网友您好, 请在下方输入框内输入要搜索的题目:
题目内容
(请给出正确答案)
Your web application requires the ability to load and remove web files dynamically to the web container’s filesystem. Which two HTTP methods are used to perform these actions?()
- A、PUT
- B、POST
- C、SEND
- D、DELETE
- E、REMOVE
参考答案
更多 “ Your web application requires the ability to load and remove web files dynamically to the web container’s filesystem. Which two HTTP methods are used to perform these actions?()A、PUTB、POSTC、SENDD、DELETEE、REMOVE” 相关考题
考题
You create a Web Form that contains connected Web Parts. You write the following declaration in your Web Form.You need to ensure that your Web Part connection is valid. Which two actions should you perform? ()A. Include a data source identified as WebPartConnection1 on the Web Form.B. Include a Web Part identified as customerPart on the Web Form.C. Include a Web Part identified as ordersPart on the Web Form.D. Ensure that you declare an interface named IOrdersPart.E. Ensure that you declare an interface named ICustomerPart.F. Ensure that each Web Part declares either a GetInterface or ProvideInterface method.
考题
Yourwebapplicationrequirestheabilitytoloadandremovewebfilesdynamicallytothewebcontainer’sfilesystem.WhichtwoHTTPmethodsareusedtoperformtheseactions?()
A.PUTB.POSTC.SENDD.DELETEE.REMOVE
考题
You are using replication and the binary log files on your master server consume a lot of disk space. Which two steps should you perform to safely remove some of the older binary log files?()
A.Use the command PURGE BINARY LOGS and specify a binary log file name or a date and time to remove unused filesB.Execute the PURGE BINARY LOGE NOT USED commandC.Remove all of the binary log files that have a modification date earlier than todayD.Edit the .index file to remove the files you want to deleteE.Ensure that none of the attached slaves are using any of the binary logs you want to delete
考题
You have a server named Server1 that runs Windows Server 2003 Web Edition Service Pack 2 (SP2).You create a new virtual directory named App1. App1 contains a Web application.Users report that when they enter http://app1 in their Web browsers, they are unable to connect to the Web application.You need to ensure that users can access the Web application when they connect to http://app1.What should you do? ()A. Move the content of the Web application to C:\App1. Change the home directory for App1.B. Move the content of the Web application to C:\App1. Change the application pool for App1.C. Remove the App1 virtual directory. Create a new Web site, and then configure the Web site to use port 8080. In DNS, create a Host record for App1.D. Remove the App1 virtual directory. Create a new Web site, and then configure the Web site to use a host header of App1. In DNS, create a Host record for App1.
考题
Which two pieces of information are needed when declaring the web resource collection in the deployment descriptor?()A、 the URL pattern that requires authorizationB、 the HTTP methods that require authorizationC、 the users allowed access to the web resourceD、 the J2EE roles allowed access to the web resourceE、 the authentication mechanism required by the web resource
考题
Which two actions protect a resource file from direct HTTP access within a web application?()A、Placing it in the /secure directoryB、Placing it in the /WEB-INF directoryC、Placing it in the /META-INF/secure directoryD、Creating a element within the deployment descriptor
考题
Which the two are true regarding a web application class loader?()A、 A web application may override the web container’s implementation classesB、 A web application running in a J2EE product may override classes in the javax.* namespaceC、 A web application class loader may NOT override any classes in the java.* and javax.* namespaceD、 Resources in the WAR class directory or in any of the JAR files within the library directory may be accessed using the J2SE semantics of getResourceE、 Resources in the WAR class directory or in any of the JAR files within the library directory cannot be accessed using the J2SE semantics of getResource
考题
A developer wants a web application to be notified when the application is about to be shut down. Which two actions are necessary to accomplish this goal?()A、Include a listener directive in a JSP pageB、configure a listener in the TLD file using the elementC、Include a element in the web application deployment descriptorD、configure a listener in the application deployment descriptor, using the elementE、Include a class implementing ServletContextListener as part of the web application deploymen
考题
Which two are true regarding a web application class loader?()A、A web application may override the web container’s implementation classes.B、A web application running in a J2EE product may override classes in the javax.* namespace.C、A web application class loader may NOT override any classes in the java.* and javax.* namespaces.D、Resources in the WAR class directory or in any of the JAR files within the library directory may be accessed using the J2SE semantics of getResource.
考题
Which the two about WAR files are true?()A、 WAR files must be located in the web application library directory.B、 WAR files must contain the web application deployment descriptor.C、 WAR files must be created by using archive tools to designed specifically for that purpose. D、 The web container must serve the content of any META-INF directory located in a WAR file.E、 The web container must allow access to resources in JARs in the web application library directory
考题
You are using replication and the binary log files on your master server consume a lot of disk space. Which two steps should you perform to safely remove some of the older binary log files?()A、Use the command PURGE BINARY LOGS and specify a binary log file name or a date and time to remove unused filesB、Execute the PURGE BINARY LOGE NOT USED commandC、Remove all of the binary log files that have a modification date earlier than todayD、Edit the .index file to remove the files you want to deleteE、Ensure that none of the attached slaves are using any of the binary logs you want to delete
考题
You create Web sites for your company. You apply a consistent design to the pages and controls of the Web sites. You need to make style changes to all of the Web sites on the Web server. You want to achieve this goal without having to edit the individual pages on each Web site. Which two actions should you perform? ()A、Place a theme in the App_Themes directory under the application root directory.B、Place a theme under an ASP.NETClientFiles folder under the ASP.NET installation directory.C、Assign a theme by setting the %@ Page Theme="..." % directive to the name of the application theme.D、Assign a theme by specifying the pages theme="..."/ section in the Web.config file.
考题
You have a server named Server1 that runs Windows Server 2003 Web Edition Service Pack 2 (SP2). You create a new virtual directory named App1. App1 contains a Web application. Users report that when they enter http://app1 in their Web browsers, they are unable to connect to the Web application. You need to ensure that users can access the Web application when they connect to http://app1. What should you do? ()A、Move the content of the Web application to C:/App1. Change the home directory for App1.B、Move the content of the Web application to C:/App1. Change the application pool for App1.C、Remove the App1 virtual directory. Create a new Web site, and then configure the Web site to use port 8080. In DNS, create a Host record for App1.D、Remove the App1 virtual directory. Create a new Web site, and then configure the Web site to use a host header of App1. In DNS, create a Host record for App1.
考题
You are creating a custom user control. The custom user control will be used on 10 Web Forms for an ASP.NET Web site that allows users to register and log on to a personalized experience. The custom user control uses two TextBox controls and two Button controls. You need to ensure that the controls are visible only when users are not logged on to the Web site. You also need to minimize the amount of effort in development and maintenance for the Web site. Which two actions should you perform? ()A、Add the OnClick event handler for the Login button to the code used in the custom user control.B、Add the OnClick event handler for the Login button to the code used in the Web Form where the control is added.C、In the Page_Load method of the Web Form, add a code segment to set the visibility of the TextBox and Button controls where the control is added.D、In the Page_Load method of the custom user control, add a code segment to set the visibility of the TextBox and Button controls.
考题
You create a Web Form that contains connected Web Parts. You write the following declaration in your Web Form. You need to ensure that your Web Part connection is valid. Which two actions should you perform? ()A、Include a data source identified as "WebPartConnection1" on the Web Form.B、Include a Web Part identified as "customerPart" on the Web Form.C、Include a Web Part identified as "ordersPart" on the Web Form.D、Ensure that you declare an interface named "IOrdersPart".E、Ensure that you declare an interface named "ICustomerPart".F、Ensure that each Web Part declares either a GetInterface or ProvideInterface method.
考题
Your company named Contoso, Ltd. has a two-node Network Load Balancing cluster. The cluster is intended to provide high availability and load balancing for only the intranet Web site. The name of the cluster is web.contoso.com. You discover that Contoso users can see the Network Load Balancing cluster in the network neighborhood and can connect to various services by using the web.contoso.com name. The web.contoso.com Network Load Balancing cluster is configured with only one port rule. You need to configure the web.contoso.com Network Load Balancing cluster to accept only HTTP traffic. Which two actions should you perform?()A、Log on to one of the cluster nodes and run the wlbs disable all command.B、Open the Network Load Balancing Clusters console and delete the default port rules.C、Open the Network Load Balancing Clusters console and create a new Allow rule for TCP port 80.D、Open the Network Load Balancing Clusters console and change the default port rule to a disabled port range rule.
考题
Your company named Contoso, Ltd. has a two-node Network Load Balancing cluster. The cluster isintended to provide high availability and load balancing for only the intranet Web site. The name of the cluster is web.contoso.com. You discover that Contoso users can see the Network Load Balancingcluster in the network neighborhood and can connect to various services by using the web.contoso.comname. The web.contoso.com Network Load Balancing cluster is configured with only one port rule. Youneed to configure the web.contoso.com Network Load Balancing cluster to accept only HTTP traffic. Which two actions should you perform?()A、Log on to one of the cluster nodes and run the wlbs disable all command.B、Open the Network Load Balancing Clusters console and delete the default port rules.C、Open the Network Load Balancing Clusters console and create a new Allow rule for TCP port 80.D、Open the Network Load Balancing Clusters console and change the default port rule to a disabled port range rule.
考题
You are creating a Web application that will run on an intranet. The Web application reads comma-delimited text files. The text files reside in a subdirectory below the Web application's root directory. Users must not be able to navigate directly to these files in a Web browser unless they are members of the Accounting role. You need to write an ASP.NET HTTP handler that will use the FileAuthorizationModule class. Which form of authentication should you use?()A、AnonymousB、CertificateC、FormsD、Microsoft Windows Integrated Security
考题
多选题Which two pieces of information are needed when declaring the web resource collection in the deployment descriptor?()Athe URL pattern that requires authorizationBthe HTTP methods that require authorizationCthe users allowed access to the web resourceDthe J2EE roles allowed access to the web resourceEthe authentication mechanism required by the web resource
考题
多选题Your web application requires the ability to load and remove web files dynamically to the web container’s filesystem. Which two HTTP methods are used to perform these actions?()APUTBPOSTCSENDDDELETEEREMOVE
考题
多选题Which the two are true regarding a web application class loader?()AA web application may override the web container’s implementation classesBA web application running in a J2EE product may override classes in the javax.* namespaceCA web application class loader may NOT override any classes in the java.* and javax.* namespaceDResources in the WAR class directory or in any of the JAR files within the library directory may be accessed using the J2SE semantics of getResourceEResources in the WAR class directory or in any of the JAR files within the library directory cannot be accessed using the J2SE semantics of getResource
考题
多选题Which two are true regarding a web application class loader?()AA web application may override the web container’s implementation classes.BA web application running in a J2EE product may override classes in the javax.* namespace.CA web application class loader may NOT override any classes in the java.* and javax.* namespaces.DResources in the WAR class directory or in any of the JAR files within the library directory may be accessed using the J2SE semantics of getResource.
考题
多选题Your web application requires the ability to load and remove web files dynamically to the web container’s filesystem. Which two HTTP methods are used to perform these actions?()APUTBPOSTCSENDDDELETEEREMOVE
热门标签
最新试卷