网友您好, 请在下方输入框内输入要搜索的题目:

题目内容 (请给出正确答案)
单选题
You are perfoming security testing on an existing asp.net web page.You notice that you are able to issue unauthorised postback requests to the page. You need to prevent unauthorised post back requests. which page directive you use?()
A

<%@Page strict = true %>  

B

<%@Page enableViewStateMac = true %>

C

<%@Page EnableEventValidation = true %>

D

<%@Page Aspcompact = true %>


参考答案

参考解析
解析: 暂无解析
更多 “单选题You are perfoming security testing on an existing asp.net web page.You notice that you are able to issue unauthorised postback requests to the page. You need to prevent unauthorised post back requests. which page directive you use?()A %@Page strict = true %  B %@Page enableViewStateMac = true %C %@Page EnableEventValidation = true %D %@Page Aspcompact = true %” 相关考题
考题 Recently, there’s been much theft in the school. What security measures shall we take then?A.We can install cameras and set up police line for you.B.We can install infrared surveillance cameras and intrusion alarms for you.C.We can install alarming system for you.D.We can equip techniques and electronic system for you.

考题 We learn from the last paragraph that in the near future[A] the garment industry will reconsider the uniform. size.[B] the design of military uniforms will remain unchanged.[C] genetic testing will be employed in selecting sportsmen.[D] the existing data of human height will still be applicable.

考题 We learn from the last paragraph that in the near futureA.the garment industry will reconsider the uniform. size.B.the design of military uniforms will remain unchanged.C.genetic testing will be employed in selecting sportsmen.D.the existing data of human height will still be applicable.

考题 When creating a network security solution, which two pieces of information should you have previously obtained to assist in designing the solution? ()A、a list of existing network applications currently in use on the networkB、network audit results to uncover any potential security holesC、a planned Layer 2 design solutionD、a proof-of-concept planE、device configuration templates

考题 You create an ASP.NET page named TestPage.aspx that contains validation controls. You need to verify that all input values submitted by the user have been validated by testing the Page.IsValid property. Which page event should you add an event handler to?()A、InitB、LoadC、PreInitD、PreLoad

考题 You are planning the migration of an existing application to Windows Azure and SQL Azure. The current application includes reports that are hosted by SQL Server Reporting Services.  You need to recommend an approach for migrating the reports.  What should you recommend? ()A、 Use SQL Azure to host client report definitions.B、 Use SQL Azure to host server report definitions.C、 Use Windows Azure to host client report definitions in an ASP.NET webpage.D、 Use Windows Azure to host server report definitions in an ASP.NET webpage.

考题 You are tasked with designing a security solution for your network.  What information should be gathered prior to designing the solution?()A、IP addressing design plans so that the network can be appropriately segmented to mitigate potential network threatsB、a list of the customer requirementsC、detailed security device specificationsD、results from pilot network testing

考题 Which two are needed components when designing and implementing a security solution?()A、detailed VLAN informationB、an incident response planC、results of testing the new network configurationD、an existing hierarchical network topologyE、a security policy for your organization

考题 You create a Web site. The Web site has many predefined roles and associated users that will be used for security purposes. You need to manage these roles and user accounts. Which tool should you use? ()A、the Microsoft .NET Framework Configuration toolB、the Code Access Security Policy toolC、the ASP.NET IIS Registration toolD、the Web Site Administration Tool

考题 You are perfoming security testing on an existing asp.net web page.You notice that you are able to issue unauthorised postback requests to the page. You need to prevent unauthorised post back requests. which page directive you use?()A、%@Page strict = "true" %  B、%@Page enableViewStateMac = "true" %C、%@Page EnableEventValidation = "true" %D、%@Page Aspcompact = "true" %

考题 You are testing an existing ASP.NET page. The page includes a text box. You are able to execute malicious JavaScript code by typing it in the text box and submitting. You need to configure the page to prevent JavaScript code from being submitted by the text box. In the @ Page directive, which attribute should you set to true?()A、the EnableEventValidation attributeB、the ResponseEncoding attributeC、the ValidateRequest attributeD、the Strict attribute

考题 You have a single Active Directory directory service forest with one domain. You have an existing  top-level organizational unit (OU) named Sales. You are planning to create a new top-level OU named  Training. The Sales and Training OUs must have the same security and auditing settings. You need to  identify the security permissions and audit settings for the Sales OU so that you can delegate the same  permissions for the Training OU.  What should you do first?()A、 Use the Delegation of Control Wizard.B、 Use the Security Configuration Wizard.C、 Run the dsacls command.D、 Run the xcacls command.

考题 You need to design a domain model that meets the company business and security requirements for controlling access to the new Web-based ordering application. What should you do?()A、Create a child OU within the existing domainB、Create a child domain of the existing domainC、Create a new domain in a new forest. Configure the new domain to trust the existing domainD、Create a new tree in the existing forest. Configure the new domain to trust the existing domain

考题 单选题You are planning the migration of an existing application to Windows Azure and SQL Azure. The current application includes reports that are hosted by SQL Server Reporting Services.  You need to recommend an approach for migrating the reports.  What should you recommend? ()A  Use SQL Azure to host client report definitions.B  Use SQL Azure to host server report definitions.C  Use Windows Azure to host client report definitions in an ASP.NET webpage.D  Use Windows Azure to host server report definitions in an ASP.NET webpage.

考题 单选题You are changing the security settings of a file named MyData.xml.You need to preserve the existing inherited access rules.You also need to prevent the access rules from inheriting changes in the future.   Which code segment should you use?()A AB BC CD D

考题 单选题You create an ASP.NET page named TestPage.aspx that contains validation controls. You need to verify that all input values submitted by the user have been validated by testing the Page.IsValid property. Which page event should add an event handler to?()A IniB LoadC PreInitD PreLoad

考题 单选题The company is evaluating using a new Active Directory domain to contain all customer user accounts. You need to design a monitoring or logging strategy that meets business and security requirements for the new Web-based ordering application. Your solution must minimize overhead on existing domain controllers and servers.  What should you do?()A Enable logon auditing in both the new and the existing domainsB Enable logon auditing only in the existing domainC Enable logon auditing only in the new domainD Enable logon auditing on only the Web server

考题 单选题You are the network administrator for Your network consists of two Active Directory domains in a single forest. All network servers run Windows Server 2003. Currently, you use more than 1,000 security groups. A member server named TK1 contains a folder named Testing. This folder contains resources required by users in the engineering department. A written security policy states that engineering users must have the approval of the management group before they can be assigned the Full Control NTFS permission on Testing. You need to discover whether any engineering users currently have the Full Control NTFS permission on Testing. You must complete this task by using the minimum amount of administrative effort. What should you do?()A Use Active Directory Users and Computers to view the access level available to engineering users.B Use the Find Users, Contacts, and Groups utility to view the membership of each group that has access to Testing.C In the properties of Testing, view the Effective Permissions tab.D Write an ADSI script to search for members of all groups that have access to testing

考题 单选题What action should you be prepared to take when verifying a security solution?()A having alternative addressing and VLAN schemesB having a rollback plan in case of unwanted or unexpected resultsC running a test script against all possible security threats to insure that the solution will mitigate all potential threatsD isolating and testing each security domain individually to insure that the security design will meet overall requirements when placed into production as an entire system

考题 单选题You create a Web site. The Web site has many predefined roles and associated users that will be used for security purposes. You need to manage these roles and user accounts. Which tool should you use? ()A the Microsoft .NET Framework Configuration toolB the Code Access Security Policy toolC the ASP.NET IIS Registration toolD the Web Site Administration Tool

考题 单选题You manage a server that runs Windows Server 2008. The server has the Web Server (IIS) role installed. The Web developer at your company creates a new Web site that runs an ASP.NET 3.0 Web application.  The ASP.NET Web application must run under a security context that is separate from any other ASP.NET application on the Web server.  You create a local user account and grant account rights and permissions to run the ASP.NET Web application.  You need to configure authentication for the new Web site to support the Web application. What should you do?()A Configure the Windows Authentication setting to Enabled.B Configure the Forms Authentication setting to Enabled by using all the default settings.C Configure the ASP.NET State service to log on to the new local user account by using the Services console.D Configure the ASP.NET Impersonation setting to Enabled. Edit the ASP.NET Impersonation setting by specifying the new local user account.

考题 单选题You established access to menu modules using roles. While testing the application, you need access to all the menus in the SALES form module for all the roles. Which method will override the Menu Module Roles property to allow you to access all the menu items?()A Disable the values for the Menu Module Roles property. B Set the Use Security value in the form module Property Palette to 'True'. C Set the Use Security value in the form module Property Palette to 'False'. D Set the Use Security value in the menu module Property Palette to 'True'. E Set the Use Security value in the menu module Property Palette to 'False'. 

考题 单选题You modify an existing Microsoft ASP.NET application by using the Microsoft .NET Framework version 3.5.  You add a theme to the ASP.NET application.  You need to apply the theme to override any settings of individual controls.  What should you do?()A In the Web.config file of the application,set the Theme attribute of the pages element to the name of the theme.B In the Web.config file of the application,set the StyleSheetThemeattribute of the pages element to the name of the theme.C Add a master page to the application. In the @Master directive,set the Theme attribute to the name of the theme.D Add a master page to the application. In the @Master directive,set the StyleSheetTheme attribute to the name of the theme.

考题 单选题You are tasked with designing a security solution for your network.  What information should be gathered prior to designing the solution?()A a list of applications currently in use in the networkB IP addressing design plans so that the network can be appropriately segmented to mitigate potential network threatsC detailed security device specificationsD results from pilot network testing

考题 单选题You are testing an existing ASP.NET page. The page includes a text box. You are able to execute malicious JavaScript code by typing it in the text box and submitting. You need to configure the page to prevent JavaScript code from being submitted by the text box. In the @ Page directive, which attribute should you set to true?()A the EnableEventValidation attributeB the ResponseEncoding attributeC the ValidateRequest attributeD the Strict attribute

考题 多选题Which two are needed components when designing and implementing a security solution?()Adetailed VLAN informationBan incident response planCresults of testing the new network configurationDan existing hierarchical network topologyEa security policy for your organization

考题 多选题When creating a network security solution, which two pieces of information should you have previously obtained to assist in designing the solution? ()Aa list of existing network applications currently in use on the networkBnetwork audit results to uncover any potential security holesCa planned Layer 2 design solutionDa proof-of-concept planEdevice configuration templates