网友您好, 请在下方输入框内输入要搜索的题目:

题目内容 (请给出正确答案)

●Every Web site and electronic device connected to the Internet must possess a unique (75).

(75) A.E-Mail

B.IP address

C.server

D. NOS


参考答案

更多 “ ●Every Web site and electronic device connected to the Internet must possess a unique (75).(75) A.E-MailB.IP addressC.serverD. NOS ” 相关考题
考题 Your Web site uses custom Themes. Your Web site must support additional Themes based on the user‘s company name. The company name is set when a user logs on to the Web site. The company‘s Theme name is stored in a variable named ThemeName. You need to use this variable to dynamically set the Web site‘s Theme.What should you do?()A.B.C.D.

考题 Each Web(72)has its own unique address known as a URL(Uniform. Resource Locator).A.serverB.pointC.computerD.site

考题 Interface ge-0/0/2.0 of your device is attached to the Internet and is configured with an IP address and network mask of 71.33.252.17/24. A Web server with IP address 10.20.20.1 is running an HTTP service on TCP port 8080. The Web server is attached to the ge-0/0/0.0 interface of your device. You must use NAT to make the Web server reachable from the Internet using port translation.Which type of NAT must you configure?()A. source NAT with address shiftingB. pool-based source NATC. static destination NATD. pool-based destination NAT

考题 About electronic wallet,the correct description is ______. A.electronic wallets require consumers to enter their information at every site with which they want to do business B.a client-side electronic wallet stores a customer's information on a remote server belonging to a particular merchant or wallet publisher C.a server-side electronic wallet stores consumers' information on their computer D.when consumers select items to purchase, they can then click their electronic wallet to order the items quickly

考题 An(),serving a function similar to a physical wallet, holds credit card numbers, electronic cash, owner identification, and owner contact information and provides that information at an electronic commerce site's checkout counter. A.electronic wallet B.electronic commerce C.third party payment D.Internet banking

考题 A virtual (71) network, or VPN, is an encrypted connection over the Internet from a device to a network. The encrypted connection helps ensure that sensitive data is safely (72). It prevents (73) people fromeavesdropping on the traffic and allows the user to conduct work remotely. Traffic on the virtual network is sent securely by establishing an encrypted connection across the Internet known as a (74).A remote access VPN securely connects a device outside the corporate office. A site-to-site VPN connects the corporate office to branch offices over the Internet. Site-to-site VPNs are used when distance makes it impractical to have direct network connections between these offices. Think of site-to-site access as (75) to network. A.encodedB.encryptedC.storedD.transmitted

考题 Interface ge-0/0/2.0 of your device is attached to the Internet and is configured with an IP address and network mask of 71.33.252.17/24. A Web server with IP address 10.20.20.1 is running an HTTP service on TCP port 8080. The Web server is attached to the ge-0/0/0.0 interface of your device. You must use NAT to make the Web server reachable from the Internet using port translation. Which type of NAT must you configure?()A、source NAT with address shiftingB、pool-based source NATC、static destination NATD、pool-based destination NAT

考题 The same Web site is visited for the second time using a branch SRX Series Services Gateway configured with SurfControl integrated Web filtering.Which statement is true?()A、The SRX device sends the URL to the SurfControl server in the cloud and the SurfControl server provides the SRX.B、The SRX device sends the URL to the SurfControl server in the cloud and the SurfControl server asks the SRX device previously visited.C、The SRX device looks at its local cache to find the category of the URL.D、The SRX device does not perform any Web filtering operation as the Web site has already been visited.

考题 You have been tasked with performing an update to the IDP attack database. Which three requirements areincluded as part of this task?()A、The IDP security package must be installed after it is downloaded.B、The device must be rebooted to complete the update.C、The device must be connected to a network.D、An IDP license must be installed on your device.E、You must be logged in as the root user

考题 A customer has a web application with HTTP Sessions that need to be replicated to a backup site that is more than 100 miles away from the primary site, connected over the Internet.    Which type of session replication in WebLogic is recommended?()A、MAN ReplicationB、WAN Replication  C、Synchronous ReplicationD、Asynchronous ReplicationE、Database Replication

考题 You have a server that runs Windows Server 2003 Service Pack 2 (SP2).  You attempt to download a device driver. You receive an error message indicating that the Web site is blocked and scripting is disabled. You need to ensure that you can download the device driver while ensuring that access to scripts on other Web sites are restricted.  What should you do?()A、Run Cscript.exe //h:cscript.B、Disable Windows Internet Explorer Advanced Security.C、Enable TCP/IP filtering and allow TCP port 80 and 443.D、Add the device manufacturer’s Web site to the Trusted sites zone.

考题 You have the Web Server (IIS) role installed on a server that runs Windows Server 2008. You create a Web site named contoso.com. You copy an application named WebContent to the server. You need to enable the WebContent application on the Web site. What should you do?()A、At the command prompt on the server, run the appcmd add site command.B、At the command prompt on the server, run the appcmd add vdir command.C、Select the Web site from the Internet Information Services (IIS) Manager console. Select Add Application.D、Select the Web site from the Internet Information Services (IIS) Manager console. Select Add Virtual Directory.

考题 You need to prevent users from storing cookies that come from the www.contoso.com Web site. The solution must allow users to browse to the www.contoso.com Web site. What should you do?()A、Add an entry to the Lmhosts file. B、From the local area connection, add a DNS suffix.C、From Internet Explorer, modify the Privacy settings.D、From Internet Explorer, modify the Manage Add-ons settings. 

考题 Your company named Contoso, Ltd. has a Web server named WEB1.   The Web server runs Windows Server 2008. The fully qualified domain name of WEB1 is web1.contoso.com. The public DNS server has an alias record named owa.contoso.com that maps to web1.contoso.com. Users access WEB1 from the Internet by using http://owa.contoso.com.  The new company security policy states that the owa.contoso.com site must be available for Internet users only through secure HTTP (HTTPS) protocol. The security policy also states that users must not get security warnings when they connect to the site.  You need to request a certificate from a public certification authority (CA). Which Common Name should you use?()A、Contoso, Ltd.B、owa.contoso.comC、WEB1D、web1.contoso.com

考题 You create a Web site that you must copy from a development server to a testing server, along with all source files. You do not have terminal access to the testing server. You need to create the virtual directory. Then you must copy the Web site to the virtual directory on the testing server without precompiling the site. What should you do? ()A、Use the Publish Web tool.B、Use the Copy Web tool.C、Use the command line to XCOPY the files.D、Create a Web Setup project.

考题 You have a server that runs Windows Server 2008. The Web Server (IIS) role is installed.  You plan to host multiple Web sites on the server. You configure a single IP address for the server. All Web sites are registered in DNS to point to the single IP address.  You need to ensure that each Web site only responds to requests by name from all client computers.  What should you do?()A、Configue a unique port for each Web site.B、Configue a unique IP address for each Web site.C、Configue a unique Host Header for each Web site.D、Edit the Hosts file on the server to add all the Web site names associated to the network address.

考题 单选题Your company named Contoso, Ltd. has a Web server named WEB1.   The Web server runs Windows Server 2008. The fully qualified domain name of WEB1 is web1.contoso.com. The public DNS server has an alias record named owa.contoso.com that maps to web1.contoso.com. Users access WEB1 from the Internet by using http://owa.contoso.com.  The new company security policy states that the owa.contoso.com site must be available for Internet users only through secure HTTP (HTTPS) protocol. The security policy also states that users must not get security warnings when they connect to the site.  You need to request a certificate from a public certification authority (CA). Which Common Name should you use?()A Contoso, Ltd.B owa.contoso.comC WEB1D web1.contoso.com

考题 多选题You manage a server that runs Windows Server 2008. The server has the Web Server (IIS) role installed. The server hosts an Internet-accessible Web site that has a virtual directory named /orders/. A Web server certificate is installed and an SSL listener has been configured for the Web site. The /orders/ virtual directory must meet the following company policy requirements: Be accessible to authenticated users only. Allow authentication types to support all browsers. Encrypt all authentication traffic by using HTTPS.  All other directories of the Web site must be accessible to anonymous users and be available withoutSSL.  You need to configure the /orders/ virtual directory to meet the company policy requirements.  Which two actions should you perform?()AConfigure the Web site to the Require SSL setting.BConfigure the /orders/ virtual directory to the Require SSL setting.CConfigure the Digest Authentication setting to Enabled for the /orders/ virtual directory.DConfigure the Basic Authentication setting to Enabled and the Anonymous Authentication setting to Disabled for the Web site.EConfigure the Basic Authentication setting to Enabled and the Anonymous Authentication setting to Disabled for the /orders/ virtual directory.

考题 单选题Your company has an internal Web site that requires HTTPS. The Web site s certificate is self-signed. Youhave a computer that runs Windows 7 and Windows Internet Explorer 8. You use HTTPS to browse to theWeb site and receive the following warning message: There is a problem with this website s security certificate. You need to prevent the warning message from appearing when you access the Web site.  What should you do?()A From Internet Explorer, enable InPrivate Browsing.B From Internet Explorer, add the Web site to the Trusted sites zone.C From Certificate Manager, import the Web site s certificate into your Personal store.D From Certificate Manager, import the Web site s certificate into your Trusted Root CertificationAuthorities store.

考题 多选题You have been tasked with performing an update to the IDP attack database. Which three requirements areincluded as part of this task?()AThe IDP security package must be installed after it is downloaded.BThe device must be rebooted to complete the update.CThe device must be connected to a network.DAn IDP license must be installed on your device.EYou must be logged in as the root user

考题 单选题You have a Web server named Web1 that runs Windows Server 2003 Service Pack 2 (SP2). Users on the internal network connect to the Web site on Web1 by using the URL http://www.contoso.com. From the Internet, you cannot connect to the Web site by using the URL http://www.contoso.com.  You can connect to the Web site by using the public IP address of Web1. You need to ensure that users on the Internet can connect to the Web site on Web1 by using the URL http://www.contoso.com. You deploy a DNS server that is accessible on the Internet.  What should you do next?()A Create a stub zone for contoso.com.B Create a primary zone for contoso.com.C Create a secondary zone for contoso.com.D Configure a conditional forwarder for contoso.com.

考题 单选题A developer for the Company.com web site has been told that users may turn off cookie support in their browsers. What must the developer do to ensure that these customers can still use the web application?()A  The developer must ensure that every URL is properly encoded using the appropriate URL rewriting APIsB  The developer must provide an alternate mechanism for managing sessions and abandon theHttpSession mechanism entirelyC  The developer can ignore this issue. Web containers are required to support automatic URL rewriting when cookies are not supportedD  The developer must ass the string ?id= to the end of every URL to ensure that the conversion with the browser can continue.

考题 单选题A user wants to establish an FTP session to a server behind an SRX device but must authenticate to a Web page on the SRX device for additional authentication.Which type of user authentication is configured?()A pass-throughB WebAuthC WebAuth with Web redirectD pass-through with Web redirect

考题 单选题A customer has a web application with HTTP Sessions that need to be replicated to a backup site that is more than 100 miles away from the primary site, connected over the Internet.    Which type of session replication in WebLogic is recommended?()A MAN ReplicationB WAN Replication  C Synchronous ReplicationD Asynchronous ReplicationE Database Replication

考题 单选题You need to design a security solution for WEB1. Your solution must address the chief information officer’s concerns. What should you do?()A Enable Web distributed Authoring and Versioning (WebDAV) components on WEB1B Install and configure the URLScan ISAPI filter on WEB1C Install a computer certificate on WEB1, and enable the Server (Request Security) IPSec policy on WEB1D Configure the Web site redirection option on the properties of WEB1 in the Internet Service Manager console

考题 多选题You are the network administrator for your company. The network consists of a single Active Directory domain. All servers run Windows Server 2003.The network contains a Web server named Server1 that runs IIS 6.0 and hosts a secure Web site. The Web site is accessible from the intranet, as well as from the Internet. All users must authenticate when they connect to Server1. All users on the Internet must use a secure protocol to connect to the Web site. Users on the intranet do not need to use a secure protocol.You need verify that all users are using a secure protocol to connect to Server1 from the Internet.   What are two possible ways to achieve this goal?()AMonitor the events in the application log on Server1.BMonitor the events in the security log on Server1.CMonitor the Web server connections on Server1 by using a performance log.DMonitor network traffic to Server1 by using Network Monitor.EMonitor the IIS logs on Server1.

考题 单选题The same Web site is visited for the second time using a branch SRX Series Services Gateway configured with SurfControl integrated Web filtering.Which statement is true?()A The SRX device sends the URL to the SurfControl server in the cloud and the SurfControl server provides the SRX.B The SRX device sends the URL to the SurfControl server in the cloud and the SurfControl server asks the SRX device previously visited.C The SRX device looks at its local cache to find the category of the URL.D The SRX device does not perform any Web filtering operation as the Web site has already been visited.