网友您好, 请在下方输入框内输入要搜索的题目:

题目内容 (请给出正确答案)
单选题
You need to create a servlet filter that stores all request headers to a database for all requests to the webapplication’s home page "/index.jsp". Which HttpServletRequest method allows you to retrieve all of therequest headers?()
A

String[] getHeaderNames()

B

String[] getRequestHeaders()

C

java.util.Iterator getHeaderNames()

D

java.util.Iterator getRequestHeaders()

E

java.util.Enumeration getHeaderNames()


参考答案

参考解析
解析: 暂无解析
更多 “单选题You need to create a servlet filter that stores all request headers to a database for all requests to the webapplication’s home page "/index.jsp". Which HttpServletRequest method allows you to retrieve all of therequest headers?()A String[] getHeaderNames()B String[] getRequestHeaders()C java.util.Iterator getHeaderNames()D java.util.Iterator getRequestHeaders()E java.util.Enumeration getHeaderNames()” 相关考题
考题 Given a Filter class definition with this method: 21.public void doFilter(ServletRequest request, 22.ServletResponse response, 23.FilterChain chain) 24.throws ServletException, IOException { 25.// insert code here 26.} Which should you insert at line 25 to properly invoke the next filter in the chain, or the target servlet if thereare no more filters?()A、chain.forward(request, response);B、chain.doFilter(request, response);C、request.forward(request, response);D、request.doFilter(request, response);

考题 Servlet A forwarded a request to servlet B using the forward method of RequestDispatcher. What attributein B’s request object contains the URI of the original request received by servlet A?()A、REQUEST_URIB、javax.servlet.forward.request_uriC、javax.servlet.forward.REQUEST_URID、javax.servlet.request_dispatcher.request_uriE、javax.servlet.request_dispatcher.REQUEST_URI

考题 Which is the true choice about the web container request processing model()?A、 The init method on a filter is called the first time a servlet mapped to that filter is invokedB、 A filter defined for a servlet must always forward control to the next resource in the filter chain.C、 Filters associated with a named servlet are applied in the order they appear in the web application deployment descriptor fileD、 If the init method on a filter throws an UnavailableException, then the container will make no further attempt to execute it

考题 You are designing a Windows Azure application.  The application includes two web roles and three instances of a worker role.  The web roles will send requests to the worker role through one or more Windows Azure Queues. You have the following requirements:   - Ensure that each request is processed exactly one time.   - Minimize the idle time of each worker role instance. - Maximize the reliability of request processing.   You need to recommend a queue design for sending requests to the worker role.  What should you recommend?()A、 Create a single queue.  Send requests on the single queue.B、 Create a queue for each web role.  Send requests on all queues at the same time.C、 Create a queue for each workerrole instance.  Send requests on each worker queue in a round robin.D、 Create a queue for each combination of web roles and worker role instances.  Send requests to all worker role instances based on the sending web role.

考题 A developer has created a special servlet that is responsible for generating XML content that is sent to adata warehousing subsystem. This subsystem uses HTTP to request these large data files, which are compressed by the servlet to save internal network bandwidth. The developer has received a request frommanagement to create several more of these data warehousing servlets. The developer is about to copyand paste the compression code into each new servlet. Which design pattern can consolidate thiscompression code to be used by all of the data warehousing servlets?()A、FacadeB、View HelperC、Transfer ObjectD、Intercepting FilterE、Composite Facade

考题 Your web application uses a simple architecture in which servlets handle requests and then forward to aJSP using a request dispatcher. You need to pass information calculated in the servlet to the JSP for view generation.This information must NOT be accessible to any other servlet,JSP or session in the webapp. Which two techniques can you use to accomplish this goal?()A、Add attributes to the session object.B、Add attributes on the request object.C、Add parameters to the request object.D、Use the pageContext object to add request attributes.E、Add parameters to the JSP’s URL when generating the request dispatcher.

考题 You have lost all your database control files. To recover them, you are going to use the results of the alter database backup controlfile to trace command. Your datafiles and your online redo logs are all intact.  Which of the following is true regarding your recovery?()  A、 You will need to open the database with the resetlogs command.B、 All you need to do is execute the trace file from SQL*Plus and it will perform the recovery for you.C、 You will use the resetlogs version of the create controlfile command.D、 You will use the noresetlogs version of the create controlfile command.E、 You will use the trace file to create a backup control file, and then you will recover the database with the recover database using backup controlfile command

考题 Your network contains a server named Server1 that runs Windows Server 2008 R2. Server1 has the Routing and Remote Access service (RRAS) role service installed.You need to view all inbound VPN packets. The solution must minimize the amount of data collected.What should you do?()A、From RRAS,create an inbound packet filter.B、From Network Monitor,create a capture filter.C、From the Registry Editor,configure file tracing for RRAS.D、At the command prompt,run netsh.exe ras set tracing rasauth enabled.

考题 You have a file server that runs Windows Server 2008. The server has a shared folder. You need to receive a notification when a user stores more than 500 MB of data in the shared folder. You must allow users to store more than 500 MB of data in the shared folder. What should you do? ()A、Create a soft quota.B、Create a hard quota.C、Create an Active Screening File Screen.D、Create a Passive Screening File Screen.

考题 You perform a security audit on a server named Server1. You install the Microsoft Network Monitor 3.0 application on Server1.You find that only some of the captured frames display host mnemonic names in the Source column and the Destination column. All other frames display IP addresses.You need to display mnemonic host names instead of IP addresses for all the frames. What should you do? ()A、Create a new display filter and apply the filter to the capture.B、Create a new capture filter and apply the filter to the capture.C、Populate the Aliases table and apply the aliases to the capture.D、Configure the Network Monitor application to enable the Enable Conversations option. Recapture the data to a new file.

考题 You need to use the Event Viewer window to review the event logs for only critical and error events. You also need the maximum amount of detail for each of these events. What should you do? ()A、Edit the filter for the Administrative Events view.B、Create a custom view. Enable the Critical, Error, and Information level events. Select all logs.C、Create a custom view. Select the Critical checkbox, Error checkbox, and Verbose checkbox. Select all logs.D、Search for the Critical or Error string by using the Find option of the Administrative Events view.

考题 All client computers in your network run Windows 7 with default firewall settings.   You have a server-based application that requires an agent to be installed on all client computers.   You need to use Group Policy to allow the application to initiate installation of the agent on all client computers.   What should you do?()A、Create inbound port rules.B、Create inbound program rules.C、Create connection security rules.D、Create Windows service hardening rules.

考题 You have a file server that runs Windows Server 2008. The server has a shared folder. You need to receive a notifcation when a user stores more than 500MB of data int he shared folder. You must allow users to store more than 500MB of data in the shared folder.  What should you do()?  A、Create a soft quotaB、Create a hard quotaC、create an active screening file screenD、create a passive screening file screen

考题 You perform a security audit on a server named server1. You install the Microsoft network monitor 3.0 application on server1. You find that only some of the captured frames dsplay host mnemonic names in the source column and the destination column. All other frames display ip addresses. You need to display mnemonic host names instead of ip addresses for all the frames what should you do?()A、Create a new display filter and apply the filter to the capture.B、Create a new capture filter and apply the filter to the capture.C、Populate the aliases table and apply the aliases to the capture.D、Configure the network monitor application to enable the enable converstations option, recapture the data to a new file.

考题 You are the network administrator for your company. The network consists of a single Active Directory domain. The domain contains 25 Windows Server 2003 computers and 6,000 Windows XP Professional computers.The written company security policy states that network traffic to Web servers must be audited on a regular basis. A server named Server1 is configured as a Web server on the company’s intranet. You install Network Monitor Tools from a Windows Server 2003 product CD-ROM on Server1.You run Network Monitor on Server1 for three hours. When you stop the network capture, you see that Network Monitor captured over 40,000 frames. As you look at the captured frames, you notice that an extremely large number of TCP connection requests have all come from the 131.107.0.1 IP address.In Network Monitor, you need to view only the frames for network traffic that are captured between Server1 and the 131.107.0.1 IP address.  What should you do?()A、Create an Address Capture filter for all network traffic between Server1 and the 131.107.0.1 IP address.B、Create a Find Frame Expression filter for network traffic captured between Server1 and the 131.107.0.1 IP address.C、Create an Address Display filter for all network traffic captured between Server1 and the 131.107.0.1 IP address.D、Create a Pattern Match capture trigger for the 131.107.0.1 IP address.

考题 单选题You create a master-detail form. The users need to be able to exit the form quickly, adhering to default transaction processing, regardless of the cursor location. You believe you can achieve this using a Key-Exit trigger. What do you need to do to implement this request? ()A Define a Key-Exit trigger for all the blocks in the form.  B In the Object Navigator, highlight all the items and define a Key-Exit trigger. C Define a Key-Exit trigger on the primary key item in the master block.D No additional key-trigger definition is necessary.

考题 单选题You need to create a servlet filter that stores all request headers to a database for all requests to the webapplication’s home page "/index.jsp". Which HttpServletRequest method allows you to retrieve all of therequest headers?()A String[] getHeaderNames()B String[] getRequestHeaders()C java.util.Iterator getHeaderNames()D java.util.Iterator getRequestHeaders()E java.util.Enumeration getHeaderNames()

考题 单选题Which is true about the web container request processing model?()A The init method on a filter is called the first time a servlet mapped to that filter is invoked.B A filter defined for a servlet must always forward control to the next resource in the filter chain.C Filters associated with a named servlet are applied in the order they appear in the web application deployment descriptor file.D If the init method on a filter throws an UnavailableException, then the container will make no further attempt to execute it.

考题 单选题A developer has created a special servlet that is responsible for generating XML content that is sent to adata warehousing subsystem. This subsystem uses HTTP to request these large data files, which are compressed by the servlet to save internal network bandwidth. The developer has received a request frommanagement to create several more of these data warehousing servlets. The developer is about to copyand paste the compression code into each new servlet. Which design pattern can consolidate thiscompression code to be used by all of the data warehousing servlets?()A FacadeB View HelperC Transfer ObjectD Intercepting FilterE Composite Facade

考题 单选题Servlet A forwarded a request to servlet B using the forward method of RequestDispatcher. What attributein B’s request object contains the URI of the original request received by servlet A?()A REQUEST_URIB javax.servlet.forward.request_uriC javax.servlet.forward.REQUEST_URID javax.servlet.request_dispatcher.request_uriE javax.servlet.request_dispatcher.REQUEST_URI

考题 单选题You perform a security audit on a server named server1. You install the Microsoft network monitor 3.0 application on server1. You find that only some of the captured frames dsplay host mnemonic names in the source column and the destination column. All other frames display ip addresses. You need to display mnemonic host names instead of ip addresses for all the frames what should you do?()A Create a new display filter and apply the filter to the capture.B Create a new capture filter and apply the filter to the capture.C Populate the aliases table and apply the aliases to the capture.D Configure the network monitor application to enable the enable converstations option, recapture the data to a new file.

考题 单选题Given a Filter class definition with this method: 21.public void doFilter(ServletRequest request, 22.ServletResponse response, 23.FilterChain chain) 24.throws ServletException, IOException { 25.// insert code here26. } Which should you insert at line 25 to properly invoke the next filter in the chain,or the target servlet if thereare no more filters?()A chain.forward(request, response);B chain.doFilter(request, response);C request.forward(request, response);D request.doFilter(request, response);

考题 多选题You want to create a filter for your web application and your filter will implement javax.servlet.Filter. Which two statements are true?()AYour filter class must implement an init method and a destroy method.BYour filter class must also implement javax.servlet.FilterChain.CWhen your filter chains to the next filter, it should pass the same arguments it received in its doFiltermethod.DThe method that your filter invokes on the object it received that implements javax.servlet.FilterChaincan invoke either another filter or a servlet.EYour filter class must implement a doFilter method that takes, among other things, anHTTPServletRequest object and an HTTPServletResponse object.

考题 单选题You have an Exchange Server 2010 organization.You need to view a list of mailboxes on all servers that are larger than 1 GB.What should you do?()A From the Exchange Management Shell, run the Get-Mailbox cmdlet.B From the Exchange Management Shell, run the Get-MailboxStatistics cmdlet.C From the Exchange Management Console (EMC), create a recipient filter.D From the Exchange Management Console (EMC), view the properties of the mailbox database.

考题 单选题You have lost all your database control files. To recover them, you are going to use the results of the alter database backup controlfile to trace command. Your datafiles and your online redo logs are all intact.  Which of the following is true regarding your recovery?()A  You will need to open the database with the resetlogs command.B  All you need to do is execute the trace file from SQL*Plus and it will perform the recovery for you.C  You will use the resetlogs version of the create controlfile command.D  You will use the noresetlogs version of the create controlfile command.E  You will use the trace file to create a backup control file, and then you will recover the database with the recover database using backup controlfile command

考题 多选题Your web application uses a simple architecture in which servlets handle requests and then forward to aJSP using a request dispatcher. You need to pass information calculated in the servlet to the JSP for view generation.This information must NOT be accessible to any other servlet,JSP or session in the webapp. Which two techniques can you use to accomplish this goal?()AAdd attributes to the session object.BAdd attributes on the request object.CAdd parameters to the request object.DUse the pageContext object to add request attributes.EAdd parameters to the JSP’s URL when generating the request dispatcher.

考题 单选题Your web application uses a simple architecture in which servlets handle requests and then forward to aJSP using a request dispatcher. You need to pass information calculated by the servlet to the JSP;furthermore, that JSP uses a custom tag and must also process this information. This information mustNOT be accessible to any other servlet, JSP or session in the webapp. How can you accomplish this goal?()A Store the data in a public instance variable in the servlet.B Add an attribute to the request object before using the request dispatcher.C Add an attribute to the context object before using the request dispatcher.D This CANNOT be done as the tag handler has no means to extract this data.

考题 单选题Which is the true choice about the web container request processing model()?A  The init method on a filter is called the first time a servlet mapped to that filter is invokedB  A filter defined for a servlet must always forward control to the next resource in the filter chain.C  Filters associated with a named servlet are applied in the order they appear in the web application deployment descriptor fileD  If the init method on a filter throws an UnavailableException, then the container will make no further attempt to execute it