网友您好, 请在下方输入框内输入要搜索的题目:

题目内容 (请给出正确答案)
单选题
You need to reduce the level of access that a malicious Web site might have to your computer.  What should you do? ()
A

Start a Windows Defender scan.

B

Enable Microsoft Windows Internet Explorer Phishing Filter.

C

Enable Microsoft Windows Internet Explorer Pop-up Blocker.

D

Confirm that Microsoft Windows Internet Explorer Protected Mode is enabled on the Internet security zone.


参考答案

参考解析
解析: 暂无解析
更多 “单选题You need to reduce the level of access that a malicious Web site might have to your computer.  What should you do? ()A Start a Windows Defender scan.B Enable Microsoft Windows Internet Explorer Phishing Filter.C Enable Microsoft Windows Internet Explorer Pop-up Blocker.D Confirm that Microsoft Windows Internet Explorer Protected Mode is enabled on the Internet security zone.” 相关考题
考题 You need to create a web share on your Windows 2000 Professional computer named Admin01. You create a folder named reports. Then you configure web sharing on Reports. You name the share WebReports and allow Read permissions on the share.You test the web share by pointing to http://admin01/WebReports from another computer. You receive the following error message, 'You are not authorized to view this page.'You need to be able to access the folder. What must you do?A.Allow write permission on WebReports.B.Allow directory browsing permissions on WebReports.C.In the IIS console, enable anonymous access to WebReports.D.In the IIS console, set the execute permissions option to script. and executables on WebReports.

考题 If you need to access information and know where it is on the Web, you only need to enter the entire www address into your browser’s Uniform. Resource Locator (URL) field.() 此题为判断题(对,错)。

考题 You configure parental controls on your computer for your child‘s user account. Your child logs on with a different account and is able to access inappropriate Web sites. You need to ensure that your child cannot access inapproriate Web sites.What should you do?()A.AB.BC.CD.D

考题 You have a computer that runs Windows Vista.You connect to your company’s network by using a virtual private network (VPN) connection. You notice that when you establish the VPN connection, you are unable to access Internet Web sites. When you disconnect the VPN connection, you can access Internet Web sites.You need to access Internet Web sites while you are connected to the VPN connection.What should you do?()A.AB.BC.CD.D

考题 You need to reduce the level of access that a malicious Web site might have to your computer.What should you do?() A.AB.BC.CD.D

考题 Your company has an Actrve Directory forest that runs at the functional level of Windows Server 2008 You implement Actrve Directory Rights Management Services (AD RMS) You install Microsoft SOL Server 2005 When you attempt to open the AD RMS administration Web site, you recerve the following error message: "SOL Server does not exist or access denied" You need to open the AD RMS administration Web site Which two actions should you perform()A、Restart liSB、Install Message OueuingC、Start the MSSOLSVC serviceD、Manualy delete the Service Connection Point in AD OS and restart AD RMS

考题 You have a Web application that is configured for personalization. You need to access personalization data from one of the pages of the Web application by using the minimum amount of administrative effort. What should you do? ()A、Access the personalization data from the Session property of the HttpContext object.B、Access the personalization data from the Application property of the HttpContext object.C、Access the personalization data from the Cache property of the HttpContext object.D、Access the personalization data from the Profile property of the HttpContext object.

考题 You have an Exchange Server 2010 organization.  All users access their mailboxes by using Outlook Web App (OWA).  You need to plan a solution to reduce the number of e-mail messages that are accidentally sent todistribution groups that contain company executives.  What should you include in the plan?()A、custom MailTipsB、dynamic distribution groupsC、Outlook Protection RulesD、sharing policies

考题 Your company runs Remote Desktop Services. You have a Remote Desktop Web Access (RD Web Access) server. You publish several applications on the internal networ k by using RD Web Access. You need to ensure that the published applications are accessible from the Internet via an HTTPS connection over port 443. What should you do first?()A、Use Internet Information Services (IIS) Manager to disable Forms Authentication .B、Use Internet Information Services (IIS) Manager to enable Windows Authentication.C、Install and configure the Remote Desktop Gateway (RD Gateway) role service on the RD Web Access server.D、Install and configure the Remote Desktop Connection Broker (RD Connection Broker) role service on the RD Web Access server.

考题 You create a Microsoft ASP.NET application by using the Microsoft .NET Framework version 3.5.  When you access the application in a Web browser, you receive the following error message: "Service Unavailable".  You need to access the application successfully.  What should you do? ()A、Start Microsoft IIS 6.0.B、Start the Application pool.C、Set the .NET Framework version.D、Add the Web.config file for the application.

考题 You are developing a Web application. The Web application restricts access to an administrative page. The Web application uses the following code segment to protect the page.if (Page.User.Identity.Name != @"CONTOSO/Administrator") { the page, you are redirected to Login.aspx. You discover that the User.Identity.Name property is not being correctly populated. You need to ensure that you can access the page when you are logged on as Administrator. Which two actions should you perform? ()A、In the Web.config file, enable impersonation.B、In IIS, enable anonymous access.C、In IIS, disable anonymous access.D、In the Web.config file, set the authentication mode to Windows.

考题 单选题You need to design a security strategy for a remote e-mail access. What should you do?()A Require remote users to access e-mails by using Outlook Mobile AccessB Require Outlook Web Access users to install the secure MIME ActiveX-Control and to encrypt all messagesC On Outlook Web Access servers that accept connections from the Internet configure IIS to require SSL for all connectionsD On Outlook Web Access servers that accept connections from the Internet configure IIS to require Integrated Windows Authentication

考题 多选题You are developing a Web application. The Web application restricts access to an administrative page. The Web application uses the following code segment to protect the page.if (Page.User.Identity.Name != @"CONTOSO/Administrator") { the page, you are redirected to Login.aspx. You discover that the User.Identity.Name property is not being correctly populated. You need to ensure that you can access the page when you are logged on as Administrator. Which two actions should you perform? ()AIn the Web.config file, enable impersonation.BIn IIS, enable anonymous access.CIn IIS, disable anonymous access.DIn the Web.config file, set the authentication mode to Windows.

考题 多选题You are developing a Web application. The Web application restricts access to an administrative page. The Web application uses the following code segment to protect the page.If Page.User.Identity.Name "CONTOSO/Administrator" Then Response.Redirect("login.aspx")End IfYou are logged on as Administrator. When you display the page, you are redirected to Login.aspx. You discover that the User.Identity.Name property is not being correctly populated. You need to ensure that you can access the page when you are logged on as Administrator. Which two actions should you perform? ()AIn the Web.config file, enable impersonation.BIn IIS, enable anonymous access.CIn IIS, disable anonymous access.DIn the Web.config file, set the authentication mode to Windows.

考题 单选题You are able to access a Web server from your computer by using the IP address of the Web server. You fail to access the Web server when you use its fully qualified domain name. Other users on your network can access the Web server by using both the IP address and the fully  qualified domain name. You need to access the Web server by using the fully qualified domain name.  What should you do? ()A Use the Diagnose and repair feature in the Network and Sharing Center.B At the command prompt, type ipconfig /allcompartments.C Disable the NetBIOS feature on your network adapter.D Configure the correct default gateway on the Alternate Configuration tab of your network connection properties dialog box.

考题 单选题You install the Web Server (IIS) role on a new server that runs Windows Server 2008.  You install a Microsoft .NET Framework 1.0 application on a Web site on the Web server. The company security policy states that all applications must run by using the minimum level of permission.  You need to configure the Web site application so that it has the permissions to execute without creating any other content and without accessing any operating system components. What should you do?()A Set the .NET Framework trust level to Full for the Web site.B Set the .NET Framework trust level to Low for the Web site.C Set the .NET Framework trust level to High for the Web site.D Set the .NET Framework trust level to Medium for the Web site.

考题 单选题You need to design a configuration for the Microsoft Outlook Web Access servers. What should you do?()A Create a Network Load Balancing cluster that contains the Outlook Web Access serversB Create a Microsoft Cluster Server cluster that contains the Outlook Web Access serversC Create public DNS host (A) resource records for each Outlook Web Access server. Instruct each user to connect to the server that contains his or her mailboxD Install Microsoft Application Center 2000 on the Outlook Web Access servers. Create a Web cluster that contains all of the Outlook Web Access servers

考题 多选题You need to design an access control strategy for the external and intranet Web sites. Which two actions should you perform?()AEnable SSL on the external Web site by using a Microsoft cryptographic service provider (CSP)BEnable Microsoft .NET Passport authentication on the external Web site. Use Passport Level 0 with SSL on the external Web siteCEnable SSL on the external Web site by using a commercial digital certificateDEnable SSL on the intranet Web site by using an internal server certificateEEnable SSL on the external Web site by using an internal server certificate

考题 单选题You are deploying a Web site to a server managed by a hosting company. The only access you have to the server is through FTP. You need to precompile and deploy the Web site without its source files. What should you do? ()A Use the Copy Web tool.B Use the Publish Web tool.C Use XCOPY.D Use the Web Setup project Installer.

考题 单选题You need to design the deployment of antivirus software. What should you do?()A Install the antivirus software on each mailbox storage serverB Install the antivirus software on each Outlook Web Access serverC Install the antivirus software on one Outlook Web Access server at each officeD Install the antivirus software on a back-end server that contains no mailboxes

考题 单选题You have a computer that runs Windows 7 and Windows Internet Explorer 8. A user named User1 attemptsto access a Web page. User1 fails to access the Web page and receives an error message stating that thepage does not have a rating. You need to configure Internet Explorer to allow User1 to access Web pagesthat do not have a rating.  Which settings should you modify?()A Content AdvisorB InPrivate FilteringC Parental ControlsD Restricted sites