网友您好, 请在下方输入框内输入要搜索的题目:
题目内容
(请给出正确答案)
多选题
You need to design an access control strategy for the external and intranet Web sites. Which two actions should you perform?()
A
Enable SSL on the external Web site by using a Microsoft cryptographic service provider (CSP)
B
Enable Microsoft .NET Passport authentication on the external Web site. Use Passport Level 0 with SSL on the external Web site
C
Enable SSL on the external Web site by using a commercial digital certificate
D
Enable SSL on the intranet Web site by using an internal server certificate
E
Enable SSL on the external Web site by using an internal server certificate
参考答案
参考解析
解析:
暂无解析
更多 “多选题You need to design an access control strategy for the external and intranet Web sites. Which two actions should you perform?()AEnable SSL on the external Web site by using a Microsoft cryptographic service provider (CSP)BEnable Microsoft .NET Passport authentication on the external Web site. Use Passport Level 0 with SSL on the external Web siteCEnable SSL on the external Web site by using a commercial digital certificateDEnable SSL on the intranet Web site by using an internal server certificateEEnable SSL on the external Web site by using an internal server certificate” 相关考题
考题
You are developing WPF application for managing student information... btnSort and a DataGrid control named dgStudents on the design surface of the MainWindow.xaml properties : FirstName and LastName. You create the following code segment in the constructor of...The DataGrid control displays the list of students unsorted.You need to ensure that the list of students is sorted by last name.Which code segment should you add to the click event handler of the Button control?()A.B.C.D.
考题
You are developing a Windows Presentation Foundation (WPF) application for a travel reservation systemYou need to ensure that users can select a range of travel dates.What should you do ?()
A. Add single DatePicker control to the design surfaceB. Add single Calendar control to the design surfaceC. Add single MediaElement control to the design surface to display a calendarD. Add the appropriate Windows Forms references to the project references. Add a single Windows Forms DateTimePicker control to the design surface
考题
You need to design an access control strategy for the marketing application. You solution must minimize impact on server and network performance. What should you do?()A、Require client computers to connect to the marketing application by using a VPN connectionB、Use IPSec to encrypt communications between the servers in the New York and Atlanta officesC、Require the high security setting on Terminal Services connections to the marketing applicationD、Configure all marketing application Web pages to require SSL
考题
You need to design a PKI that meets business requirements. What should you do?()A、Move ATLCA1 offline and create an enterprise subordinate CA to issue certificatesB、Create a stand-alone subordinate CA to issue certificatesC、Use a qualified subordinate CAD、Configure certificate template access control lists (ACLs) on ATLCA1
考题
You need to design a security strategy for the DHCP servers in the Seattle office. Which two actions should you perform?()A、Disable all unnecessary services on each DHCP serverB、Modify the discretionary access control lists (DACLs) in Active Directory so that only members of the Enterprise Admins security group can authorize additional DHCP serversC、Use an IPSec policy that allows only the packets necessary for DHCP and domain membership for each DHCP serverD、Install a digital certificate for SSL on each DHCP server
考题
You need to design an e-mail access strategy for remote users. What should you do? () A、 Instruct remote users to connect to their e-mail by using RPCB、 Instruct remote users to connect to Outlook Web Access by using only HTTPSC、 Instruct remote users to connect to the company network by using PPTP connectionsD、 Instruct remote users to connectd to their e-mail by using RPC over HTTP Configure the HTTP servers to require encryption.
考题
You are developing a Windows Forms Application by using the .NET Framework 3.5.You plan to design a composite custom control for the application. You include a ListBox control has a property that provides the item count of the ListBox control. You need to ensure that the property cannot be accessed at design time. Which attribute should you use?()A、[Bindable(false)]B、[DesignOnly(false)]C、[EditorBrowsable(EditorBrowsableState.Never)]D、[Browsable(false)]
考题
You need to design a Security strategy for the wireless network at all resort locations.What should you do?()A、Connect the wireless access points to a dedicated subnet. Allow the subnet direct access to the Internet,but not to the company network.Require company users to establish a VPN to access company resourcesB、Install Internet Authentication Service (IAS) on a domain controller.Configure the wireless access points to require IEEE 802.1x authenticationC、Establish IPSec policies on all company servers to request encryption from all computers that connect from the wireless IP networksD、Configure all wireless access points to require the Wired Equivalent Privacy (WEP) protocol for all connections. Use a Group Policy object (GPO) to distribute the WEP keys to all computers in the domain
考题
You are developing a Windows Presentation Foundation (WPF) application for a travel reservation system You need to ensure that users can select a range of travel dates. What should you do ?()A、Add single DatePicker control to the design surfaceB、Add single Calendar control to the design surfaceC、Add single MediaElement control to the design surface to display a calendarD、Add the appropriate Windows Forms references to the project references. Add a single Windows Forms DateTimePicker control to the design surface
考题
Your network contains an Exchange Server 2010 server. You need to plan a mailbox sharing solution for the organization to meets the following requirements: .Ensure that assistants can read and modify the e-mail messages of their managers .Ensure that assistants can impersonate their managers when they send e-mail messages What should you include in the plan?()A、Full Access and Send As permissionsB、Full Access and send on behalf of permissionsC、Role Based Access Control (RBAC) assignments and Send As permissionsD、Role Based Access Control (RBAC) assignments and send on behalf of permissions
考题
You need to design an access control and permission strategy for user objects in Active Directory.What should you do?()A、Make the members of the AdvancedSupport security group members of the Domain Admins security groupB、Give each desktop support technician permission to reset passwords for the top-level OU that contains user accounts at their own locationC、Delegate full control over all OUs that contain user accounts to all AllSupport security groupD、Change the permissions on the domain object and its child objects so that the BasicSupport security group is denied permissions. Then, add a permission to each OU that contains user accounts that allows AllSupport security group members to reset passwords in that OU
考题
You need to recommend an IP addressing strategy for the client computers in the new sales office. What should you recommend implementing in the new sales office?()A、DHCP server rolesB、the DirectAccess featureC、the Network Policy Server (NPS) role serviceD、the Remote Access Service role service
考题
单选题You need to design a security strategy for a remote e-mail access. What should you do?()A
Require remote users to access e-mails by using Outlook Mobile AccessB
Require Outlook Web Access users to install the secure MIME ActiveX-Control and to encrypt all messagesC
On Outlook Web Access servers that accept connections from the Internet configure IIS to require SSL for all connectionsD
On Outlook Web Access servers that accept connections from the Internet configure IIS to require Integrated Windows Authentication
考题
单选题You need to design an access control strategy for the Payment folder for the Sales Managers group. What should you do?()A
Use IPSec in transport modeB
Use Encrypting File System (EFS) over Web Distributed Authoring and Versioning (WebDAV)C
Use PEAP-EAP-TLSD
Use Encrypting File System (EFS) remote encryption
考题
单选题You are developing a Windows Presentation Foundation (WPF) application.You need to display HTML content from a Web page on the WPF form. What should you do?()A
Add a FlowDocumentReader control to the design surface. Then create a FlowDocument control.B
Add a DocumentViewer control to the design surface. Then create a FixedDocument control.C
Add a WebBrowser control to the design surface. Then use the Navigate method to navigate the URI object.D
Add a ContentControl control to the design surface. Then reference a WebClient object to return an HTML string.
考题
单选题You are developing a Windows Forms Application by using the .NET Framework 3.5.You plan to design a composite custom control for the application. You include a ListBox control has a property that provides the item count of the ListBox control. You need to ensure that the property cannot be accessed at design time. Which attribute should you use?()A
[Bindable(false)]B
[DesignOnly(false)]C
[EditorBrowsable(EditorBrowsableState.Never)]D
[Browsable(false)]
考题
多选题You need to design a strategy to increase security for the client computers in the finance department. Which two actions should you perform?()AEnable automatic certificate enrollmentBEnforce smart card logonsCEnable Encrypting File System (EFS) for offline filesDEnable a screen saver password
考题
单选题You are developing a Windows Presentation Foundation (WPF) application. You need to display HTML content from a Web Page on the WPF form. What should you do?()A
Add a FlowDocumentReader control to the design surface. Then create a FlowDocument control.B
Add a ContentControl control to the design surface. The reference a WebClient object to return an HTML string.C
Add a DocumentViewer control to the design surface. The create a FixedDocument control.
考题
单选题You need to design the consolidation strategy for the Promotions and Partners databases. You want to choose a strategy that results in the best database performance while maintaining the permissions of end users in each database.What consolidation strategy should you choose?()A
Place each database in a separate instance running on SQL2.B
Place each database in a separate instance running on SQL3.C
Place both databases in a single instance running on SQL2.D
Place both databases in a single instance running on SQL3.
考题
单选题You need to design a group membership strategy for the EditorialAdmins group. What should you do?()A
Move the EditorialAdmins group to the Servers OU in the editorial departmentB
Move the members of the EditorialAdmins group to the Editorial OUC
Move the members of the EditorialAdmins group to the New York OUD
Move the EditorialAdmins group to the New York OU
考题
多选题You need to design an access control strategy for the external and intranet Web sites. Which two actions should you perform?()AEnable SSL on the external Web site by using a Microsoft cryptographic service provider (CSP)BEnable Microsoft .NET Passport authentication on the external Web site. Use Passport Level 0 with SSL on the external Web siteCEnable SSL on the external Web site by using a commercial digital certificateDEnable SSL on the intranet Web site by using an internal server certificateEEnable SSL on the external Web site by using an internal server certificate
考题
单选题You are creating a Windows Forms application by using the .Net Framework 3.5.You plan to design a composite control for the application.You need to derive the control from a base class that supports templates.What should you do?()A
Derive from the Control class.B
Derive from the UserControl class.C
Derive from the ScrollableControl class.D
Derive from the ContainerControl class.
考题
单选题Your network contains a domain-based namespace named DFS1. DFS1 has Windows 2008 Server mode enabled. You need to ensure that only files and folders in DFS1 that users have permissions to access are displayed. What should you do?()A
Disable referrals.B
Modify the system access control list.C
Enable access-based enumeration (ABE).D
Modify the discretionary access control list.
考题
单选题You need to design the deployment of antivirus software. What should you do?()A
Install the antivirus software on each mailbox storage serverB
Install the antivirus software on each Outlook Web Access serverC
Install the antivirus software on one Outlook Web Access server at each officeD
Install the antivirus software on a back-end server that contains no mailboxes
考题
单选题You are creating a Windows Forms Application by using the .NET Framework 3.5.You plan to design a control for the application.You need to ensure that the control meets the following requirements: (1)Contains the DataGridView, BindingSource, and BindingNavigator controls. (2)Exposes the properties of the BindingSource control. (3)Protects the properties of the DataGridView and BindingNavigator controls. What sholud you do?()A
Extend the Control class.B
Extend the ContainerControl class.C
Create protected accesses for each control property.D
Create public accesses for the properties of the BindingSource control.
考题
单选题You need to recommend an IP addressing strategy for the client computers in the new sales office. What should you recommend implementing in the new sales office?()A
DHCP server rolesB
the DirectAccess featureC
the Network Policy Server (NPS) role serviceD
the Remote Access Service role service
热门标签
最新试卷