You upgrade a Windows Forms application to Microsoft .NET Framework 4. The application was developed by using a previous version of the .NET Framework. The application uses the Code Access Security (CAS) policy for file access. When the application is executed, you receive the following exception: "NotSupportedException: This method uses CAS policy, which has been obsoleted by the .NET Framework." You need to resolve the error. What should you do?()
If XYZ LTD needs to upgrade the Cisco IOS Software of a Cisco Router, Where is the best place to download the upgrade image file from?()
You upgrade 6 MPS compliant computers from Windows NT Workstation 4.0 to Windows 2000 Professional computer. Each computer has two 550 MHz processors. The computers are used for high-resolution graphics applications that require exceptional performance. After the upgrade users complain that the processing time for graphic applications is much slower than before. What should you do?()
The Prescott Shovel Company wants to upgrade its Cisco Unity Express from a Cisco Unified CallManager Express integration to a Cisco Unified CallManager integration. Which statement is true?()
You have a computer that runs Windows Vista. You upgrade the network adapter driver on the computer. After the upgrade, you can no longer access network resources. You open Device Manager and see a warning symbol next to the network adapter. You need to restore access to network resources. What should you do?()
A System p administrator needs to upgrade a system from AIX 5.2 to AIX 5.3. Which of the following installation methods would minimize downtime()
A user wants to upgrade to Windows 2000. Which of the following WINNT32 command switches can be run to determine whether the users computer and software is compatible with the new operating system?()
Your company plans to upgrade all client computers to Windows 7. The company uses a custom line-of-business application. The application contains sensitive data. The application will not run on Windows 7 You establish that Microsoft Enterprise Desktop Virtualization (MED-V) v2 is the appropriate technology to allow your organization to continue to use the application. You need to ensure that the virtual machine (VM) images that contain sensitive data can be used only when the user is connected to the MED-V server. What should you do?()
You upgrade all client computers in your network to Windows 2000 Professional. Then you apply the basicwk.inf security template to the computers. Now, none of the users can run the company’s database application. What should you do?()
You upgrade 11 computers in the accounting department from Windows NT Workstation 4.0 to Windows 2000 Professional. All of the upgraded computers are configured to have the default security settings. After the upgrade, users in the accounting department report that they can no longer run any financial or credit applications on their computers. You want all accounting department users to be able to run these applications. You want to allow only the rights that allow users to run the applications. What should you do?()