题目详情
当前位置:首页 > 职业培训考试
题目详情:
发布时间:2023-12-03 03:48:36

[单项选择]You are developing a data contract for a Windows Communication Foundation (WCF) service. The data in the data contract must participate in round trips. Strict schema validity is not required. You need to ensure that the contract is forward-compatible and allows new data members to be added to it. Which interface should you implement in the data contract class?()
A. ICommunicationObject
B. IExtension
C. IExtensibleObject
D. IExtensibleDataObject

更多"You are developing a data contract "的相关试题:

[单项选择]Have you shut the windows
[单项选择] After implementing full Oracle Data Redaction, you change the default value for the NUMBER data type as follows: After changing the value, you notice that FULL redaction continues to redact numeric data with zero. What must you do to activate the new default value for numeric full redaction?()
A. Re-enable redaction policies that use FULL data redaction.
B. Re-create redaction policies that use FULL data redaction.
C. Re-connect the sessions that access objects with redaction policies defined on them.
D. Flush the shared pool.
E. Restart the database instance
[单项选择] You create a Data Collector Set (DCS).You need prevent the DCS from logging data if the server has less than 1 GB of available disk space. What should you do?()
A. Create a passive file screen.
B. Create an active file screen.
C. Modify the Data Manager settings of the DCS.
D. Modify the Stop Conditions settings of the DCS.
[单项选择]Which of the following data network would you implement if you wanted a wireless network that had a relatively high data rate, but was limited to very short distances?()
A. Broadband personal comm. Service (PCS)
B. Broadband circuit
C. Infrared
D. Spread spectrum
E. Cable
[单项选择]You enabled Flashback Data Archive on the INVENTORY table.Which DDL operation is supported on the table after enabling Flashback Data Archive?()
A. Drop the table.
B. Partition the table
C. Truncate the table.
D. Add a column to the table.
E. Rename a column in the table.
[单项选择] You need to perform certain data manipulation operations through a view called EMP_DEPT_VU, which you previously created. You want to look at the definition of the view (the SELECT statement on which the view was create.) How do you obtain the definition of the view?()
A. Use the DESCRIBE command in the EMP_DEPT VU view.
B. Use the DEFINE VIEW command on the EMP_DEPT VU view.
C. Use the DESCRIBE VIEW command on the EMP_DEPT VU view.
D. Query the USER_VIEWS data dictionary view to search for the EMP_DEPT_VU view.
E. Query the USER_SOURCE data dictionary view to search for the EMP_DEPT_VU view.
F. Query the USER_OBJECTS data dictionary view to search for the EMP_DEPT_VU view.
[单项选择]Which data dictionary table should you query to view the object privileges granted to the user on specific columns?()
A. USER_TAB_PRIVS_MADE
B. USER_TAB_PRIVS
C. USER_COL_PRIVS_MADE
D. USER_COL_PRIVS
[多项选择]Identify two situations in which you can use Data Recovery Advisor for recovery. ()(Choose two.)
A. The user has dropped an important table that needs to be recovered.
B. The database files are corrupted when the database is open.
C. You are not able to start up the database instance because the required database files are missing.
D. The archived log files are missing for which backup is not available.
[单项选择] You are debugging a Windows Communication Foundation (WCF) service. The service uses signed and encrypted messages.You need to configure logging so that you can read the contents of the messages. What should you do?()
A. Set maxSizeMessagesToLog to 10
B. Set logMessageAtServiceLevel to true.
C. Set maxMessagesToLog to 10.
D. Set logMessageAtTransportLevel to true.
[单项选择]You are developing a Windows Communication Foundation (WCF) service. The service needs to access out-of-process resources.You need to ensure that the service accesses these resources on behalf of the originating caller. What should you do?()
A. Set the value of ServiceSecurityContext.Current.WindowsIdentity.ImpersonationLevel to TokenlmpersonationLevel.Impersonation
B. Set the value of ServiceSecurityContext.Current.Windowsldentity.ImpersonationLevel to TokenlmpersonationLevel.Delegation
C. Set the PrincipalPermissionAttribute on the service contract and update the binding attribute in the endpoint element of the configuration file to wsHttpBinding
D. Set the PnncipalPermissionAttribute on the service contract and update the bindingConfiguration attribute in the endpoint element of the configuration file to wsHttpBinding
[单项选择] You are creating a Windows Communication Foundation (WCF) service that uses claims-based authorization. The following code retrieves the correct claim set.var claims = ServiceSecurityContext.Current.AuthorizationContext.ClaimSets[0];You need to validate that the requesting client application has included a valid DNS value in the claim. Which code segment should you use to retrieve the claim for validation?()
A. claims.FindClaims(ClaimTypes.Dns, Rights.PossessProperty).FirstOrDefault();
B. claims.FindClaims(ClaimTypes.Dns, Rights.Identity).FirstOrDefault();
C. claims.ContainsClaim(Claim.CreateDnsClaim(ClaimTypes.Dns));
D. claims.Equals(ClaimTypes.Dns);

我来回答:

购买搜题卡查看答案
[会员特权] 开通VIP, 查看 全部题目答案
[会员特权] 享免全部广告特权
推荐91天
¥36.8
¥80元
31天
¥20.8
¥40元
365天
¥88.8
¥188元
请选择支付方式
  • 微信支付
  • 支付宝支付
点击支付即表示同意并接受了《购买须知》
立即支付 系统将自动为您注册账号
请使用微信扫码支付

订单号:

请不要关闭本页面,支付完成后请点击【支付完成】按钮
恭喜您,购买搜题卡成功
重要提示:请拍照或截图保存账号密码!
我要搜题网官网:https://www.woyaosouti.com
我已记住账号密码