考题
You develop a Windows Communication Foundation (WCF) service that uses basic authentication for client credentials. This service is currently configured to use message security. The service is hosted on a server in workgroup mode.Users report that their passwords are stolen when they use public computers.You need to ensure that messages are secure and users are authenticated.You prevent the service from being called over HTTP through Microsoft Internet Information Services (IIS) configuration.What should you do next?()A. Use the transport security mode and specify None for transport client credential type.B. Use the transportWithMessageCredential security mode and specify Basic for the transport client credential type.C. Use the message security mode and specify Basic for the transport client credential type.D. Use the transportWithMessageCredential security mode and specify None for the transport client credential type.
考题
● TCP/IP communication protocol contains four layers. From bottom to top, the four layers are __(71)__.(71)A.network interface layer, internet layer, transport layer and application layerB.internet layer, network interface layer, transport layer and application layerC.network interface layer, transport layer, network interface layer and application layerD.application layer, transport layer, internet layer and network interface layer
考题
TCP/IP communication protocol contains four layers. From bottom to top, the four layers are __(71)__.A.network interface layer, internet layer, transport layer and application layerB.internet layer, network interface layer, transport layer and application layerC.network interface layer, transport layer, network interface layer and application layerD.application layer, transport layer, internet layer and network interface layer
考题
Your company has an Active Directory Domain Services (AD DS) domain. You virtualize applications by using Microsoft Application Virtualization (App-V).You are creating an application virtualization package.Which should you use?()A.Microsoft Application Virtualization SequencerB.Microsoft Application Virtualization Desktop ClientC.Microsoft System Center Application Virtualization Streaming ServerD.Microsoft System Center Application Virtualization Management Server
考题
nternational Transport
Transport plays an important part in international business because goods produced have to be delivered to the
buyers abroad, and the delivery of goods is to be made possible by transport services. Goods are carried by
several means of transport on road or rail, by sea or air. And in recent years, combined transport which is a
road-sea-rail carriage appeared.
With the expansion of international trade, the container service has become popular. The use of containers
provides a , highly effective form of transport . by road, rail and sea, Basically , orabout 98% of world trade is
carried out by sea transport.Besides transport by sea, road, or rail, nowadays in order to speed up delivery,
carriage by air international has also become popular.
The use of containers gives a very helpful method of transport.
考题
Overlay Transport Virtualization (OTV) uses the Authoritative Edge Device (AED) to perform which tasks?()A、 The AED is responsible for sending all unicast traffic in a site, while either node in a site can transmit multicast and broadcast.B、 The AED is responsible for load balancing all traffic for all VLANs across the transport network.C、 The AED is responsible for handling all unicast, broadcast, and multicast traffic for a given VLAN within a site.D、 The AED is responsible for MAC address dispute contention for a given VLAN.
考题
You use Microsoft .Net Framework 4 to create a Windows Form application. You created a new application, you then wrote the code below: Thread.CurrentThread.CurrentUICulture = Thread.CurrentThread.CurrentCulture Which of the following options are TRUE? ()A、The user interface will make use of the currently configured culture settings in the Control Panel at present.B、The user interface will make use of new culture settings.C、The user interface will make use of the culture settings that were installed with the operating system.
考题
Your network contains two Exchange Server 2010 Edge Transport servers. The network also contains five Hub Transport servers in two Active Directory sites. All e-mail sent to the network is received by the Edge Transport servers. You plan to configure anti-spam filtering. You need to ensure that the anti-spam filtering configurations are applied to both Edge Transport servers. The solution must use a minimum amount of administrative effort. What should you do?()A、Configure EdgeSync synchronization.B、Implement Active Directory Federation Services (AD FS).C、Join both Edge Transport servers to an Active Directory domain and then create a forest trust from the internal forest.D、Manually configure settings on one Edge Transport server and then export the settings to the othe rEdge Transport server.
考题
Overlay Transport Virtualization (OTV) join interface is used to source the OTV encapsulated traffic and send it to the Layer 3 domain of the data center network. Which statements are true about OTV join interface? ()A、 Join interface is a Layer 3 entity, and with the Cisco NX-OS release 6.0, it can only be defined as a physical interface, physical subinterface, Layer 3 port channel, or Layer 3 port channel subinterface.B、 A single join interface can be defined and associated with a given OTV overlay.C、 Multiple overlays can also share the same join interface.D、 Join interface can be a loopback interface.E、 The join interface is a Layer 3 entity that can be defined as a physical interface but not as a logical one.
考题
You develop a Windows Communication Foundation (WCF) service that uses basic authentication for client credentials. This service is currently configured to use message security. The service is hosted on a server in workgroup mode.Users report that their passwords are stolen when they use public computers.You need to ensure that messages are secure and users are authenticated.You prevent the service from being called over HTTP through Microsoft Internet Information Services (IIS) configuration. What should you do next?()A、Use the transport security mode and specify None for transport client credential type.B、Use the transportWithMessageCredential security mode and specify Basic for the transport client credential type.C、Use the message security mode and specify Basic for the transport client credential type.D、Use the transportWithMessageCredential security mode and specify None for the transport client credential type.
考题
Overlay Transport Virtualization (OTV) overlay interface is a logical multiaccess and multicast- capable interface that must be explicitly defined by the user and where the entire OTV configuration is applied. Which statements are true about OTV overlay interface?()A、 When an OTV edge device receives a Layer 2 frame destined for a remote data center site, the frame is logically forwarded to the overlay interface.B、 The OTV edge device performs the dynamic OTV encapsulation on the Layer 2 packet and sends it to the join interface toward the routed domain.C、 When the OTV edge device receives a Layer 2 frame destined for a remote data center site, the frame is logically forwarded to the join interface.D、 The OTV edge device performs the dynamic OTV encapsulation on the Layer 2 packet and sends it to the overlay interface toward the routed domain.
考题
Overlay Transport Virtualization (OTV) provides an overlay that enables Layer 2 connectivity between separate Layer 2 domains, while keeping these domains independent and preserving the fault isolation, resiliency, and load-balancing benefits of an IP-based interconnection. Which statements are true about OTV Adjacency Server?()A、 Adjacency Server is required when OTV is deployed with unicast-only transport.B、 Adjacency Server is required when OTV is deployed with multicast-enabled transport.C、 Each OTV device wishing to join a specific OTV logical overlay needs to first register with the Adjacency Server.D、 Each OTV device trying to join a specific OTV logical overlay needs to be configured as an Adjacency Server.
考题
Which statement describes OTV configuration on the Cisco Nexus 7000 Series Switches? ()A、 The OTV control-plane protocol uses the IS-IS protocol to establish adjacencies and exchange MAC reachability across the overlay network. You must enable IS-IS with the feature isis command before OTV adjacencies can be established.B、 OTV uses an SSM group range for neighbor discovery and to exchange MAC reachability with other OTV edge peers.C、 The OTV join interface is a routed uplink interface on the edge device used to physically join the overlay network.D、 The OTV internal interface encapsulates the site Layer 2 frames in IP unicast or multicast packets that are then sent to the other sites.
考题
Which of the following can deploy system plans generated by the IBM System Planning Tool (SPT)?()A、 The Hardware Management Console (HMC) and Integrated Virtualization Manager (IVM).B、 The Hardware Management Console (HMC) and Advanced System Manager Interface (ASMI).C、 Integrated Virtualization Manager (IVM) and Advanced System Manager Interface (ASMI).D、 Integrated Virtualization Manager (IVM) and BladeCenter Advanced Management Module (AMM).
考题
Company.com is running a p5-550 system with inactive processors. The system is managed using the Integrated Virtualization Manager. How would the system administrator activate two additional processors?()A、Use the Advanced Systems Management Interface to enter the Capacity on Demand Enablement code.B、Use the Web-based System Manager Interface to enter the Capacity on Demand enablement code.C、Use smitty or smit interface to enter the Capacity on Demand enablement code.D、Use oem_setup_env on the Virtual I/O Server to enter the Capacity on Demand enablement code.
考题
Your company has an Active Directory Domain Services (AD DS) domain. You virtualize applications by using Microsoft Application Virtualization (App - V). You are creating an application virtualization package. Which sh ould you use?()A、Microsoft Application Virtualization SequencerB、Microsoft Application Virtualization Desktop ClientC、Microsoft System Center Application Virtualization Streaming ServerD、Microsoft System Center Application Virtualization Management Server
考题
You use Microsoft .NET Framework 4 to create a Windows Forms application. You created a new application, you then wrote the code below: Thread.CurrentThread.CurrentUICulture = Thread.CurrentThread.CurrentCulture; Which of the following options are TRUE?()A、The user interface will make use of the currently configured culture settings in the Control Panel at present.B、The user interface will make use of new culture settings.C、The user interface will have no culture settings.D、The user interface will make use of the culture settings that were installed with the operating system.
考题
You use Microsoft Application Virtualization for Desktops to virtualize applications for client computers.A virtual application that was installed by using a Windows Installer Package (.msi) file has become corrupted. You need to restore access to the virtual application. Which two actions should you perform?()A、Reload the virtual application package.B、Reinstall the virtual application package.C、Use the Repair function in the Windows Installer Package. Use the Microsoft Application Virtualization (App-V) to re-sequence the application.D、Use the Microsoft Application Virtualization (App-V) Sequencer to edit the virtual application package.
考题
单选题Which interface does the Infranet Controller use to push the configuration? ()A
trusted portB
internal portC
trust interfaceD
untrust interface
考题
单选题You work as the enterprise exchange administrator at TestKing.com. TestKing.com makes use of Microsoft Exchange Server messaging solution. The TestKing.com network consists of a single ActiveDirectory forest with one domain. The internal network of TestKing.com contains a perimeter network. You have received instructions fromthe CIO to install 15 Edge Transport servers on the perimeter network with the following criteria: * The Edge Transport servers should have a security policy, applied by the administrators. * The minimization of the administrative overhead towards the servers. * The minimization the attack surface of the perimeter network. What should you do?()A
The best option is to set up a new Active Directory domain in the internal forest and then join all EdgeTransport servers to the new domain.B
The best option is to make use of Active Directory Federation Services (AD FS).C
The best option is to make use of Network Policy and Access Services (NPAS).D
The best option is to set up a new Active Directory domain in the perimeter network and then join all Edge Transport Servers to the new domain.
考题
多选题Which of the protocols below use TCP at the transport layer?()ATFTPBSMTPCSNMPDFTPEHTTPFHTTPS
考题
单选题When using Overlay Transport Virtualization (OTV), how do L2 multicast frames traverse the overlay?()A
The L2 multicast frames are encapsulated in an OTV packet using the configured control-group multicast address for transportB
The L2 multicast frames are dropped because multicast cannot be carried across the overlay C
The L2 multicast frames are encapsulated in an OTV packet using the configured data-group multicast address for transportD
The L2 multicast frames are forwarded natively across the overlay based on their multicast IDs
考题
单选题You use Microsoft .NET Framework 4 to create a Windows Forms application. You created a new application, you then wrote the code below: Thread.CurrentThread.CurrentUICulture = Thread.CurrentThread.CurrentCulture; Which of the following options are TRUE?()A
The user interface will make use of the currently configured culture settings in the Control Panel at present.B
The user interface will make use of new culture settings.C
The user interface will have no culture settings.D
The user interface will make use of the culture settings that were installed with the operating system.
考题
单选题Which of the following can deploy system plans generated by the IBM System Planning Tool (SPT)?()A
The Hardware Management Console (HMC) and Integrated Virtualization Manager (IVM).B
The Hardware Management Console (HMC) and Advanced System Manager Interface (ASMI).C
Integrated Virtualization Manager (IVM) and Advanced System Manager Interface (ASMI).D
Integrated Virtualization Manager (IVM) and BladeCenter Advanced Management Module (AMM).
考题
单选题Which command would you use to view interface usage details in real time?()A
show interfaces terseB
show interfaces extensiveC
monitor interface trafficD
monitor traffic interface
考题
多选题Which three protocols use UDP as a transport protocol by default?()AHTTPBTFTPCDNSDSNMPESMTP
考题
单选题Overlay Transport Virtualization (OTV) uses the Authoritative Edge Device (AED) to perform which tasks?()A
The AED is responsible for sending all unicast traffic in a site, while either node in a site can transmit multicast and broadcast.B
The AED is responsible for load balancing all traffic for all VLANs across the transport network.C
The AED is responsible for handling all unicast, broadcast, and multicast traffic for a given VLAN within a site.D
The AED is responsible for MAC address dispute contention for a given VLAN.