanation:

To search for a specific shared folder in Active Directory, use Active Directory Users and computers. You can use Windows Explorer to browse Active Directory, but you can't use it to search for a specific  shared folder.

Report Error

View Answer Report Error Discuss

0 2061
Q:

You are the database administrator of a SQL Server 2000 computer. The server contains your company's Accounts database. Hundreds of users access the database each day.Because you have had power interruptions in the past, you want to protect the physical integrity of the Accounts database. You do not want to slow down server operations.What should you do?

A) Create a database maintenance plan to check database integrity and make repairs each night. B) Enable the torn page detection database option for each database.
C) Disablewrite caching on all disk controllers. D) Ensure that write caching disk controllers have battery backups.
 
Answer & Explanation Answer: D) Ensure that write caching disk controllers have battery backups.

Explanation:

The scenario states that power interruptions have occurred in the past. By buying a battery backup solution for the disk controllers the power interruption problem would be prevented.

Report Error

View Answer Report Error Discuss

0 2060
Q:

You are the administrator of a SQL Server 2000 computer named CorpSQL. The server is a member of a Microsoft Windows NT domain named CORPORATE. Franz maintains a local user account on CorpSQL and is a member of the local Power Users group. He requests access to the SQL Server databases that are stored on CorpSQL.You need to allow Franz to access CorpSQL. Which Transact-SQL statement should you execute?

A) EXEC sp_grantlogin CorpSQL\Franz B) EXEC sp_grantlogin Franz
C) EXEC sp_grantlogin [Power Users\Franz] D) EXEC sp_grantlogin CORPORATE\Franz
 
Answer & Explanation Answer: A) EXEC sp_grantlogin CorpSQL\Franz

Explanation:
Report Error

View Answer Report Error Discuss

0 2059
Q:

What protocol is required by Internet Information Services(IIS), the indexing Service, and Certificate Services?

A) TCP/IP B) NWLink IPX/SPX/NetBIOS Compatible Transport protocol
C) NetBEUI D) RIP Version 2 for Internet Protocol
 
Answer & Explanation Answer: A) TCP/IP

Explanation:

When you think Internet (or anything Internet - related), think TCP/IP

Report Error

View Answer Report Error Discuss

0 2058
Q:

Which authentication method provides the highest level of security?

A) Microsoft encrypted authentication version 2 (MS-CHAP v2) B) Microsoft encrypted authentication (MS-CHAP)
C) Encrypted authentication (CHAP) D) Shiva password Authentication Protocol (SPAP)
 
Answer & Explanation Answer: A) Microsoft encrypted authentication version 2 (MS-CHAP v2)

Explanation:

Microsoft encrypted auhentication version 2 (MS-CHAP v2) is the most secure authentication method.

Report Error

View Answer Report Error Discuss

0 2053
Q:

You develop an enterprise application, called XYZApplication that includes a Windows Form presentation layer, middle-tier components for business logic and data access, and a Microsoft SQL Server database.


You are in the process of creating a middle-tier component that will execute the data access routines in your application. When data is passed to this component, the component will call several SQL Server stored procedures to perform database updates. All of these procedure calls run under the control of a single transaction.


The code for the middle-tier component will implement the following objects:
SqlConnection cn = new SqlConnection();
SqlTransaction tr;


If two users try to update the same data concurrently, inconsistencies such as phantom reads will occur. You must now add code to your component to specify the highest possible level of protection against such inconsistencies.
Which code segment should you use?

A) tr = cn.BeginTransaction(?ReadCommitted?); B) tr = cn.BeginTransaction(IsolationLevel.ReadCommitted);
C) tr = cn.BeginTransaction(IsolationLevel.Serializable); D) tr = cn.BeginTransaction(?Serializable?);
 
Answer & Explanation Answer: C) tr = cn.BeginTransaction(IsolationLevel.Serializable);

Explanation:

Serializable is the highest isolation transaction level. It provide the highest possible level of protection against concurrent data errors. The correct syntax to begin a transaction with this transaction isolation level is: cn.BeginTransaction(IsolationLevel.Serializable)

Report Error

View Answer Report Error Discuss

1 2042
Q:

You plan to deploy your ASP.NET application over XYZ’s intranet. The application uses data retrieved from a Microsoft SQL Server database. You want to use SQL Server connection pooling to optimize performance. You also need to protect confidential data stored on the server while minimizing administrative costs.

 

You need to configure security for your application. What should you do?

A) Use Microsoft Windows authentication in the application. Enable impersonation for users to access the SQL Server database from your application. B) Use Microsoft Windows authentication in the application. Use a single Windows account for users to access the SQL Server database from your application.
C) Use form-based authentication in the application. Use the system administrator (sa) SQL Server login for users to access the SQL Server database from your application. D) Use form-based authentication in the application. Assign each user a separate SQL Server login to use to access the SQL Server database from your application.
 
Answer & Explanation Answer: B) Use Microsoft Windows authentication in the application. Use a single Windows account for users to access the SQL Server database from your application.

Explanation:

We should only use one account to access the SQL Server database. This ensures that connection pooling is optimized.

 

Incorrect Answers:

A: We should only use a single account to access the SQL Server database.

C: Form-based authentication is less secure. Furthermore, running as the System Administrator with the sa login would compromise security.

D: Form-based authentication is less secure. Furthermore, creating a separate SQL Server login for each user is a daunting administrative task.

Report Error

View Answer Report Error Discuss

0 2034