网友您好, 请在下方输入框内输入要搜索的题目:

题目内容 (请给出正确答案)
单选题
You need to design a method of communication between the IT and HR departments. Your solution must meet business requirements. What should you do?()
A

Design a custom IPSec policy to implement Encapsulating Security Payload (ESP) for all IP traffic Design the IPSec policy to use certificate-based authentication between the two departments’ computers

B

Design a customer IPSec policy to implement Authentication Header (AH) for all IP traffic. Desing the IPSec policy to use preshared key authentication between the two departments’ computers

C

Design a customer IPSec policy to implement Encapsulating Payload (ESP) for all IP traffic. Desing the IPSec policy to use preshared key authentication between the two departments’ computers

D

Design a customer IPSec policy to implement Authentication Header (AH) for all IP traffic. Desing the IPSec policy to use certificate-based authentication between the two departments’ computers


参考答案

参考解析
解析: 暂无解析
更多 “单选题You need to design a method of communication between the IT and HR departments. Your solution must meet business requirements. What should you do?()A Design a custom IPSec policy to implement Encapsulating Security Payload (ESP) for all IP traffic Design the IPSec policy to use certificate-based authentication between the two departments’ computersB Design a customer IPSec policy to implement Authentication Header (AH) for all IP traffic. Desing the IPSec policy to use preshared key authentication between the two departments’ computersC Design a customer IPSec policy to implement Encapsulating Payload (ESP) for all IP traffic. Desing the IPSec policy to use preshared key authentication between the two departments’ computersD Design a customer IPSec policy to implement Authentication Header (AH) for all IP traffic. Desing the IPSec policy to use certificate-based authentication between the two departments’ computers” 相关考题
考题 You are creating a Windows Communication Foundation (WCF) service that implements operations in a RESTful manner. You need to add a delete operation. You implement the delete method as follows:void DeleteItems(string id);You need to configure WCF to call this method when the client calls the service with the HTTP DELETE operation. What should you do?()A. Add the WebInvoke(UriTemplate=/Items/{id}, Method=DELETE) attribute to the operationB. Add the HttpDelete atribute to the operationC. Replace the string parameter with a RemovedActivityAction parameterD. Replace the return type with RemovedActivityAction.

考题 A( )is a software that provides a method of communication between two electronic devices over the world wide webA.routerB.coberC.J2EED.web service

考题 When is a first-hop redundancy protocol needed in the distribution layer?() A. when HSRP is not supported by the designB. when multiple vendor devices need to be supportedC. when preempt tuning of the default gateway is neededD. when a robust method of backing up the default gateway is neededE. when the design implements Layer 2 between the access switch and the distribution switchF. when the design implements Layer 3 between the access switch and the distribution switch

考题 How do you understand the difference between approach, method, and technique?

考题 You need to implement a high availability design in the Company routed network.  Which protocol  allows for the automatic selection and simultaneous use of multiple available gateways as well as  automatic failover between those gateways?()A、 VRRPB、 GLBPC、 IRDPD、 HSRPE、 None of the other alternatives apply

考题 A ( )is a software that provides a method of communication between two electronic devices over the World Wide Web. A、routerB、coberC、J2EED、web service

考题 Your company has a single Active Directory Domain Services (AD DS) domain and 1,000 Windows Vista computers.  You are planning to deploy Windows 7 and a custom application.   You have the following requirements:   The application must be available to only a specific group of users. You must be able to monitor application usage.   You need to design a deployment method for the custom application that meets the requirements.  Which deployment method should you use in your design?()A、software installation in Group PolicyB、startup scripts in Group PolicyC、Microsoft Application Virtualization (App-V)D、baseline Windows 7 image that includes the custom application

考题 You are creating a Windows Communication Foundation (WCF) service that implements the following service contract.[ServiceContract]public interface IOrderProcessing { [OperationContract] void ApproveOrder(int id);}You need to ensure that only users with the Manager role can call the ApproveOrder method. What should you do?()A、In the method body, check the Rights PosessesProperty property to see if it contains ManagerB、Add a PrincipalPermission attribute to the method and set the Roles property to ManagerC、Add a SecurityPermission attribute to the method and set the SecurityAction to DemandD、In the method body, create a new instance of WindowsClaimSet. Use the FindClaims method to locate a claimType named Role with a right named Manager

考题 When is a first-hop redundancy protocol needed in the distribution layer?()A、when HSRP is not supported by the designB、when multiple vendor devices need to be supportedC、when preempt tuning of the default gateway is neededD、when a robust method of backing up the default gateway is neededE、when the design implements Layer 2 between the access switch and the distribution switchF、when the design implements Layer 3 between the access switch and the distribution switch

考题 When is a first-hop redundancy protocol needed in the distribution layer?()A、 when the design implements Layer 2 between the access arid distribution blocksB、 when multiple vendor devices need to be supportedC、 when preempt tuning of the default gateway is neededD、 when a robust method of backing up the default gateway is neededE、 when the design implements Layer 2 between the access switch and the distribution blocksF、 when the design implements Layer 2 between the access and distribution blocks

考题 You need to design a method to allow the new-ideas-testking.com Web site to function in accordance with security and business requirements.  What should you do?()A、Require a PPTP VPN for all connections to the Web serverB、Require that traffic between Web browsers and the Web server uses an L2TP/IPSec tunnelC、Require that traffic between Web browsers and the Web server uses SSLD、Require certificate mappings between the Web server and Active Directory

考题 You are developing a Windows Communication Foundation (WCF) service that is hosted by a Windows Forms Application.The ServiceHost instance is created in the Form Constructor.You need to ensure that the service is not blocked while the UI thread is busy. What should you do?()A、Decorate the service implementation class with the following line of code [ServiceBehavior(UseSyncronizationContext = false)]B、Decorate the service implementation class with the following line of code [ServiceBehavior(ConcurrencyMode = ConcurrencyMode.Multiple)]C、Call the Invoke method of the form and supply a delegate.D、Call the BeginInvoke method of the form and supply a delegate.

考题 You need to design a method to address the chief information officer’s security concerns. What should you do?()A、Configure Windows Management Instrumentation (WMI) filtering options in the Default Domain Policy GPOB、Use the gpresult commandC、Use Mbsacli.exeD、Configure software restriction policy options in the Default Domain Policy GPO

考题 You are evaluating the implementation of two Hyper-V hosts for the Web servers. You need to design a solution that will move the Web servers automatically between the Hyper-V hosts based on the physical resources available. Which software should you include in the design?()A、Microsoft System Center Operations ManagerB、Microsoft System Center Virtual Machine ManagerC、Microsoft System Center Data Protection ManagerD、Microsoft System Center Configuration Manager

考题 You are developing a custom-collection class.You need to create a method in your class. You need to ensure that the method you create in your class returns a type that is compatible with the Foreach statement. Which criterion should the method meet?()A、The method must return a type of either IEnumerator or IEnumerable.B、The method must return a type of IComparable.C、The method must explicitly contain a collection.D、The method must be the only iterator in the class.

考题 You are developing a Windows Communication Foundation (WCF) service. You write a method named Submit that accepts messages of the type System.ServiceModel.Channels.Message. You need to process the body of the incoming messages multiple times in the method. Which two actions should you perform? (Each correct answer presents part of the solution. Choose two.)()A、Use the GetBody method of the Message class to read the content of the messages.B、Use the CreateBufferedCopy method of the Message class to load the messages into memory.C、Use the WriteBodyContents method of the BodyWriter class to make a copy of the messages.D、Use the CreateMessage method of the MessageBuffer class to make a copy of the messages.

考题 You need to design a method to ensure that research intellectual property remains confidential. You solution must meet security requirements. What should you do?()A、Require client computers to connect to research intellectual property through a SSL VPNB、Place SFSQL1 and ATLSQL1 on a separate virtual LAN from the internal network. Grant access to these virtual LAN segments to only the client computers that are used by authorized usersC、Require that communications between SFSQL1, SFFP1, ATLSQL1, and ATLFP1 use IPSecD、Create a separate subnet for all servers that contain research intellectual property

考题 You need to design a method of communication between the IT and HR departments. Your solution must meet business requirements. What should you do?()A、Design a custom IPSec policy to implement Encapsulating Security Payload (ESP) for all IP traffic Design the IPSec policy to use certificate-based authentication between the two departments’ computersB、Design a customer IPSec policy to implement Authentication Header (AH) for all IP traffic. Desing the IPSec policy to use preshared key authentication between the two departments’ computersC、Design a customer IPSec policy to implement Encapsulating Payload (ESP) for all IP traffic. Desing the IPSec policy to use preshared key authentication between the two departments’ computersD、Design a customer IPSec policy to implement Authentication Header (AH) for all IP traffic. Desing the IPSec policy to use certificate-based authentication between the two departments’ computers

考题 单选题When is a first-hop redundancy protocol needed in the distribution layer?()A when HSRP is not supported by the designB when multiple vendor devices need to be supportedC when preempt tuning of the default gateway is neededD when a robust method of backing up the default gateway is neededE when the design implements Layer 2 between the access switch and the distribution switchF when the design implements Layer 3 between the access switch and the distribution switch

考题 单选题You are creating a Windows Communication Foundation (WCF) service that implements the following service contract.[ServiceContract]public interface IOrderProcessing { [OperationContract] void ApproveOrder(int id);}You need to ensure that only users with the Manager role can call the ApproveOrder method. What should you do?()A In the method body, check the Rights PosessesProperty property to see if it contains ManagerB Add a PrincipalPermission attribute to the method and set the Roles property to ManagerC Add a SecurityPermission attribute to the method and set the SecurityAction to DemandD In the method body, create a new instance of WindowsClaimSet. Use the FindClaims method to locate a claimType named Role with a right named Manager

考题 单选题You are developing a Windows Presentation Foundation (WPF) application.You need to display HTML content from a Web page on the WPF form. What should you do?()A Add a FlowDocumentReader control to the design surface. Then create a FlowDocument control.B Add a DocumentViewer control to the design surface. Then create a FixedDocument control.C Add a WebBrowser control to the design surface. Then use the Navigate method to navigate the URI object.D Add a ContentControl control to the design surface. Then reference a WebClient object to return an HTML string.

考题 单选题In your web application,you need to execute a block of code whenever the session object is first created. Which design will accomplish this goal?()A Create an HttpSessionListener class and implement the sessionInitialized method with that block ofcode.B Create an HttpSessionActivationListener class and implement the sessionCreated method with thatblock of code.C Create a Filter class, call the getSession(false) method, and if the result was null, then execute that block of code.D Create an HttpSessionListener class and implement the sessionCreated method with that block of code.

考题 单选题You are creating a Windows Communication Foundation (WCF) service that implements operations in a RESTful manner.You need to add a delete operation. You implement the delete method as follows. string void DeleteItems(string id);You need to configure WCF to call this method when the client calls the service with the HTTP DELETE operation. What should you do?()A  Add the WebInvoke(UriTemplate = /Items/{id},Method=DELETE) attribute to the operation.B  Add the HttpDelete attribute to the operation.C  Replace the string parameter with a RemovedActivityAction parameter.D  Replace the return type with RemovedActivityAction.

考题 单选题You are creating a Windows Communication Foundation (WCF) service that implements operations in a RESTful manner. You need to add a delete operation. You implement the delete method as follows:void DeleteItems(string id);You need to configure WCF to call this method when the client calls the service with the HTTP DELETE operation. What should you do?()A Add the WebInvoke(UriTemplate=/Items/{id}, Method=DELETE) attribute to the operationB Add the HttpDelete atribute to the operationC Replace the string parameter with a RemovedActivityAction parameterD Replace the return type with RemovedActivityAction.

考题 单选题When is a first-hop redundancy protocol needed in the distribution layer?()A  when the design implements Layer 2 between the access arid distribution blocksB  when multiple vendor devices need to be supportedC  when preempt tuning of the default gateway is neededD  when a robust method of backing up the default gateway is neededE  when the design implements Layer 2 between the access switch and the distribution blocksF  when the design implements Layer 2 between the access and distribution blocks

考题 单选题You are developing a custom-collection class.You need to create a method in your class. You need to ensure that the method you create in your class returns a type that is compatible with the Foreach statement. Which criterion should the method meet?()A The method must return a type of either IEnumerator or IEnumerable.B The method must return a type of IComparable.C The method must explicitly contain a collection.D The method must be the only iterator in the class.

考题 单选题Your company has client computers that run Windows XP Professional.   You are planning to install Windows 7 Enterprise on the existing client computers.    You need to design a user state migration strategy that minimizes network bandwidth and server use when user data is being migrated.   What should you do?()A Use the Refresh Computer method and a hard-link migration store.B Use the Refresh Computer method and a compressed migration store.C Use the Replace Computer method and a hard-link migration store.D Use the Replace Computer method and a compressed migration store.

考题 单选题You need to design a method of communication between the IT and HR departments. Your solution must meet business requirements. What should you do?()A Design a custom IPSec policy to implement Encapsulating Security Payload (ESP) for all IP traffic Design the IPSec policy to use certificate-based authentication between the two departments’ computersB Design a customer IPSec policy to implement Authentication Header (AH) for all IP traffic. Desing the IPSec policy to use preshared key authentication between the two departments’ computersC Design a customer IPSec policy to implement Encapsulating Payload (ESP) for all IP traffic. Desing the IPSec policy to use preshared key authentication between the two departments’ computersD Design a customer IPSec policy to implement Authentication Header (AH) for all IP traffic. Desing the IPSec policy to use certificate-based authentication between the two departments’ computers