网友您好, 请在下方输入框内输入要搜索的题目:

题目内容 (请给出正确答案)
单选题
You need to specify the changes to the existing firewall configuration settings that are required by the HTTP endpoint that will be used by the proseware_projects database. What should you do?()
A

Create a Web publishing rule on ISA2 that allows HTTP traffic on port 5017 from IIS1 to the SQL Server computer.

B

Create a Web publishing rule on ISA1 that allows HTTP traffic on port 5017 from IIS1 to the SQL Server computer.

C

Create a Web publishing rule on ISA2 that allows HTTPS traffic on port 5017 from IIS1 to the SQL Server computer.

D

Create a Web publishing rule on ISA1 that allows HTTPS traffic on port 5017 from IIS1 to the SQL Server computer.


参考答案

参考解析
解析: 暂无解析
更多 “单选题You need to specify the changes to the existing firewall configuration settings that are required by the HTTP endpoint that will be used by the proseware_projects database. What should you do?()A Create a Web publishing rule on ISA2 that allows HTTP traffic on port 5017 from IIS1 to the SQL Server computer.B Create a Web publishing rule on ISA1 that allows HTTP traffic on port 5017 from IIS1 to the SQL Server computer.C Create a Web publishing rule on ISA2 that allows HTTPS traffic on port 5017 from IIS1 to the SQL Server computer.D Create a Web publishing rule on ISA1 that allows HTTPS traffic on port 5017 from IIS1 to the SQL Server computer.” 相关考题
考题 You need to back up the existing data on a computer before you install a new application. You also need to ensure that you are able to recover individual user files that are replaced or deleted during the installation.What should you do?()A.AB.BC.CD.D

考题 You have a computer that runs Windows Vista.You need to configure the computer to meet the following requirements:·You must be able to make configuration changes remotely.·You must be able to make the changes without the permission of the locally logged-on user.What should you do?()A.AB.BC.CD.D

考题 You need to configure Microsoft Windows Firewall to allow technicians to remotely control your computer.Which exception should you enable?() A.AB.BC.CD.D

考题 You use two user accounts for your computer: standard user and administrator. You log on to your computer as standard user but are unable to make advanced configuration changes. You need to make advanced configuration changes while you are logged on as a standard user.What should you do?()A.AB.BC.CD.D

考题 You need make configuration changes to an existing layer 3 switch in the Company network. On a  multilayer Catalyst switch,  which interface command is used to convert a Layer 3 interface to a  Layer 2 interface?()A、 switchport access vlan vlan-idB、 switchportC、 switchport mode accessD、 no switchportE、 None of the other alternatives apply

考题 You are designing a plan to migrate an existing application to Windows Azure.  The application currently resides on a server that has 768 MB of memory and multiple cores. You need to recommend the smallest compute instance size that is equivalent to the existing server.  Which size should you recommend?()A、 SmallB、 MediumC、 LargeD、 ExtraSmall

考题 You are running Linux 2.0.36 and you need to add a USB mouse to your system. Which of the following statements is true?()A、 You need to rebuild the kernel.B、 You need to upgrade the kernelC、 You need to load the USB modules for your existing modular kernel.D、 USB support is not available in Linux.

考题 You have a server that runs Windows Server 2008. You need to prevent the server from establishing communication sessions to other computers by using TCP port 25. What should you do()A、 From Windows Firewall, add an exceptionB、 From windows Firewall enable the block all incoming connections optionC、 From the Windows Firewall with Advanced Security snap-in, create an inbound ruleD、 From the Windows Firewall with Advanced Security snap-in, create an outbound rule.

考题 Your company has an Active Directory Domain Services (AD DS) domain. You install the Remote Desktop Session Host (RD Session Host) role service and the Microsoft Application Virtualization (App - V) 4.6 client on a server that runs Windows Server 200 8 R2. You publish applications to the RD Session Host server by using App - V. Partner companies require access to an internal application. You provide each partner company with a preconfigured Remote Desktop Protocol (.rdp) file that enables the company to access the application by using the Connect From Anywhere feature. You need to specify the protocol that each partner company must allow through its firewall to establish the connection. Which protocol should you specify?()A、RDPB、HTTPSC、RTSPD、RTSPS

考题 You need to make structural changes to the cube. You also need to ensure that appropriate aggregations are created after the changes are made. What should you do?()A、Record a weeks user activity by using SQL Profiler. Apply structural changes. Replay the activity and then run the Usage Based Optimization Wizard.B、Apply structural changes. Run the Database Engine Tuning Advisor.C、Apply structural changes. Run the Usage Based Optimization Wizard.D、Record a weeks user activity by using SQL Profiler. Apply structural changes. Run the Database Engine Tuning Advisor.

考题 You are designing the settings for FinServ. You specify the permissions that will be used. You need to specify any additional settings required by the company. What should you do?()A、Install a digital certificate for Encrypting File System (EFS) on FinServB、Activate failure auditing on the access to files and objectsC、Configure all firewalls to track when any packets addresses to FinServ are droppedD、Create an IPSec policy that requires IPSec encryption between FinServ and the firewall

考题 You deploy a Windows 7 Enterprise image to a computer on the network. You need to display the detailedactivation and license status of the computer.  What should you run?()A、Msconfig.exe.B、Slui.exe.C、Slmgr.vbs and specify the dli parameter.D、W.inrm.vbs and specify the id parameter.

考题 单选题You are changing the security settings of a file named MyData.xml.You need to preserve the existing inherited access rules.You also need to prevent the access rules from inheriting changes in the future.   Which code segment should you use?()A AB BC CD D

考题 单选题You are running Linux 2.0.36 and you need to add a USB mouse to your system. Which of the following statements is true?()A  You need to rebuild the kernel.B  You need to upgrade the kernelC  You need to load the USB modules for your existing modular kernel.D  USB support is not available in Linux.

考题 多选题You need to recommend changes to Web1 to ensure that server backups can be performed remotely  from Backup1.   Which two changes should you include in the recommendation?()AInstall Windows PowerShell.BInstall Windows Server Backup.CModify the Windows Firewall settings.DEnable the IIS Management Service feature.

考题 单选题Your company infrastructure includes a Windows Server 2008 R2 file server and 1,000 Windows 7 Enterprise client computers.   The company wants to require a secure connection between client computers and the file server. You need to create and deploy a Group Policy object (GPO) that includes a rule for Windows Firewall with Advanced Security.   What should you do?()A Create a Tunnel rule and specify Gateway-to-client as the tunnel type.B Create a Server-to-server rule and specify the endpoints as Any IP address and the file server IP address.C Create an Isolation rule and specify Request authentication for inbound and outbound connections.D Create an Authentication exemption rule and add the file server IP address to the Exempt Computers list.

考题 单选题Your network contains an Active Directory domain. The domain contains two servers named Server1 and Server2. All servers run Windows Server 2008 R2 and have Windows Firewall turned on. You need to ensure that you can use Event Viewer on Server2 to access the Application log on Server1. What should you do?()A On Server2, create a new event subscription.B On Server2, modify the outbound firewall rules.C On Server1, modify the inbound firewall rules.D On Server1, modify the settings on the Application log.

考题 单选题You need make configuration changes to an existing layer 3 switch in the Company network. On a  multilayer Catalyst switch,  which interface command is used to convert a Layer 3 interface to a  Layer 2 interface?()A  switchport access vlan vlan-idB  switchportC  switchport mode accessD  no switchportE  None of the other alternatives apply

考题 多选题Your company has a main office and 10 branch offices. The main office has a firewall. All connections from the branch office are sent through the firewall. Each office has two Hyper-V hosts that run Windows Server 2008 R2 Service Pack 1 (SP1). Each host contains 10 virtual machines (VMs). You deploy Microsoft System Center Virtual Machine Manager 2008 R2 in the main office. You need to recommend changes to the firewall to ensure that branch office administrators can manage their local Hyper-V hosts by using System Center Virtual Machine Manager. The solution must ensure that only the required ports are opened. Which firewall ports should you recommend opening?()A135B443C80D8100E995

考题 单选题You deploy a Windows 7 Enterprise image to a computer on the network. You need to display the detailedactivation and license status of the computer.  What should you run?()A Msconfig.exe.B Slui.exe.C Slmgr.vbs and specify the dli parameter.D W.inrm.vbs and specify the id parameter.

考题 单选题You are designing a Windows 7 virtual desktop infrastructure.You have the following requirements:   Provide access to Remote Desktop Services RemoteApp sources from multiple remote desktop servers.  Support network load balancing.  Support reconnection to existing sessions on virtual desktops.    You need to specify a design that meets the requirements.   What should you include in your design?()A Remote Desktop GatewayB Remote Desktop Connection BrokerC Windows Deployment ServicesD Windows Virtual PC and Windows XP Mode

考题 单选题Your company hosts web services in the company intranet.  The intranet is secured by a firewall.   Devices outside the firewall must be able to access the web services.  Company policies prohibit changes to firewall rules.  You need to recommend an approach for enabling inbound communication.  What should you recommend?()A  Use Windows Server AppFabric.B  Use the Windows Azure AppFabric Service Bus.C  Use the Windows Azure AppFabric Access Control Service.D  Use a Windows Communication Foundation (WCF) service in a Windows Azure role that relays to the internal web service

考题 单选题You need to prevent a custom application from connecting to the Internet. What should you do?()A From Windows Firewall, add a program.B From Windows Defender, modify the Allowed items list.C From Windows Firewall with Advanced Security, create an inbound rule.D From Windows Firewall with Advanced Security, create an outbound rule.

考题 单选题You install a standalone root certification authority (CA) on a server named Server1. You need to ensure that every computer in the forest has a copy of the root CA certificate installed in the  local computers Trusted Root Certification Authorities store.   Which command should you run on Server1()A certreq.exe and specify the -accept parameterB certreq.exe and specify the -retrieve parameterC certutil.exe and specify the -dspublish parameterD certutil.exe and specify the -importcert parameter

考题 单选题You have a server that runs Windows Server 2008. You need to prevent the server from establishing communication sessions to other computers by using TCP port 25. What should you do()A  From Windows Firewall, add an exceptionB  From windows Firewall enable the block all incoming connections optionC  From the Windows Firewall with Advanced Security snap-in, create an inbound ruleD  From the Windows Firewall with Advanced Security snap-in, create an outbound rule.

考题 单选题You have a computer that runs Windows 7. You run Runas and specify the /savecred parameter to start anapplication. You need to delete the stored password. What should you do?()A Run Del and specify the /p parameter.B Run Runas and specify the /noprofile parameter.C From Credential Manager, modify the Windows credentials.D From Authorization Manager, modify the Authorization Manager options.

考题 单选题You have a VPN server that runs Windows Server 2003 Service Pack 2 (SP2). The VPN server supports only PPTP connections. A firewall protects the VPN server from the Internet. From a remote computer connected to the Internet, you attempt to connect to the VPN server. During the connection attempt, you receive a message that your user name and password are being verified. You then receive the following error message: “Error 721: The remote computer is not responding.”You need to ensure that you can establish a VPN connection to the VPN server from the Internet.  What should you do?()A On the VPN server, enable LAN routing.B On the VPN server, create a demand-dial interface.C On the firewall, allow inbound connections that use TCP port 1701.D On the firewall, allow inbound connections that use Generic Route Encapsulation (GRE) protocol 47.