网友您好, 请在下方输入框内输入要搜索的题目:

题目内容 (请给出正确答案)

How does the Juniper DX accelerate web servers? ()

  • A、by translating HTTP requests to HTTPS
  • B、by refusing client connections that are unnecessarily refreshed by end users
  • C、by multiplexing numerous client-side connections to fewer server-side connections
  • D、by multiplexing numerous server-side connections to fewer client-side connections

参考答案

更多 “How does the Juniper DX accelerate web servers? ()A、by translating HTTP requests to HTTPSB、by refusing client connections that are unnecessarily refreshed by end usersC、by multiplexing numerous client-side connections to fewer server-side connectionsD、by multiplexing numerous server-side connections to fewer client-side connections” 相关考题
考题 Originally introduced by Netscape Communications,(21)are a general mechanism which HTTP Server side applications, such as CGI(22), can use to both store and retrieve information on the HTTP(23)side of the connection. Basically, Cookies can be used to compensate for the(24)nature of HTTP. The addition of a simple, persistent, client-side state significantly extends the capabilities of WWW-based(25).A.BrowsersB.CookiesC.ConnectionsD.Scripts

考题 How would an end user add both a Junos Pulse Access Control Service URL and a Junos Pulse Secure Access Service URL to the same Junos Pulse client?() A. By adding two separate connections in the connections dialog boxB. By adding two separate intranet Controllers under the configuration hierarchyC. By adding one intranet Controller and one SA under the configuration hierarchyD. By adding two URLs under a connection in the connections dialog box

考题 How do you disable a server from Juniper DX Cluster without terminating active client requests? () A. Delete the server.B. Soft pause the target server.C. Hard pause the target server.D. Create a new Cluster without the server.

考题 Which two benefits does the Juniper DX provide?() (Choose two.) A. It compresses all images.B. It protects servers from DDoS attacks.C. It protects servers from SynFlood attacks.D. It loads all content from web servers to flash.

考题 How does the Juniper DX accelerate web servers? () A. by translating HTTP requests to HTTPSB. by refusing client connections that are unnecessarily refreshed by end usersC. by multiplexing numerous client-side connections to fewer server-side connectionsD. by multiplexing numerous server-side connections to fewer client-side connections

考题 The Hypertext Transfer Protocol , the Web's ( ) protocol , is at the heart of the Web. HTTP is implemented in two programs : a ( ) program and a server program . The client program and server program executing on different end systems , talk to each other by (请作答此空) HTTP messages . HTTP defines how Web clients request Web pages from servers and how servers transfer web pages to clients . when a user ( ) a web page , the browser sends http request messages for the objects in the page to the server . The server ( ) the requests and responds with http response messages that contain the objects .A.exchanging B.changing C.declining D.removing

考题 The Hypertext Transfer Protocol , the Web's (请作答此空) protocol , is at the heart of the Web. HTTP is implemented in two programs : a ( ) program and a server program . The client program and server program executing on different end systems , talk to each other by ( ) HTTP messages . HTTP defines how Web clients request Web pages from servers and how servers transfer web pages to clients . when a user ( ) a web page , the browser sends http request messages for the objects in the page to the server . The server ( ) the requests and responds with http response messages that contain the objects .A.transport-layer B.application-layer C.network-layer D.link-layer

考题 The Hypertext Transfer Protocol,the Web's(请作答此空)protocol,is at the heart of the Web.HTTP is implemented in two programs:a( )program and a server program.The client program and server program executing on different end systems,talk to each other by( )HTTP messages.HTTP defines how Web clients request Web pages from servers and how servers transfer web pages to clients.when a user( )a web page,the browser sends http request messages for the objects in the page to the server.The server( )the requests and responds with http response messages that contain the objects.A.transport-layer B.application-layer C.network-layer D.link-layer

考题 Which two benefits does the Juniper DX provide?() (Choose two.)A、It compresses all images.B、It protects servers from DDoS attacks.C、It protects servers from SynFlood attacks.D、It loads all content from web servers to flash.

考题 If a certificate authority trustpoint is not configured when enabling HTTPS and the remote HTTPS server requires client authentication, connections to the secure HTTP client will fail. Which command must be enabled for correct operation?()A、ip http client secure-ciphersuite 3des-ede-cbc-shaB、ip https max-connections 10C、ip http timeout-policy idle 30 life 120 requests 100D、ip http client secure-trustpoint trustpoint-name

考题 What is the purpose of session management?()A、To manage the user’s login and logout activities.B、To store information on the client-side between HTTP requests.C、To store information on the server-side between HTTP requests.D、To tell the web container to keep the HTTP connection alive so it can make subsequent requestswithout the delay of making the TCP connection.

考题 How do you disable a server from Juniper DX Cluster without terminating active client requests? ()A、Delete the server.B、"Soft pause" the target server.C、"Hard pause" the target server.D、Create a new Cluster without the server.

考题 How would an end user add both a Junos Pulse Access Control Service URL and a Junos Pulse Secure Access Service URL to the same Junos Pulse client?()A、By adding two separate connections in the connections dialog boxB、By adding two separate intranet Controllers under the configuration hierarchyC、By adding one intranet Controller and one SA under the configuration hierarchyD、By adding two URLs under a connection in the connections dialog box

考题 What does the Web Session Affinity feature of Active GridLink for RAC provide?()A、It mandates that HTTP sessions must be stored in an Oracle RAC database for the highest  throughput and availability.B、It pins a connection to the thread associated with a web session such that subsequent  connection reservations are significantly faster.C、It stores a reference to the connection associated with an HTTP session in the session object.D、It allows developers to modify how their web application reserves and releases database  connections to allow enhanced performance.E、It provides improved performance by associating a database connection with an HTTP session. 

考题 You need to design an access control solution for customer information. Your solution must meet security requirements.What should you do?()A、Configure the Web site to require SSL connections. Configure the Web site to require client certificates. Enable and configure client certificate mapping on the Web siteB、Configure the Web site to require SSL connections. Disable anonymous access to the Web site.Assign the Allow – Read  permission to the customer user accounts for the folder that contains the Web site filesC、Configure the Web site to use only Microsoft .NET Passport authentication. Specify the den.corp.woodgrovebank.com domain as the default domain for .NET Passport authentication.Configure a custom local IPSec policy on the Web servers to require IPSec communicationsD、Configure the Web site to use only Windows Integrated authentication. Configure a custom local IPSec policy on the Web servers to require IPSec communications. Configure the IPSec policy to use certificate-based authentication and encryption

考题 Your company has a stand-alone server named Server2 that runs Windows Server 2003 Service Pack 2 (SP2). Server2 is a Web server.You monitor two client connections to your Web site on Server2 and obtain the results shown in the exhibit.(Click the Exhibit button.) You need to ensure that all connections to the Web server are encrypted. What should you do?()A、Install a Web server certificate on Server2. B、Configure the Web site to require a secure channel. C、Configure the Web site to redirect all requests to https://Server2. D、Configure the Web site to require integrated Windows authentication.

考题 Your network consists of a single Active Directory domain. All servers run Windows Server 2008 R2.   You plan to publish a Web site on two Web servers.   You need to deploy an availability solution for your Web servers that meets the following requirements: èSupports the addition of more Web servers without interrupting client connections  èEnsures that the Web site is accessible even if a single server fails What should you do?()A、Configure a failover cluster.B、Configure a Web garden on each Web server.C、Create a Network Load Balancing cluster.D、Create two application pools on each Web server.

考题 You have an Exchange Server 2003 organization. All servers have 32-bit hardware. You plan to transition to Exchange Server 2010 and deploy new Mailbox servers.  You need to evaluate the current servers to provide recommendations for the deployment of the newMailbox servers.  What should you include in the evaluation?()A、.number of concurrent connections to Outlook Web App .number of mailbox databases.memory utilizationB、.number of concurrent connections to Outlook Web App .RPC latency.disk I/O latencyC、.number of concurrent MAPI connections.size of mailbox databases.number of mailboxesD、.number of mailboxes.disk I/O latency.RPC latency

考题 You need to design the Exchange 2003 server configuration for remote e-mail access. What should you do?()A、Configure the front-end servers in each branch office to be members of a new Active Directory siteB、Configure the back-end servers to have server encryption certificates issued by a commercial certification authority (CA)C、Configure two back-end servers to be members of a Network Load Balancing cluster. Configure Network Load Balancing for inbound RPC connectionsD、Configure multiple front-end servers in each branch office to be members of a Network Load Balancing cluster. Configure Network Load Balancing for inbound HTTPS connections

考题 You need to design a strategy for remote client computer access that meets all business and technical requirements. What should you do?()A、Configure the HTTP virtual server on the Exchange front-end server to require a secure connection. Instruct the sales personnel to use Microsoft Outlook Web Access to connect to the Exchange front-end serverB、Configure the back-end Exchange servers to use static ports for RPC connections. Open the required ports on the firewall. Install Microsoft Outlook 2003 on the portable computers and configure it to connect to the Exchange back-end server using a MAPI connectionC、Configure the Exchange front-end server to require secure connections from IMAP4 client computers. Install Microsoft Outlook 2003 on the portable computers and configure it to use a secure IMAP4 connectionD、Configure the Exchange servers to support RPC over HTTPS. Install Microsoft outlook 2003 on the portable computers and configure it to use RPC over HTTPS

考题 You need to design a security strategy for a remote e-mail access. What should you do?()A、Require remote users to access e-mails by using Outlook Mobile AccessB、Require Outlook Web Access users to install the secure MIME ActiveX-Control and to encrypt all messagesC、On Outlook Web Access servers that accept connections from the Internet configure IIS to require SSL for all connectionsD、On Outlook Web Access servers that accept connections from the Internet configure IIS to require Integrated Windows Authentication

考题 You have an Exchange Server 2003 organization.  All users connect to their mailboxes by using Microsoft Office Outlook.  You start to transition the organization to new Exchange Server 2010 servers. The new servers are on a secured subnet that is separated by a firewall. You will move half of the mailboxes to the new servers.  Client Access servers and Mailbox servers are on the secured subnet. Client computers on the network can access the Client Access servers.  You need to recommend a solution that allows users to connect to Public Folders by using Outlook orOutlook Web App (OWA).  What should you include in the solution?()A、Public Folder referrals and forms-based authenticationB、Public Folder referrals and HTTP connections to the Mailbox serversC、Public Folder replicas and MAPI connections to the Mailbox serversD、Public Folder replicas and WebReady Document Viewing

考题 You need to design a method to encrypt confidential data. Your solution must address the concerns of the chief information officer. What should you do?()A、Encrypt customer information when it is stored and when it is being transmittedB、Require encrypted connections to the public Web site, which is hosted on the Web server on the perimeter networkC、Encrypt all marketing information on file servers and client computersD、Require encrypted connections to all file servers

考题 单选题How does the Juniper DX accelerate web servers? ()A by translating HTTP requests to HTTPSB by refusing client connections that are unnecessarily refreshed by end usersC by multiplexing numerous client-side connections to fewer server-side connectionsD by multiplexing numerous server-side connections to fewer client-side connections

考题 单选题What does the Web Session Affinity feature of Active GridLink for RAC provide?()A It mandates that HTTP sessions must be stored in an Oracle RAC database for the highest  throughput and availability.B It pins a connection to the thread associated with a web session such that subsequent  connection reservations are significantly faster.C It stores a reference to the connection associated with an HTTP session in the session object.D It allows developers to modify how their web application reserves and releases database  connections to allow enhanced performance.E It provides improved performance by associating a database connection with an HTTP session. 

考题 单选题What is the purpose of session management?()A To manage the user’s login and logout activities.B To store information on the client-side between HTTP requests.C To store information on the server-side between HTTP requests.D To tell the web container to keep the HTTP connection alive so it can make subsequent requestswithout the delay of making the TCP connection.

考题 多选题Which two benefits does the Juniper DX provide?() (Choose two.)AIt compresses all images.BIt protects servers from DDoS attacks.CIt protects servers from SynFlood attacks.DIt loads all content from web servers to flash.