网友您好, 请在下方输入框内输入要搜索的题目:

题目内容 (请给出正确答案)

Your web application requires the adding and deleting of many session attributes during a complex usecase. A bug report has come in that indicates that an important session attribute is being deleted too soonand a NullPointerException is being thrown several interactions after the fact. You have decided to create asession event listener that will log when attributes are being deleted so you can track down when theattribute is erroneously being deleted. Which listener class will accomplish this debugging goal?()

  • A、Create an HttpSessionAttributeListener class and implement the attributeDeleted method and log the attribute name using the getName method on the event object.
  • B、Create an HttpSessionAttributeListener class and implement the attributeRemoved method and log the attribute name using the getName method on the event object.
  • C、Create an SessionAttributeListener class and implement the attributeRemoved method and log the attribute name using the getAttributeName method on the event object.
  • D、Create an SessionAttributeListener class and implement the attributeDeleted method and log the attribute name using the getAttributeName method on the event object.

参考答案

更多 “ Your web application requires the adding and deleting of many session attributes during a complex usecase. A bug report has come in that indicates that an important session attribute is being deleted too soonand a NullPointerException is being thrown several interactions after the fact. You have decided to create asession event listener that will log when attributes are being deleted so you can track down when theattribute is erroneously being deleted. Which listener class will accomplish this debugging goal?()A、Create an HttpSessionAttributeListener class and implement the attributeDeleted method and log the attribute name using the getName method on the event object.B、Create an HttpSessionAttributeListener class and implement the attributeRemoved method and log the attribute name using the getName method on the event object.C、Create an SessionAttributeListener class and implement the attributeRemoved method and log the attribute name using the getAttributeName method on the event object.D、Create an SessionAttributeListener class and implement the attributeDeleted method and log the attribute name using the getAttributeName method on the event object.” 相关考题
考题 Your Web site uses custom Themes. Your Web site must support additional Themes based on the user‘s company name. The company name is set when a user logs on to the Web site. The company‘s Theme name is stored in a variable named ThemeName. You need to use this variable to dynamically set the Web site‘s Theme.What should you do?()A.B.C.D.

考题 You create a Web Form that contains connected Web Parts. You write the following declaration in your Web Form.You need to ensure that your Web Part connection is valid. Which two actions should you perform? ()A. Include a data source identified as WebPartConnection1 on the Web Form.B. Include a Web Part identified as customerPart on the Web Form.C. Include a Web Part identified as ordersPart on the Web Form.D. Ensure that you declare an interface named IOrdersPart.E. Ensure that you declare an interface named ICustomerPart.F. Ensure that each Web Part declares either a GetInterface or ProvideInterface method.

考题 You configure parental controls on your computer for your child‘s user account. Your child logs on with a different account and is able to access inappropriate Web sites. You need to ensure that your child cannot access inapproriate Web sites.What should you do?()A.AB.BC.CD.D

考题 Since HTTP is one of the most common protocols used in the internet, what should be done at a firewall level to ensure thatthe protocol is being used correctly? ()A、 Ensure that a stateful firewall allows only HTTP traffic destined for valid web server IP addresses.B、 Ensure that a firewall has SYN flood and DDoS protection applied specifically for valid web servers.C、 Ensure that your firewall enforces HTTP protocol compliance to ensure that only valid flows are allowed inand outof your network.D、 Ensure that HTTP is always authenticated.E、 Ensure that your web server is in a different zone than your backend servers such as SQL and DNS.

考题 Your company has an Active Directory domain. All computers are members of the domain. Your networkcontains an internal Web site that uses Integrated Windows Authentication. From a computer that runs Windows 7, you attempt to connect to the Web site and are prompted for authentication. You verify that youruser account has permission to access the Web site. You need to ensure that you are automaticallyauthenticated when you connect to the Web site.  What should you do?()A、Create a complex password for your user account.B、Open Credential Manager and modify your credentials.C、Add the URL of the Web site to the Trusted sites zone.D、Add the URL of the Web site to the Local intranet zone.

考题 You want to create a valid directory structure for your Java EE web application, and your application usestag files and a JAR file. Which three must be located directly in your WEB-INF directory(NOT in asubdirectory of WEB-INF)?()A、The JAR fileB、A directory called libC、A directory called tagsD、A directory called TLDsE、A directory called classesF、A directory called META-INF

考题 Your web application requires the ability to load and remove web files dynamically to the web container’s filesystem. Which two HTTP methods are used to perform these actions?()A、PUTB、POSTC、SENDD、DELETEE、REMOVE

考题 You are creating a templated Web control for use in your Web application. You need to add the Web control to your Web application pages without compiling your control into a .dll file. What should you do?()A、Ensure that the Web control inherits from the WebControl class.B、Ensure that the Web control inherits from the Control class.C、Ensure that the Web control inherits from the CompositeControl class.D、Ensure that the Web control inherits from the UserControl class.

考题 You configure parental controls on your computer for your childs user account. Your child logs on with a different account and is able to access inappropriate Web sites. You need to ensure that your child cannot access inappropriate Web sites.  What should you do? ()A、Enable Microsoft Windows Firewall.B、Disable the default administrator account.C、Use password protection for all user accounts.D、Configure Web sites you approve of in the list of Trusted Sites of Microsoft Windows Internet Explorer.

考题 You create a large, n-tier Web application that has a custom event tracking system. You need to create a custom event type that enables your event tracking system to record all relevant event details for all types of events. The events must be stored in Microsoft SQL Server. From which base type should your custom event type inherit? ()A、IWeb Event Custom EvaluatorB、Web Event ProviderC、Web Base EventD、Web Audit Event

考题 You create a Web Form that contains connected Web Parts. You write the following declaration in your Web Form. You need to ensure that your Web Part connection is valid. Which two actions should you perform? ()A、Include a data source identified as "WebPartConnection1" on the Web Form.B、Include a Web Part identified as "customerPart" on the Web Form.C、Include a Web Part identified as "ordersPart" on the Web Form.D、Ensure that you declare an interface named "IOrdersPart".E、Ensure that you declare an interface named "ICustomerPart".F、Ensure that each Web Part declares either a GetInterface or ProvideInterface method.

考题 Your network consists of a single Active Directory domain. The network contains five Windows Server 2008 R2 servers that host Web applications. You need to plan a remote management strategy to manage the Web servers.  Your plan must meet the following requirements: èAllow Web developers to configure features on the Web sites   èPrevent Web developers from having full administrative rights on the Web servers What should you include in your plan?()A、Configure request filtering on each Web server.B、Configure authorization rules for Web developers on each Web server.C、Configure the security settings in Internet Explorer for all Web developers by using a Group Policy.D、Add the Web developers to the Account Operators group in the domain.

考题 You are the desktop administrator for your company. Your company’s software developers use Windows XP Professional and IIS on their client computers to develop Web-based applications. All client computers use Microsoft Internet Explorer 6. 0 or later as their Web browser. One of the developers reports that he can no longer access the Web-based application on his desktop by using his Web browser. When you attempt to access the application by using your Web browser, you receive the following error message: “Cannot find server or DNS Error.” You verify that the World Wide Web Publishing Service is started on the developer’s computer. You also verify that you are using the correct URL to access the developer’s computer by using your Web browser. You need to ensure that the developer can access the Web application by using his Web browser. How should you configure the developer’s computer?() A、Start the default Web site.B、Start the IIS Admin Service.C、Run the IPconfig /registerdns command.D、In the default Web site properties,disable the host header setting.

考题 Which utility allows you to pre-compile and publish your Web site to a new location?()A、Publish Web SiteB、Web-based installationC、Web site project modeD、Web services directory

考题 单选题You are the desktop administrator for your company. Your company’s software developers use Windows XP Professional and IIS on their client computers to develop Web-based applications. All client computers use Microsoft Internet Explorer 6. 0 or later as their Web browser. One of the developers reports that he can no longer access the Web-based application on his desktop by using his Web browser. When you attempt to access the application by using your Web browser, you receive the following error message: “Cannot find server or DNS Error.” You verify that the World Wide Web Publishing Service is started on the developer’s computer. You also verify that you are using the correct URL to access the developer’s computer by using your Web browser. You need to ensure that the developer can access the Web application by using his Web browser. How should you configure the developer’s computer?()A Start the default Web site.B Start the IIS Admin Service.C Run the IPconfig /registerdns command.D In the default Web site properties,disable the host header setting.

考题 单选题Since HTTP is one of the most common protocols used in the internet, what should be done at a firewall level to ensure thatthe protocol is being used correctly? ()A  Ensure that a stateful firewall allows only HTTP traffic destined for valid web server IP addresses.B  Ensure that a firewall has SYN flood and DDoS protection applied specifically for valid web servers.C  Ensure that your firewall enforces HTTP protocol compliance to ensure that only valid flows are allowed inand outof your network.D  Ensure that HTTP is always authenticated.E  Ensure that your web server is in a different zone than your backend servers such as SQL and DNS.

考题 多选题Your web application requires the ability to load and remove web files dynamically to the web container’s filesystem. Which two HTTP methods are used to perform these actions?()APUTBPOSTCSENDDDELETEEREMOVE

考题 单选题Use the()version of your web browser.A laterB lastC latestD late

考题 单选题Your company has a stand-alone server named Server2 that runs Windows Server 2003 Service Pack 2 (SP2). Server2 is a Web server.You monitor two client connections to your Web site on Server2 and obtain the results shown in the exhibit.(Click the Exhibit button.) You need to ensure that all connections to the Web server are encrypted. What should you do?()A Install a Web server certificate on Server2. B Configure the Web site to require a secure channel. C Configure the Web site to redirect all requests to https://Server2. D Configure the Web site to require integrated Windows authentication.

考题 单选题Your company has an internal Web site that requires HTTPS. The Web site s certificate is self-signed. Youhave a computer that runs Windows 7 and Windows Internet Explorer 8. You use HTTPS to browse to theWeb site and receive the following warning message: There is a problem with this website s security certificate. You need to prevent the warning message from appearing when you access the Web site.  What should you do?()A From Internet Explorer, enable InPrivate Browsing.B From Internet Explorer, add the Web site to the Trusted sites zone.C From Certificate Manager, import the Web site s certificate into your Personal store.D From Certificate Manager, import the Web site s certificate into your Trusted Root CertificationAuthorities store.

考题 单选题Your network consists of a single Active Directory domain. All servers run Windows Server 2008 R2.   You plan to publish a Web site on two Web servers.   You need to deploy an availability solution for your Web servers that meets the following requirements: èSupports the addition of more Web servers without interrupting client connections  èEnsures that the Web site is accessible even if a single server fails What should you do?()A Configure a failover cluster.B Configure a Web garden on each Web server.C Create a Network Load Balancing cluster.D Create two application pools on each Web server.

考题 多选题You want to create a valid directory structure for your Java EE web application, and your application usestag files and a JAR file. Which three must be located directly in your WEB-INF directory(NOT in asubdirectory of WEB-INF)?()AThe JAR fileBA directory called libCA directory called tagsDA directory called TLDsEA directory called classesFA directory called META-INF

考题 单选题You are able to access a Web server from your computer by using the IP address of the Web server. You fail to access the Web server when you use its fully qualified domain name. Other users on your network can access the Web server by using both the IP address and the fully  qualified domain name. You need to access the Web server by using the fully qualified domain name.  What should you do? ()A Use the Diagnose and repair feature in the Network and Sharing Center.B At the command prompt, type ipconfig /allcompartments.C Disable the NetBIOS feature on your network adapter.D Configure the correct default gateway on the Alternate Configuration tab of your network connection properties dialog box.

考题 单选题You are a systems administrator responsible for managing a Windows Server 2008 Web server. Recently,your organization set up a new IIS Web site that will be accessed by users outside of your organizations.Consultants should be able to connect to this Web site, using IIS Manager. Your organization’s securitypolicy prevents you from creating domain accounts or local user accounts for these users. You attempt touse the IIS Manager Permissions feature for the Web site. However, when you click Allow User, you areable to select only Windows users.  How can you resolve this problem?()A Verify that Management Service has been started.B Reconfigure the file system permissions for the root folder of the Web site.C Reconfigure Management Service to enable Windows And IIS Manager Credentials.D Verify the Authentication settings for the Web site.

考题 单选题Which utility allows you to pre-compile and publish your Web site to a new location?()A Publish Web SiteB Web-based installationC Web site project modeD Web services directory

考题 单选题You develop a Web control. The Web control consists of labels and associated text boxes.You need to ensure that the Web control has both toolbox and visual designer support. What should you do?()A Add a Web Control Library project to your solution. Define a class that inherits from CompositeControl.B Add a Windows Control Library project to your solution. Define a class that inherits from UserControl.C Add a Web User Control to your project. Define a class that inherits from UserControl.D Add a Mobile Web User Control to your project. Define a class that inherits from MobileUserControl.