网友您好, 请在下方输入框内输入要搜索的题目:

题目内容 (请给出正确答案)

You deploy your companys Internet Web site. You need to deny anonymous access to the Web site, allowing only authenticated users. Which code segment should you use?()

  • A、<authorization> <allow users="?"/> </authorization>
  • B、<authorization> <deny users="?"/> </authorization>
  • C、<authorization> <deny users="*"/></authorization>
  • D、<authorization> <allow users="*"/> </authorization>

参考答案

更多 “You deploy your companys Internet Web site. You need to deny anonymous access to the Web site, allowing only authenticated users. Which code segment should you use?()A、authorization allow users="?"/ /authorizationB、authorization deny users="?"/ /authorizationC、authorization deny users="*"//authorizationD、authorization allow users="*"/ /authorization” 相关考题
考题 You want to create a valid directory structure for your Java EE web application, and you want to put yourweb application into a WAR file called MyApp.war. Which two are true about the WAR file?()A、At deploy time, Java EE containers add a directory called META-INF directly into the MyApp directory.B、At deploy time, Java EE containers add a file called MANIFEST.MF directly into the MyApp directory.C、It can instruct your Java EE container to verify, at deploy time, whether you have properly configured your application’s classes.D、At deploy time, Java EE containers add a directory call META-WAR directly into the MyApp directory.

考题 Your company has a main office and a branch office. The offices connect by using WAN links. The network consists of a single Active Directory domain. An Active Directory site exists for each office.   Servers in both offices run Windows Server 2008 R2 Enterprise.   You plan to deploy a failover cluster solution to service users in both offices.  You need to plan a failover cluster to meet the following requirements: èMaintain the availability of services if a single server fails èMinimize the number of servers required What should you include in your plan?()A、Deploy a failover cluster that contains one node in each office.B、Deploy a failover cluster that contains two nodes in each office.C、In the main office, deploy a failover cluster that contains one node. In the branch office, deploy a  failover cluster that contains one node.D、In the main office, deploy a failover cluster that contains two nodes. In the branch office, deploy a  failover cluster that contains two nodes.

考题 Your network contains three Active Directory sites named Site1, Site2, and Site3. Users can only access Site1 from the Internet.  In each site, you plan to deploy a Mailbox server and a Hub Transport server.  You need to plan the deployment of Exchange servers to meet the following requirements: .Ensure that Exchange ActiveSync and Outlook Anywhere clients can connect to their Mailboxes from theInternet .Minimize hardware costs What should you include in your plan?()A、In Site1, deploy one Client Access server.B、In each site, deploy one Client Access server.C、In Site1, deploy one Client Access server and one Edge Transport server.D、In each site, deploy one Client Access server and one Edge Transport server.

考题 Your network consists of a single Active Directory domain. The network contains a file server that runs Windows Server 2008 R2. All servers use internal storage only. You plan to deploy a client/server application.   You need to deploy the application so that it is available if a single server fails. You must achieve this goal  while minimizing costs. What should you do?()A、Deploy RemoteApp.B、Deploy a failover cluster that uses No Majority: Disk Only.C、Deploy a failover cluster that uses Node and File Share Disk Majority.D、Deploy Distributed File System (DFS) and configure replication.

考题 You have an Exchange Server 2010 organization. You design a deployment of multiple Mailbox servers.  Your companys Service Level Agreement (SLA) states that servers must support 1,000 concurrent connections to mailboxes while maintaining an RPC latency of less than 20 milliseconds.  You need to verify that your design meets the requirements of the SLA before you deploy servers in the production environment.  Which tool should you use?()A、Exchange Server Jetstress 2010B、Exchange Server User Monitor (ExMon)C、Exchange Server Load Generator (LoadGen) 2010D、Exchange Server Remote Connectivity Analyzer (ExRCA)

考题 Your company has an Active Directory forest. The company has servers that run Windows Server   2008 R2 and client computers that run Windows 7. The domain uses a set of GPO administrative  templates that have been approved to support regulatory compliance requirements.   Your partner company has an Active Directory forest that contains a single domain. The company has  servers that run Windows Server 2008 R2 and client computers that run Windows 7.   You need to configure your partner companys domain to use the approved set of administrative  templates.   What should you do()A、Use the Group Policy Management Console (GPMC) utility to back up the GPO to a file. In each site,  import the GPO to the default domain policy.B、Copy the ADMX files from your companys PDC emulator to the PolicyDefinitions folder on the partner  companys PDC emulator.C、Copy the ADML files from your companys PDC emulator to the PolicyDefinitions folder on thepartner  companys PDC emulator.D、Download the conf.adm, system.adm, wuau.adm, and inetres.adm files from the Microsoft Updates  Web site. Copy the ADM files to the PolicyDefinitions folder on the partner companys PDC emulator.

考题 Your Exchange Server 2010 organization contains two Hub Transport servers in a single site. The organization receives all e-mail sent to a SMTP domain named contoso.com. Your company purchases another company that uses a SMTP domain named fabrikam.com. You plan to manage message hygiene for both SMTP domains.  You need to recommend changes to the organization to support the planned deployment.  The solution must prevent e-mail sent to fabrikam.com from being delivered to your internal organization.  What should you recommend?()A、Deploy a new Hub Transport server, and then create remote domains.B、Deploy a new Hub Transport server, and then configure transport rules.C、Deploy an Edge Transport server, and then create accepted domains.D、Deploy an Edge Transport server, and then configure a federation trust.

考题 You have an Exchange Server 2010 organization.  Your company has a relationship with another company.  The partner company has an Exchange Server 2010 organization.  You need to recommend a security solution to meet the following requirements:  .Ensure that all e-mail delivery between your servers and the partner companys servers is encrypted .Ensure that all communication between your servers and the partner companys servers is authenticated What should you include in the solution?()A、Active Directory Rights Management Services (AD RMS)B、Domain SecurityC、Forms-based AuthenticationD、Secure/Multipurpose Internet Mail Extensions (S/MIME)

考题 You have an Exchange Server 2010 organization that consists of 50 Exchange Server 2010 servers. Your companys security policy states that approved Exchange and Windows Server patches and securityupdates must be applied to all Exchange servers within one week of being released.  You need to recommend a patch management solution that meets the following requirements: .Allow administrators to manually approve patches and security updates .Allow only the installation of approved patches and security updates  .Minimize the administrative effort to deploy patches  .Minimize the deployment costs What should you include in the solution?()A、Microsoft UpdateB、Microsoft System Center Configuration ManagerC、Windows Server Update ServicesD、Windows Update

考题 You have an Exchange 2010 organization.  Your companys security policy states that all connections to Outlook Web App (OWA) must use smartcard authentication.  You need to recommend a solution to meet the security policy requirements.  Which two possible ways to achieve this goal should you recommend?()A、Require certificate-based authentication for all Internet-facing Client Access servers.B、Require Windows Integrated Authentication for all Internet-facing Client Access servers.C、Deploy an Edge Transport server, and then disable Windows Integrated Authentication.D、Deploy a server that runs Microsoft Internet Security and Acceleration (ISA) Server,and then  enableKerberos constrained delegation.

考题 You have an Exchange Server 2010 organization.  You have a global security group named Legal that contains all the members of your companys legaldepartment.  The companys security policy states that the Legal group must be able to search all mailboxes for e-mailmessages that contain specific keywords.  You need to recommend a solution for the organization that complies with the security policy.  What should you include in the solution?()A、a Discovery Management role groupB、a legal holdC、administrator audit loggingD、Mailbox journaling

考题 You have an Exchange Server 2010 organization.  All users connect to their mailboxes by using Microsoft Office Outlook 2007 Service Pack 2 (SP2) andWindows 7.  Your companys security administrators deploy Outlook Protection Rules.  You need to recommend a client connection solution for the organization to ensure that Outlook ProtectionRules can be used.  What should you recommend?()A、Upgrade all client computers to Outlook 2010.B、Instruct all users to connect to Outlook Web App (OWA).C、Instruct all users to install the Rights Management Service (RMS) client.D、Instruct all users to install the Secure/Multipurpose Internet Mail Extensions (S/MIME) control.

考题 You work as the exchange administrator at TestKing.com. The TestKing.com network contains anExchange Server 2010 Organization. You are responsible for managing the Exchange network forTestKing.com. You are in the process of enabling journaling within the TestKing.com organization. During the course ofday you receive an instruction form the CIO to stop administrators form reading classified e-mailmessages that is sent between senior management. What should you do?()A、Your best option would be to deploy an X.509 certificate from an enterprise certification authority (CA)to all senior management.B、Your best option would be to deploy Active Directory Rights Management Services (AD RMS)Templates.C、Your best option would be to deploy an X.509 certificate from a trusted third-party certification authority(CA) to all senior management.D、Your best option would be to deploy Active Directory Rights Management Services (AD RMS)Templates.Thereafter Transport Protection Rules should be created.

考题 单选题You completed your Java procedure for your external Java function activity, and you now want todeploy this to your server. What would you do to deploy the Java procedure?()A take the Java sources (.java) files and include them in your $APPL_TOPB take the Java sources (.java) files and include them in your CLASSPATHC take the Java classes (.class) files and include them in your $APPL_TOPD take the Java classes (.class) files and include them in your CLASSPATH

考题 多选题You want to create a valid directory structure for your Java EE web application, and you want to put yourweb application into a WAR file called MyApp.war. Which two are true about the WAR file?()AAt deploy time, Java EE containers add a directory called META-INF directly into the MyApp directory.BAt deploy time, Java EE containers add a file called MANIFEST.MF directly into the MyApp directory.CIt can instruct your Java EE container to verify, at deploy time, whether you have properly configured your application’s classes.DAt deploy time, Java EE containers add a directory call META-WAR directly into the MyApp directory.

考题 单选题You deploy your companys Internet Web site. You need to deny anonymous access to the Web site, allowing only authenticated users. Which code segment should you use?()A authorization allow users=?/ /authorizationB authorization deny users=?/ /authorizationC authorization deny users=*//authorizationD authorization allow users=*/ /authorization

考题 单选题Your company’s network has client computers that run Windows 7.   A software vendor releases version 2 of an application that your company uses.  Your company currently uses version 1.  Version 1 and version 2 are not compatible. You plan to deploy version 2 of the application.   You have the following requirements:Users must be able to run both versions of the application on their computers.   Version 2 must be available when a client computer is not connected to the network.  You need to plan a software deployment process that meets the requirements.   What should you do?()A  Deploy version 2 of the application by using Microsoft Application Virtualization (App-V). B  Deploy version 2 of the application as a Remote Desktop Services RemoteApp.C  Deploy version 2 of the application by using a Group Policy Software Installation policy.D  Deploy version 2 of the application by using a Microsoft System Center Configuration Manager package.