网友您好, 请在下方输入框内输入要搜索的题目:

题目内容 (请给出正确答案)
单选题
You want to provide a tool that allows users quick access to form modules, by listing them in an Explorer-style interface. Which reusable component do you use?()
A

ActiveX controls 

B

Calendar Class 

C

Standard Object Library 

D

Picklist Class 

E

Wizard Class 

F

Navigator Class


参考答案

参考解析
解析: 暂无解析
更多 “单选题You want to provide a tool that allows users quick access to form modules, by listing them in an Explorer-style interface. Which reusable component do you use?()A ActiveX controls B Calendar Class C Standard Object Library D Picklist Class E Wizard Class F Navigator Class” 相关考题
考题 You create a Web site that is for members only. The Web site allows members to create lists of users that have access to information about member profiles. The name of the list is stored in the listName variable. The user name of the user to whom access is given is stored in the username variable.You need to enable members to manage their lists of users.Which code segment should you use?()A.B.C.D.

考题 On the Junos Pulse Access Control Service, you have created a role called Secret that you only want to provide to users who present a certificate.Using the admin GUI, which two features would you configure to satisfy this requirement?()A. Sign-in PolicyB. Role Mapping RuleC. Role RestrictionsD. Trusted Server CA

考题 What are two indicators that a customer should consider the installation of a Wireless LAN Controller? ()A、need one access pointB、want to provide unsecured wireless accessC、need between two and three access pointsD、want to provide employee wireless accessE、need more than four access pointsF、want to provide guest wireless access

考题 What is the goal of the borderless network architecture?()A、to provide users with A single device that permits access to information anywhereB、to provide users with the same productivity and access to information no matter where are or which device they useC、to eliminate the need for border security and firewallsD、to provide companies with A way to extend their security and control over employees on the internet

考题 You want to provide a tool that allows users quick access to form modules, by listing them in an Explorer-style interface. Which reusable component do you use?()A、ActiveX controls B、Calendar Class C、Standard Object Library D、Picklist Class E、Wizard Class F、Navigator Class

考题 What is the purpose of the until change option of the restore command?()  A、 It allows you to select the SCN that you want to restore to.B、 It allows you to select the log sequence number you want to restore to.C、 It allows you to select the timestamp you want to restore to.D、 It allows you to manually stop the restore at any time as online redo logs are applied.E、 None of the above.

考题 You are implementing an ASP.NET MVC 2 Web application that allows users to view and edit data. You need to ensure that only logged-in users can access the Edit action of the controller. What are two possible attributes that you can add to the Edit action to achieve this goal? ()A、[Authorize(Users = "")]B、[Authorize(Roles = "")]C、[Authorize(Users = "*")]D、[Authorize(Roles = "*")]

考题 You create a Web site. The Web site has many predefined roles and associated users that will be used for security purposes. You need to manage these roles and user accounts. Which tool should you use? ()A、the Microsoft .NET Framework Configuration toolB、the Code Access Security Policy toolC、the ASP.NET IIS Registration toolD、the Web Site Administration Tool

考题 You want users to log on to Active Directory by using a new User Principal Name (UPN).  You  need to modify the UPN suffix for all user accounts.     Which tool should you use()A、DsmodB、NetdomC、RedirusrD、Active Directory Domains and Trusts

考题 Your corporate network has a member server named RAS1 that runs Windows Server 2008. You configure RAS1 to use the Routing and Remote Access Service (RRAS) The companys remote access policy allows members of the Domain Users group to dial in to RAS1. The company issues smart cards to all employees. You need to ensure that smart card users are able to connect to RAS1 by using a dial-up connection. What should you do?()A、 Install the Network Policy Server (NPS) on the RAS1 serverB、 Create a remote access policy that requires users to authenticate by using SPAPC、 Create a remote access policy that requires users to authenticate by using EAP-TLSD、 Create a remote access policy that requires users to authenticate by using MS-CHAP v2

考题 You are the enterprise administrator for an Exchange Server 2010 organization. All users run Microsoft Office Outlook 2010.  You are designing a sharing solution for your organization and a partner organization. The partner organization also uses Exchange Server 2010.  You need to recommend a strategy for sharing information with the partner organization to meet thefollowing requirements: .Provide cross-organizational access to user contacts  .Provide cross-organizational access to free/busy information What should you recommend?()A、Creating cross-forest trustsB、Implementing Federated SharingC、Implementing Microsoft Identify Lifecycle Manager (ILM) 2007D、Running the Microsoft Exchange Inter-Organization Replication tool

考题 You use a Windows 2000 Professional computer.You are responsible for maintaining Company’s client contact list. You want other users on the networkto be able to read the client contact list. You use Windows Explorer to share the client contact list folderon the network.You want users touse the most current available information when contacting clients. You want toprevent users from enabling offline access for the network share that contains the client contact list.What should you do?()A、Use Synchronization Manager to configure synchronization not to occur when users are connected to the LAN connection.B、Use Windows Explorer to grant users Special access for the reports on the network share.C、Use Windows Explorer to disable caching for the reports on the network share.D、Use Windows Explorer to disable Offline files.

考题 Your network contains an Active Directory forest.   You add an additional user principal name (UPN) suffix to the forest.   You need to modify the UPN suffix of all users. You want to achieve this goal by using the minimum  amount of administrative effort.   What should you use()A、the Active Directory Domains and Trusts consoleB、the Active Directory Users and Computers consoleC、the Csvde toolD、the Ldifde tool

考题 单选题What is the purpose of the until change option of the restore command?()A  It allows you to select the SCN that you want to restore to.B  It allows you to select the log sequence number you want to restore to.C  It allows you to select the timestamp you want to restore to.D  It allows you to manually stop the restore at any time as online redo logs are applied.E  None of the above.

考题 单选题You are the enterprise administrator for an Exchange Server 2010 organization. All users run Microsoft Office Outlook 2010.  You are designing a sharing solution for your organization and a partner organization. The partner organization also uses Exchange Server 2010.  You need to recommend a strategy for sharing information with the partner organization to meet the following requirements: .Provide cross-organizational access to user contacts  .Provide cross-organizational access to free/busy information  What should you recommend?()A Creating cross-forest trustsB Implementing Federated SharingC Implementing Microsoft Identify Lifecycle Manager (ILM) 2007D Running the Microsoft Exchange Inter-Organization Replication tool

考题 单选题You want to provide a tool that allows users quick access to form modules, by listing them in an Explorer-style interface. Which reusable component do you use?()A ActiveX controls B Calendar Class C Standard Object Library D Picklist Class E Wizard Class F Navigator Class

考题 多选题You are implementing an ASP.NET MVC 2 Web application that allows users to view and edit data. You need to ensure that only logged-in users can access the Edit action of the controller. What are two possible attributes that you can add to the Edit action to achieve this goal? ()A[Authorize(Users = )]B[Authorize(Roles = )]C[Authorize(Users = *)]D[Authorize(Roles = *)]

考题 单选题You want users to log on to Active Directory by using a new Principal Name (UPN). You need to modify the UPN suffix for all user accounts. Which tool should you use()A DsmodB NetdomC RedirusrD Active Directory Domains and Trusts

考题 单选题You create a Web site. The Web site has many predefined roles and associated users that will be used for security purposes. You need to manage these roles and user accounts. Which tool should you use? ()A the Microsoft .NET Framework Configuration toolB the Code Access Security Policy toolC the ASP.NET IIS Registration toolD the Web Site Administration Tool

考题 多选题On the Junos Pulse Access Control Service, you have created a role called Secret that you only want to provide to users who present a certificate.Using the admin GUI, which two features would you configure to satisfy this requirement?()ASign-in PolicyBRole Mapping RuleCRole RestrictionsDTrusted Server CA

考题 单选题You are using Windows 2000 Professional on your desktop computer. You are working on the company’s financial report and you want other users on the network to able to modify your documents for the report. You want users to share the financial report folder on the network. Because the network contains confidential information you want to prevent users from the enabling off line access for the network share that contains the financial report. What should you do?()A Use Windows Explorer to receive the offline filesB Using the Windows Explorer, disable the cache for the reports on the network shareC Use the Windows NT explorer to grant the special access for the reports on the network  shareD Use the synchronization manager to configure synchronization not to occur when users are  connected to the LAN connection. 

考题 单选题You want to provide all users in your corporation with a single agent that provides access to multiple connection types conditionally. For example, you connect to the Junos Pulse Access Control Service if you are connected to the intranet, but you connect to the Junos Pulse Secure Access Service if you are on a remote network. Which agent should you use for this type of connection requirement?()A Junos Pulse should be configured with location awareness rules configured.B Odyssey Access Client should be installed with Host Checker configured to check the client's location.C Junos Pulse should be configured with all components installed.D Agentless access should be enabled so that clients can connect to any service without concern for installing an agent.

考题 单选题You use—login-path to access a MySQL server on a Linux installation. Which statement is true about the – login-path option that is created by using mysql_config_editor?()A All system users have access to the MySQL server via—login path localB login-path can be used only for MySQL servers running on a local machineC login-path allows you to provide login credentials without passing clear text passwords on the command lineD When using – login-path to connect to a remote MySQL server, the remote server version must be 5.6 or later

考题 单选题Your network contains an Active Directory forest.     You add an additional user principal name (UPN) suffix to the forest. You need to modify the UPN  suffix of all users.     You want to achieve this goal by using the minimum amount of administrative effort.     What should you use()A the Active Directory Domains and Trusts consoleB the Active Directory Users and Computers consoleC the Csvde toolD the Ldifde tool

考题 单选题You are the network administrator for your company. The network consists of a single Active Directory domain. The network contains Windows Server 2003 file servers. The network also contains a Windows Server 2003 computer named Server1 that runs Routing and Remote Access and Internet Authentication Service (IAS). Server1 provides VPN access to the network for users’ home computers.   You suspect that an external unauthorized user is attempting to access the network through Server1. You want to log the details of access attempts by VPN users when they attempt to access the network. You want to compare the IP addresses of users’ home computers with the IP addresses used in the access attempts to verify that the users are authorized.  You need to configure Server1 to log the details of access attempts by VPN users.   What should you do?  ()A  Configure the system event log to Do not overwrite.B  In IAS, in Remote Access Logging, enable the Authentication requests setting.C  Configure the Remote Access server to Log all events.D  Create a custom remote access policy and configure it for Authentication-Type.