PrepAway - Latest Free Exam Questions & Answers

Author: seenagape

Which two actions should you perform in the MDM Console?

Employees have Windows Mobile 6.5 devices. You manage the devices by using Microsoft System Center Mobile Device Manager (MDM) 2008. You modify the expiration period for wipe requests. Several managed devices have wipe requests with a status of Pending. You need to wipe the devices that have pending wipe requests.
Which two actions should you perform in the MDM Console? (Each correct answer presents part of the solution. Choose two.)

you recommend?

You are designing an external binary large object (BLOB) store provider by implementing the ISP External Binary
Provider interface. The farm has existing sites that contain content. Your implementation has been verified to be
working correctly. You need to ensure that content within existing sites is moved using the external BLOB store
provider. You also must ensure that the solution does not require further custom coding. Which approach should
you recommend?

Which code segment should you add to the console application?

You have a custom theme named MyTheme. The theme is defined in a file named MyTheme.thmx.

You have a console application that contains the following code segment. (Line numbers are included for reference only.)

01 using (SPSite site=new SPSite(http://intranet))
02 {
03 SPWeb web=site.OpenWeb();
04
05 }

You need to programmatically apply the theme to a SharePoint site.

Which code segment should you add to the console application?

What should you do first?

You are deploying a run-time image by using an SDI file. Your destination device is connected to the network where the SDI file resides. The destination device contains a single disk with a single partition. You start the destination device by using a floppy disk with 16-bit DOS. You need to deploy the run-time image. What should you do first?

What should you do?

Your company has a Microsoft Exchange Server 2007 Service Pack 1 (SP1) environment with Standard client access licenses (CALs) installed. Employees have Windows Mobile 6.5 devices. You manage the devices by using Microsoft Exchange ActiveSync. You configure an Exchange ActiveSync policy to allow only signed applications to run on the Windows Mobile devices. Employees are still able to run unsigned applications on their Windows Mobile devices. You need to ensure that employees cannot run unsigned applications on their Windows Mobile devices.
What should you do?

Which approach should you recommend?

You are using Business Connectivity Services to design a SharePoint 2010 application that connects to an
external database. The database users have accounts for authentication that are different from their Active
Directory accounts. You have a requirement to allow users to connect to the external database without prompting
the user for credentials. You need to store user credentials and use these credentials when connecting to the
external database. Which approach should you recommend?