网友您好, 请在下方输入框内输入要搜索的题目:
题目内容
(请给出正确答案)
单选题
Which of the following protocols is used to encrypt data between web servers and web browsers?()
A
SMTP
B
SIP
C
HTTP
D
SSL
参考答案
参考解析
解析:
暂无解析
更多 “单选题Which of the following protocols is used to encrypt data between web servers and web browsers?()A SMTPB SIPC HTTPD SSL” 相关考题
考题
Which of the following protocols is used to encrypt data between web servers and web browsers?()
A.SMTPB.SIPC.HTTPD.SSL
考题
Which of the following ports are used by default for web servers? ()(Select TWO)
A.80B.110C.123D.143E.443
考题
Which of the following protocols should be used to monitor network performance?()
A.SNTPB.SMTPC.HTTPD.SNMP
考题
Which Internet protocol encrypts and decrypts user page requests, as well as the pages that are returned by a web server using SSL?()A、NNTPB、FTPC、HTTPD、HTTPS
考题
Which of the following protocols is used to encrypt data between web servers and web browsers?()A、SMTPB、SIPC、HTTPD、SSL
考题
Which tool is used to simplify the migration, management and deployment of IIS Web servers, Web applications and Web sites?()A、System DesignerB、XCOPY deploymentC、Deployment DesignerD、Web Deployment
考题
Which of the following is used by RADIUS to encrypt messages between the server and the client?()A、Public keyB、CSU/DSUC、Private keyD、Shared secret
考题
An administrator is attempting to recover from a power failure in the data center. Which of the following is the BEST way to recover the servers?()A、 Bring up the WINS server, the DNS server, then the web serverB、 Bring up the web server, the time clock server, then the DHCP serverC、 Bring up the backup tape server, the DNS server, then the web serverD、 Bring up the active directory server, the DNS server, then the web server
考题
Which of the following protocols should be used to monitor network performance?()A、SNTPB、SMTPC、HTTPD、SNMP
考题
When load balancing traffic between two web servers, which of the following technologies provides the LOWEST cost solution?()A、 Active/passive clusterB、 Active/active clusterC、 Log shippingD、 DNS round robin
考题
Which of the following ports are used by default for web servers? ()(Select TWO)A、80B、110C、123D、143E、443
考题
Which of the following technologies can provide geographically based load balancing with high availability between two web servers with static content?()A、MulticastB、Active/passive clusterC、Active/active clusterD、DNS round robin
考题
Identify architecturally where in an application, Coherence stack will be used ()A、 coherence resides locally on the machines of all remote application usersB、 coherence resides between remote users and the Web tierC、 coherence resides between the Web tier and application tierD、 coherence resides between the application tier and data tier
考题
You need to design a method to allow the new-ideas-testking.com Web site to function in accordance with security and business requirements. What should you do?()A、Require a PPTP VPN for all connections to the Web serverB、Require that traffic between Web browsers and the Web server uses an L2TP/IPSec tunnelC、Require that traffic between Web browsers and the Web server uses SSLD、Require certificate mappings between the Web server and Active Directory
考题
You need to design a method to encrypt confidential data. Your solution must address the concerns of the chief information officer. What should you do?()A、Encrypt customer information when it is stored and when it is being transmittedB、Require encrypted connections to the public Web site, which is hosted on the Web server on the perimeter networkC、Encrypt all marketing information on file servers and client computersD、Require encrypted connections to all file servers
考题
You manage a server that runs Windows Server 2008. The server has the Web Server (IIS) role installed. The server hosts an Internet-accessible Web site that has a virtual directory named /orders/. A Web server certificate is installed and an SSL listener has been configured for the Web site. The /orders/ virtual directory must meet the following company policy requirements: Be accessible to authenticated users only. Allow authentication types to support all browsers. Encrypt all authentication traffic by using HTTPS. All other directories of the Web site must be accessible to anonymous users and be available withoutSSL. You need to configure the /orders/ virtual directory to meet the company policy requirements. Which two actions should you perform?()A、Configure the Web site to the Require SSL setting.B、Configure the /orders/ virtual directory to the Require SSL setting.C、Configure the Digest Authentication setting to Enabled for the /orders/ virtual directory.D、Configure the Basic Authentication setting to Enabled and the Anonymous Authentication setting to Disabled for the Web site.E、Configure the Basic Authentication setting to Enabled and the Anonymous Authentication setting to Disabled for the /orders/ virtual directory.
考题
单选题You need to design a method to encrypt confidential data. Your solution must address the concerns of the chief information officer. What should you do?()A
Encrypt customer information when it is stored and when it is being transmittedB
Require encrypted connections to the public Web site, which is hosted on the Web server on the perimeter networkC
Encrypt all marketing information on file servers and client computersD
Require encrypted connections to all file servers
考题
单选题When load balancing traffic between two web servers,which of the following technologies provides the LOWEST cost solution?()A
Active/passive clusterB
Active/active clusterC
Log shippingD
DNS round robin
考题
单选题Which of the following protocols is used to encrypt data between web servers and web browsers?()A
SMTPB
SIPC
HTTPD
SSL
考题
单选题When load balancing traffic between two web servers, which of the following technologies provides the LOWEST cost solution?()A
Active/passive clusterB
Active/active clusterC
Log shippingD
DNS round robin
考题
单选题Which of the following is used by RADIUS to encrypt messages between the server and the client?()A
Public keyB
CSU/DSUC
Private keyD
Shared secret
考题
单选题Which tool is used to simplify the migration, management and deployment of IIS Web servers, Web applications and Web sites?()A
System DesignerB
XCOPY deploymentC
Deployment DesignerD
Web Deployment
考题
单选题Which of the following technologies can provide geographically based load balancing with high availability between two web servers with static content?()A
MulticastB
Active/passive clusterC
Active/active clusterD
DNS round robin
考题
单选题Which of the following technologies can provide geographically based load balancing with high availability between two web servers with static content?()A
MulticastB
Active/passive clusterC
Active/active clusterD
DNS round robin
考题
单选题You need to design a method to allow the new-ideas-testking.com Web site to function in accordance with security and business requirements. What should you do?()A
Require a PPTP VPN for all connections to the Web serverB
Require that traffic between Web browsers and the Web server uses an L2TP/IPSec tunnelC
Require that traffic between Web browsers and the Web server uses SSLD
Require certificate mappings between the Web server and Active Directory
考题
单选题Identify architecturally where in an application, Coherence stack will be used ()A
coherence resides locally on the machines of all remote application usersB
coherence resides between remote users and the Web tierC
coherence resides between the Web tier and application tierD
coherence resides between the application tier and data tier
考题
单选题An administrator is attempting to recover from a power failure in the data center. Which of the following is the BEST way to recover the servers?()A
Bring up the WINS server, the DNS server, then the web serverB
Bring up the web server, the time clock server, then the DHCP serverC
Bring up the backup tape server, the DNS server, then the web serverD
Bring up the active directory server, the DNS server, then the web server
热门标签
最新试卷