网友您好, 请在下方输入框内输入要搜索的题目:

题目内容 (请给出正确答案)
多选题
A brand new network application is required for the Acme Company, and they are considering the use of a connectionless service. What are the characteristics of a connectionless service?()
A

It uses a Reliable transport mechanism.

B

It uses a Non-reliable transport mechanism

C

It is less bandwidth-intensive than connection oriented services

D

it uses handshaking


参考答案

参考解析
解析: 暂无解析
更多 “多选题A brand new network application is required for the Acme Company, and they are considering the use of a connectionless service. What are the characteristics of a connectionless service?()AIt uses a Reliable transport mechanism.BIt uses a Non-reliable transport mechanismCIt is less bandwidth-intensive than connection oriented servicesDit uses handshaking” 相关考题
考题 You develop a Windows Communication Foundation (WCF) service. It is used exclusively as an intranet application and is currently unsecured. You need to ensure that the service meets the following requirements: The service now must be exposed as an Internet application. The service must be secured at the transport level. Impersonation and delegation cannot be enabled.What should you use? ()A. basicHttpBinding and HTTPB. basicHttpBinding and KerberosC. wsHttpBinding and KerberosD. wsHttpBinding and HTTPS

考题 is a connectionless TCP/IP transport layer protocol.A.FTPB.UDPC.1PD.ICMP

考题 Which two statements are true about optical networks?() A. SONET and SDH both use time-division multiplexing.B. An optical transport network system uses time-division multiplexing.C. SONET and SDH both use wavelength-division multiplexing.D. An optical transport network system uses wavelength-division multiplexing.

考题 A brand new network application is required for the Acme Company, and they are considering the use of a connectionless service. What are the characteristics of a connectionless service?() A. It uses a Reliable transport mechanism.B. It uses a Non-reliable transport mechanismC. It is less bandwidth-intensive than connection oriented servicesD. it uses handshaking

考题 A company implements video conferencing over IP on their Ethernet LAN. The users notice that the network slows down, and the video either stutters or fails completely. What is the most likely reason for this?()A、minimum cell rate (MCR)B、quality of service (QoS)C、modulationD、packet switching exchange (PSE)E、reliable transport protocol (RTP)

考题 A brand new network application is required for the Acme Company, and they are considering the use of a connectionless service. What are the characteristics of a connectionless service?()A、It uses a Reliable transport mechanism.B、It uses a Non-reliable transport mechanismC、It is less bandwidth-intensive than connection oriented servicesD、it uses handshaking

考题 Your company has 1,000 client computers.  You are planning to deploy Windows 7 and a new line-of-business application.   You have the following requirements:   Install the application as part of the standard Windows 7 deployment. Use a single Windows 7 image for the deployment.  The application must be available for use on client computers that are not connected to the network.   You need to ensure that the application is installed on all new client computers.   What should you do?()A、Publish the application by using Group Policy Software Installation.B、Deploy the application by using Windows Server Update Services (WSUS).C、Service an online image of Windows 7 to add the new application.D、Service an offline image of Windows 7 to add the new application.

考题 Which of the following is a connectionless transport layer protocol?()A、 TCPB、 HTTPC、 SMTPD、 UDP

考题 You develop a Windows Communication Foundation (WCF) service that uses basic authentication for client credentials. This service is currently configured to use message security. The service is hosted on a server in workgroup mode.Users report that their passwords are stolen when they use public computers.You need to ensure that messages are secure and users are authenticated.You prevent the service from being called over HTTP through Microsoft Internet Information Services (IIS) configuration. What should you do next?()A、Use the transport security mode and specify None for transport client credential type.B、Use the transportWithMessageCredential security mode and specify Basic for the transport client credential type.C、Use the message security mode and specify Basic for the transport client credential type.D、Use the transportWithMessageCredential security mode and specify None for the transport client credential type.

考题 Which two of these are characteristics of multicast routing? ()A、 multicast routing uses RPFB、 multicast routing is connectionless.C、 In multicast routing, the source of a packet is known.D、 When network topologies change, multicast distribution trees are not rebuilt, but use the originalpathE、 Multicast routing is much like unicast routing, with the only difference being that it has a a groupof receivers rather than just one destination

考题 A technician installed a new wireless access point on an existing small office home office (SOHO) network with a selective security option enabled. All wireless computers connect to the new network except one computer that cannot connect to the wireless network. Which of the following is the cause?()A、The network uses MAC filteringB、The network uses WEPC、The network uses SSID broadcastD、The network uses WPA

考题 You are a database administrator for your company. The company uses a vendor company’s application that is based on a proprietary database. You query data from the application database and import the data into a SQL Server 2005 database. The application vendor provides you with a new OLE DB driver to be used when querying the application database. Company policy prohibits connections between the SQL Server database and the application database, except when querying this data. You need to provide a way to query data from the application database. What should you?()A、Configure a Linked Server connection to the application database.B、Write a query that uses an OPENDATASOURCE command.C、Write a query that uses an OPENQUERY command.D、Configure a Remote Server connection to the application database.

考题 You are creating a Windows Communication Foundation (WCF) service. The service endpoints change frequently. On the service, you add a new ServiceDiscoveryBehavior to the Behaviors collection of the ServiceHost Description property. You need to ensure that client applications can communicate with the service and discover changes to the service endpoints. What should you do?()A、Add a new ServiceDiscoveryBehavior to the Behaviors collection in the client application.B、Add a new AnnouncementClient to the Behaviors collection in the client application.C、Use the FindCriteria class and the UdpDiscoveryEndpoint class to set up the binding in the client application.D、Use the DiscoveryProxy class and the EndpointDiscoveryMetadata class to set up the binding in the client application.

考题 You work as the application developer at Certkiller .com. Certkiller .com uses Visual Studio.NET 2005 as its application development platform. You are developing a Windows Service application. You need to change the security context in which the service runs. The service will be run in context of a non-privileged user on the local computer and present anonymous credentials to any remote server. You are required to set the Account property of the ServiceProcessInstaller class to specify the service account. What should you do?()A、Use ServiceAccount.User.B、Use ServiceAccount.LocalService.C、Use ServiceAccount.LocalSystem.D、Use ServceAccount.NetworkService.

考题 Your network consists of a single Active Directory domain. The network contains a server that runs Windows Server 2003 Service Pack 2 (SP2). The server has an application that runs as a service. The application uses a domain service account to access other servers in the domain. Security policies require that users reset their passwords every 30 days. After the application runs for a month, the application fails.You need to ensure that the application starts and can access the remote servers. What should you do?()A、In the Services snap-in, set the service to log on as the Local System account and start the service.B、In the Services snap-in, set the service to log on as the Local Administrator account and start the service.C、In Active Directory Users and Computers, reset the server’s computer account. In the Services snap-in, start the service.D、In Active Directory Users and Computers, set the Account Expires option to Never. In the Services snap-in, start the service. 

考题 You work as an ASP.NET Web Application Developer for SomeCompany.  The company uses Visual Studio .NET 2010 as its application development platform. You create an ASP.NET Web application using .NET Framework 4.0. You create a Web page in the application. The Web page will get large sets of data from a data source.  You add a DataPager control to the page. You are required to display navigation controls that enable you to create a custom paging Ul for the DataPager control. What will you do?()A、Use NextPreviousPagerField.B、Use NumericPagerField.C、Use PreviousPagerField.D、Use NextPagerField.E、Use TemplatePagerField.

考题 ou work in a company which is named Wiikigo Corp. The company uses SQL Server 2008. You are the administrator of the company database. Now for a new application, a SQL Server 2008 instance has to be installed on an existing server. The server contains a default SQL Server 2005 instance. Your company CIO wants their corresponding certified third-party applications can access to both database instances. The company assigns this task to you. You must achieve this by using as little database administrative effort as possible, and never change the existing application environments. What should you do? () A、You should install SQL Server 2008 as the default instance, and configure the new application to use the default instance B、You should upgrade the SQL Server 2005 application to use SQL Server 2008 C、You should upgrade the SQL Server 2005 instance to a SQL Server 2008 instance D、You should install SQL Server 2008 as a named instance, and make the new application use the new instance. 

考题 You work in a company which uses SQL Server 2008. You are the administrator of the company database. Now you are in charge of a SQL Server 2008 instance. The instance contains a database named DB1. An application which is continuously connected uses DB1. The application extensively uses the INSERT command and triggers the population of multiple tables. Now you notice that the application has a poor performance. You doubt that this problem has something to do with blocking. You have to monitor the state of the instance at regular intervals while not affecting the application performance further.  Which tool should you use? () A、You should use Dynamic Management Views B、You should use SQL Server Resource Governor C、You should use SQL Server Profiler D、You should use Windows System Monitor

考题 You create a Windows Communication Foundation (WCF) service and deploy it with wsHttpBinding and message security enabled.You create an intermediate WCF service for logging messages sent to the primary service.The intermediate service is called via endpoint behaviour. The primary service is receiving malformed data from a client application.You need to enable inspection of the malformed data and prevent message tampering. What do you do?()A、Specify a protection level of None in the contract for the intermediate service. Disable message and transport security from the client application configuration file.B、Specify a protection level of Sign in the contract for the intermediate service. Disable transport security from the client application configuration file.C、Modify the binding on the intermediate service to use netNamedPipeBinding.D、Modify the binding on the intermediate service to use webHttpBinding.

考题 You develop a Windows Communication Foundation (WCF) service. It is used exclusively as an intranet application and is currently unsecured. You need to ensure that the service meets the following requirements: The service now must be exposed as an Internet application. The service must be secured at the transport level. Impersonation and delegation cannot be enabled. What should you use? ()A、basicHttpBinding and HTTPB、basicHttpBinding and KerberosC、wsHttpBinding and KerberosD、wsHttpBinding and HTTPS

考题 单选题Your network consists of a single Active Directory domain. The network contains a server that runs Windows Server 2003 Service Pack 2 (SP2). The server has an application that runs as a service. The application uses a domain service account to access other servers in the domain. Security policies require that users reset their passwords every 30 days. After the application runs for a month, the application fails. You need to ensure that the application starts and can access the remote servers.  What should you do?()A In the Services snap-in, set the service to log on as the Local System account and start the service.B In the Services snap-in, set the service to log on as the Local Administrator account and start the service.C In Active Directory Users and Computers, reset the servers computer account. In the Services snap-in, start the service.D In Active Directory Users and Computers, set the Account Expires option to Never. In the Services snap-in, start the service.

考题 单选题What is a static packet-filtering firewall used for ?()A It validates the fact that a packet is either a connection request or a data packet belonging to a connectionB It evaluates network packets for valid data at the application layer before allowing connectionsC It analyzes network traffic at the network and transport protocol layersD It keeps track of the actual communication process through the use of a state table

考题 多选题Which two of these are characteristics of multicast routing? ()Amulticast routing uses RPFBmulticast routing is connectionless.CIn multicast routing, the source of a packet is known.DWhen network topologies change, multicast distribution trees are not rebuilt, but use the originalpathEMulticast routing is much like unicast routing, with the only difference being that it has a a groupof receivers rather than just one destination

考题 单选题A technician installed a new wireless access point on an existing small office home office (SOHO) network with a selective security option enabled. All wireless computers connect to the new network except one computer that cannot connect to the wireless network. Which of the following is the cause?()A The network uses MAC filteringB The network uses WEPC The network uses SSID broadcastD The network uses WPA

考题 多选题Which two statements are true about optical networks?()ASONET and SDH both use time-division multiplexing.BAn optical transport network system uses time-division multiplexing.CSONET and SDH both use wavelength-division multiplexing.DAn optical transport network system uses wavelength-division multiplexing.

考题 多选题You have a Bridged 1483 service offering where each ATM PVC is assigned a /30 subnet. What are two characteristics of this configuration?()AIt burns IP addresses.BIt conserves IP addresses.CBoth the client and the ERX Edge Router have IP addresses.DThe client has an IP address, but the ERX Edge Router uses an unnumbered address.

考题 单选题Which of the following is a connectionless transport layer protocol?()A  TCPB  HTTPC  SMTPD  UDP