Microsoft Certification Questions

Q:

A large CRM project took place last year included hundreds of meetings between the various key users. All of the conversations were save in a single Word 2010 document. You need to find all instances of the following words 'bleed' and 'bled'. Which of the following wildcard searches would be best?

A) ble{2}d B) ble{1,}d
C) ble{e2}d D) ble[e2]d
 
Answer & Explanation Answer: B) ble{1,}d

Explanation:
Report Error

View Answer Report Error Discuss

2 2082
Q:

The status bar of Word 2010 provides useful information about the current document you are working on. You can customize the status bar to add or remove options to suit your needs. By default, which of these options is NOT present on the status bar?

A) Line Number B) Page Number
C) Word Count D) Language
 
Answer & Explanation Answer: A) Line Number

Explanation:
Report Error

View Answer Report Error Discuss

1 2069
Q:

You create an assembly by using Visual Studio .NET. The assembly is responsible for writing and reading order entry information to and from an XML data file. The assembly also writes and reads values to and from the Windows registry while it is being consumed.

 

The assembly will be distributed to client computers by using your company, XYZ, intranet. All client computers are configured to implement the default .NET security policy.

 

You need to implement security in the assembly. What should you do?

A) Implement declarative security and execute the permission demand to allow access to the file system and Windows registry. B) Implement declarative security and execute the minimum permission request to allow access to the file system and Windows registry.
C) Implement imperative security and execute the permission demand to allow access to the file system and Windows registry. D) Implement imperative security and execute the minimum permission request to allow access to the file system and Windows registry.
 
Answer & Explanation Answer: B) Implement declarative security and execute the minimum permission request to allow access to the file system and Windows registry.

Explanation:

You can use declarative code access security to request permissions for the entire assembly. SecurityAction flags that can be specified in an assembly-wide directive. When SecurityAction.RequestMinimum is specified, it makes a request to the common language runtime to be granted the requested permission. If the requested permission is not granted by the security policy, the assembly will not execute. A  Security Action.RequestOptional is similar, but the assembly will still run even if the requested permission is not granted. Specifying security Action. RequestRefuse requests that the assembly be denied the specified permission.

 

You must use the Assembly (assembly) directive when specifying these actions as follows: 

 

Option A:

There are only three Security actionAttributes targets for an assembly: RequestMinimumAssembly, RequestOptionalAssembly, and RequestRefuseAssembly. 

 

 Option C, D:

Imperative security does not work well to configure security for an entire assembly. In imperative security, permission to execute is demanded at run time.

Report Error

View Answer Report Error Discuss

1 2053
Q:

A manager in your office received a new Windows 2000 Professional laptop computer. You have been asked to configure offline files for the manager to work on documents at home. You enable offline files, and have the manager log off of the network. During the logoff process, the expected synchronization of offline files does not occur. You have the manager log back on to the network. What can you do to correct the problem?

A) Enable file and print sharing. When the manager logs off, the files will synchronize. B) Manually synchronize all offline files.
C) On the server, make all files available offline. When the manager logs off, the files will synchronize. D) Do nothing. Windows 2000 Professional does not tell you when Synchronization happens.
 
Answer & Explanation Answer: C) On the server, make all files available offline. When the manager logs off, the files will synchronize.

Explanation:
Report Error

View Answer Report Error Discuss

0 2053
Q:

The Backstage View in Word 2010 presents an easy way to access all the tools you need to manage your documents. It helps prevent clutter on the main Word 2010 Ribbon and provides core file management functions. There are 6 tabs across the top of the Backstage View window, one of these is called Info. Which of these functions does Info contain?

A) Set user permissions for documents B) Know when a document was last printed
C) Run accessibility tests D) All of these
 
Answer & Explanation Answer: D) All of these

Explanation:
Report Error

View Answer Report Error Discuss

1 2052
Q:

You are creating an ASP.NET application for XYZ. The company data is stored in a Microsoft SQL Server 6.5 database. Your application generates accounting summary reports based on transaction tables that contain million of rows.


You want your application to return each summary report as quickly as possible. You need to configure your application to connect to the database and retrieve the data in a away that achieves this goal.


What should you do?

A) Use a SqlConnection object to connect to the database, and use a SqlCommand object to run a stored procedure that returns the data. B) Use an OleDbConnection object to connect to the database, and use an OleDbCommand object to run a stored procedure that returns the data.
C) Configure SQL Server to support HTTP access, and create an XML template to run a stored procedure that returns the data in XML format. D) Use COM interop to create an ADODB.Connection object, and use an ADODB.Command object to run a SQL statement that returns the data.
 
Answer & Explanation Answer: B) Use an OleDbConnection object to connect to the database, and use an OleDbCommand object to run a stored procedure that returns the data.

Explanation:

We need to use an OleDBConnection to connect to SQL Server Version 6.5 (or earlier). 

 

Incorrect Answers:

 

A: We could use a SqlConnection object only if the SQL Server were SQL Server 7.0, 2000 or later.

 

C: HTTP functionality is not required in this scenario. It would introduce unnecessary overhead.

 

D: ADODB is a legacy standard and should not be used here

Report Error

View Answer Report Error Discuss

1 2049
Q:

You want to move the Philadelphia OU from the acme1.com domain to the acme2.com domain. Which tool should you use?

A) MoveTree.exe B) The move command -line utility
C) Server Extensions Administrator D) Active Directory Domains and Trusts
 
Answer & Explanation Answer: A) MoveTree.exe

Explanation:

Use MoveTree.exe to move Active Directory objects from one domain to another.

Report Error

View Answer Report Error Discuss

0 2047
Q:

Word 2010 has a particular template that it uses when you first open the program. This template contains default styles, no text and you also use it when you create new, blank documents. As you customize styles, marcos and other elements these settings are automatically stored in this template.

 

What is the name of this template file?

A) Standard.dotx B) Normal.dotx
C) Empty.dotx D) Template.dotx
 
Answer & Explanation Answer: B) Normal.dotx

Explanation:
Report Error

View Answer Report Error Discuss

1 2042