Certkiller.com has hired you as a system administrator for their network. The Certkiller.comnetwork consists of a Microsoft ASP.NET Framework v1.0 application. The current application is configured to run Microsoft IIS 6.0. The current application is not usingany of the features that are deprecated in Microsoft .NET Framework v3.5. You receive an instruction from management to configure the application to use ASP.NET Framework v3.5. Youneed to achieve this without recompiling the application. What should you do?()
A: A
B: B
C: C
D: D
A: A
B: B
C: C
D: D
举一反三
- You are employed as a system administrator at Certkiller.com. You decide to create an ASP.NETWeb application on the companies’ network. You do this using Microsoft .NET Framework v3.5. You are in the process opf planning the establishing authentication for the Web application. Youneed to make sure that the application is able to support clients from untrusted domains. However,unknown clients should not be able to access the application. What should you do?() A: A B: B C: C D: D
- Certkiller.com has employed you as a system administrator. You are in the process of creating anASP.NET AJAX application using .NET Framework v3.5. You receive an instruction from management to debug the JavaScript code in the application. Youthen attach Microsoft Visual Studio 2008 debugger to the Microsoft Internet Explorer instance. Youneed to make sure that the details of the client side object on the debugger console is displayedon the application. What should you do?() A: This can be achieved using the Sys.Debug.fail method. B: This can be achieved using the Sys.Debug.traceDump method. C: This can be achieved using the Sys.Debug.trace method. D: This can be achieved using the Sys.Debug.assert method.
- You work as an application developer at Certkiller .com. You have recently created an application domain for Certkiller .com. A few weeks later, you are required to determine if assembly references in this application domain, which is the current application domain, are being cached. What property should you use to achieve this objective?() A: AppDomain.CurrentDomain.ShadowCopyFiles B: AppDomain.CurrentDomain.CachePath C: AppDomain.CurrentDomain.ConfigurationFile D: AppDomain.CurrentDomain.Evidence
- You have migrated a web application from .net 3.5 to 4.0. the application hat to render same as in .net 3.5.() A: someoptions B: C: D:
- Certkiller.com has employed you as a system administrator. You are in the process of creating anASP.NET application using Microsoft.NET Framework v3.5. This application will be hosted on aserver named CERTKILLER-SR01. CERTKILLER-SR01 is configured to run Microsoft IIS 5.0. You are assigned a computer named CERTKILLER-WS02. You make use of CERTKILLER-WS02to log on to the companies domain with an account named CKUser. CERTKILLER-SR01 andCERTKILLER-WS02 are both members of the Certkiller.com domain. To ensure productivity youneed to establish the necessary permissions to allow remote debugging. What should you do?() A: Your best option would be to ensure that the Remote Debugging Monitor is set to make use ofWindows Authentication. B: Your best option would be to ensure that the CKUser account is added to the domainAdministrators group. C: Your best option would be to ensure that the AS D: NET worker process is changed onCERTKILLER-SR01 to run as the local Administrator account. E: Your best option would be to ensure that the CKUser account is added to the localAdministrators group on CERTKILLER-SR01.