网友您好, 请在下方输入框内输入要搜索的题目:

题目内容 (请给出正确答案)
A brand new network application is required for the Acme Company, and they are considering the use of a connectionless service. What are the characteristics of a connectionless service?()

A. It uses a Reliable transport mechanism.

B. It uses a Non-reliable transport mechanism

C. It is less bandwidth-intensive than connection oriented services

D. it uses handshaking


参考答案

更多 “ A brand new network application is required for the Acme Company, and they are considering the use of a connectionless service. What are the characteristics of a connectionless service?() A. It uses a Reliable transport mechanism.B. It uses a Non-reliable transport mechanismC. It is less bandwidth-intensive than connection oriented servicesD. it uses handshaking ” 相关考题
考题 You develop a Windows Communication Foundation (WCF) service. It is used exclusively as an intranet application and is currently unsecured. You need to ensure that the service meets the following requirements: The service now must be exposed as an Internet application. The service must be secured at the transport level. Impersonation and delegation cannot be enabled.What should you use? ()A. basicHttpBinding and HTTPB. basicHttpBinding and KerberosC. wsHttpBinding and KerberosD. wsHttpBinding and HTTPS

考题 You create a Windows Communication Foundation (WCF) service. It is deployed on Microsoft Internet Information Services (IIS) with an application pool running as Network Service. You enable WMI tracing before launching the service. Your IT support staff adds WMI data collection through ASP.NET WMI tracing.You need to restrict the collection of WMI data to a privileged account.What should you do in WMI Control in the Computer Management console?()A.B.C.D.

考题 Connectionless无连接

考题 以下不是RANAP SERVICE的是()A、General control servicesB、Notification servicesC、Dedicate dcontrol servicesD、Connectionless data transfer service

考题 What are three reasons to collect Netflow data on a company network?()A、To identify applications causing congestionB、To authorize user network accessC、To report and alert link up / down instances.D、To diagnose slow network performance, bandwidth hogs, and bandwidth utilization.E、To detect suboptimal routing in the network.F、To confirm the appropriate amount of bandwidth that has been allocated to each Class of Service.

考题 A brand new network application is required for the Acme Company, and they are considering the use of a connectionless service. What are the characteristics of a connectionless service?()A、It uses a Reliable transport mechanism.B、It uses a Non-reliable transport mechanismC、It is less bandwidth-intensive than connection oriented servicesD、it uses handshaking

考题 You develop a service application that needs to be deployed. Your network administrator creates a specific user account for your service application.You need to configure your service application to run in the context of this specific user account. What should you do?()A、Prior to installation,set the StartType property of the ServiceInstaller class.B、Prior to installation,set the Account,Username,and Password properties of theServiceProcessInstaller class.C、Use the CONFIG option of the net.exe command-line tool to install the service.D、Use the installutil.exe command-line tool to install the service.

考题 Your company has 1,000 client computers.  You are planning to deploy Windows 7 and a new line-of-business application.   You have the following requirements:   Install the application as part of the standard Windows 7 deployment. Use a single Windows 7 image for the deployment.  The application must be available for use on client computers that are not connected to the network.   You need to ensure that the application is installed on all new client computers.   What should you do?()A、Publish the application by using Group Policy Software Installation.B、Deploy the application by using Windows Server Update Services (WSUS).C、Service an online image of Windows 7 to add the new application.D、Service an offline image of Windows 7 to add the new application.

考题 无连接(Connectionless)网络

考题 Which two of these are characteristics of multicast routing? ()A、 multicast routing uses RPFB、 multicast routing is connectionless.C、 In multicast routing, the source of a packet is known.D、 When network topologies change, multicast distribution trees are not rebuilt, but use the originalpathE、 Multicast routing is much like unicast routing, with the only difference being that it has a a groupof receivers rather than just one destination

考题 You are creating a Windows Communication Foundation (WCF) service. The service endpoints change frequently. On the service, you add a new ServiceDiscoveryBehavior to the Behaviors collection of the ServiceHost Description property. You need to ensure that client applications can communicate with the service and discover changes to the service endpoints. What should you do?()A、Add a new ServiceDiscoveryBehavior to the Behaviors collection in the client application.B、Add a new AnnouncementClient to the Behaviors collection in the client application.C、Use the FindCriteria class and the UdpDiscoveryEndpoint class to set up the binding in the client application.D、Use the DiscoveryProxy class and the EndpointDiscoveryMetadata class to set up the binding in the client application.

考题 You work as the application developer at Certkiller .com. Certkiller .com uses Visual Studio.NET 2005 as its application development platform. You are developing a Windows Service application. You need to change the security context in which the service runs. The service will be run in context of a non-privileged user on the local computer and present anonymous credentials to any remote server. You are required to set the Account property of the ServiceProcessInstaller class to specify the service account. What should you do?()A、Use ServiceAccount.User.B、Use ServiceAccount.LocalService.C、Use ServiceAccount.LocalSystem.D、Use ServceAccount.NetworkService.

考题 Your network consists of a single Active Directory domain. The network contains a server that runs Windows Server 2003 Service Pack 2 (SP2). The server has an application that runs as a service. The application uses a domain service account to access other servers in the domain. Security policies require that users reset their passwords every 30 days. After the application runs for a month, the application fails.You need to ensure that the application starts and can access the remote servers. What should you do?()A、In the Services snap-in, set the service to log on as the Local System account and start the service.B、In the Services snap-in, set the service to log on as the Local Administrator account and start the service.C、In Active Directory Users and Computers, reset the server’s computer account. In the Services snap-in, start the service.D、In Active Directory Users and Computers, set the Account Expires option to Never. In the Services snap-in, start the service. 

考题 You want to connect to your company network from your Windows 2000 Professional computer at home. You have an ISDN line that is used for internet connectivity. You create a VPN connection and are able to connect successfully to the company network. While connected to the company network, you are unable to access the Internet.   What must you do so that you can access the Internet?()A、Configure the ISDN connection to use SLIP instead of PPP.B、Select the Enable Internet Connection Sharing for this connection check box in the ISDN connection properties.C、Clear the Use default gateway on remote network check box.D、Install and configure the SAP Agent service.

考题 You are creating a client application and configuring it to call a Windows Communication Foundation (WCF) service.When the application is deployed, it will be configured to send all messages to a WCF routing service. You need to ensure that the application can consume the target service after the application is deployed. What should you do?()A、In the client application, add a service reference to the router service. In the client binding configuration, specify the address of the router service.B、In the client application, add a service reference to the target service. In the client binding configuration, specify the address of the target service.C、In the client application, add a service reference to the router service. In the client binding configuration, specify the address of the target service.D、In the client application, add a service reference to the target service. In the client binding configuration, specify the address of the router service.

考题 Your network contains a server that runs Windows Server 2003 Service Pack 2 (SP2). The server has an application that runs as a service.The application fails intermittently. After each failure, you manually restart the service. You need to ensure that the application starts automatically after a failure. What should you do?()A、 From the Services snap-in, modify the Log On settings of the service. B、 From the Services snap-in, modify the Recovery settings of the service. C、 From the properties of the application executable, set the compatibility mode to Windows 2000. D、 From the properties of the application executable, enable the Allow non-administrators to run this program setting.

考题 A Windows Communication Foundation (WCF) service has a callback contract. You are developing a client application that will call this service.You must ensure that the client application can interact with the WCF service. What should you do?()A、On the OperationContractAttribute, set the AsyncPattern property value to true.B、On the OperationContractAttribute, set the ReplyAction property value to the endpoint address of the client.C、On the client, create a proxy derived from DuplexClientBaseTChannel .D、On the client, use GetCallbackChannelT .

考题 Your company has a server that runs an instance of Actrve Directory Lightweight Directory Service (AD LDS) You need to create new organizational units in the AD LDS application directory partition What should you do()A、Use the Actrve Directory Users and Computers snap-in to create the organizational units on the AD LDS application directory partitionB、Use the ADSI Edit snap-in to create the organizational units on the AD LDS application directory partitionC、Use the dsadd OU  command to create the organizational unitsD、Use the dsmod OU  command to create the organizational units

考题 单选题Your company has 1,000 client computers.  You are planning to deploy Windows 7 and a new line-of-business application.   You have the following requirements:   Install the application as part of the standard Windows 7 deployment. Use a single Windows 7 image for the deployment.  The application must be available for use on client computers that are not connected to the network.   You need to ensure that the application is installed on all new client computers.   What should you do?()A Publish the application by using Group Policy Software Installation.B Deploy the application by using Windows Server Update Services (WSUS).C Service an online image of Windows 7 to add the new application.D Service an offline image of Windows 7 to add the new application.

考题 单选题You create a Windows Communication Foundation (WCF) service and deploy it with wsHttpBinding and message security enabled.You create an intermediate WCF service for logging messages sent to the primary service.The intermediate service is called via endpoint behaviour. The primary service is receiving malformed data from a client application.You need to enable inspection of the malformed data and prevent message tampering. What do you do?()A Specify a protection level of None in the contract for the intermediate service. Disable message and transport security from the client application configuration file.B Specify a protection level of Sign in the contract for the intermediate service. Disable transport security from the client application configuration file.C Modify the binding on the intermediate service to use netNamedPipeBinding.D Modify the binding on the intermediate service to use webHttpBinding.

考题 单选题You develop a Windows Communication Foundation (WCF) service. It is used exclusively as an intranet application and is currently unsecured. You need to ensure that the service meets the following requirements: The service now must be exposed as an Internet application. The service must be secured at the transport level. Impersonation and delegation cannot be enabled. What should you use? ()A basicHttpBinding and HTTPB basicHttpBinding and KerberosC wsHttpBinding and KerberosD wsHttpBinding and HTTPS

考题 单选题Your network contains an Active Directory forest. The functional level of the forest is Windows  Server 2008 R2.     Your company’s corporate security policy states that the password for each user account must be  changed at least every 45 days.     You have a user account named Service1. Service1 is used by a network application named  Application1. Every 45 days, Application1 fails.  After resetting the password for Service1, Application1 runs properly. You need to resolve the  issue that causes Application1 to fail. The solution must adhere to the corporate security policy.     What should you do()A Run the Set-ADAccountControl cmdlet.B Run the Set-ADServiceAccount cmdlet.C Create a new password policy.D Create a new Password Settings object (PSO).

考题 单选题Your network contains a server that runs Windows Server 2003 Service Pack 2 (SP2). The server has an application that runs as a service. The application fails intermittently. After each failure, you manually restart the service. You need to ensure that the application startsautomatically after a failure.  What should you do?()A From the Services snap-in, modify the Log On settings of the service.B From the Services snap-in, modify the Recovery settings of the service.C From the properties of the application executable, set the compatibility mode to Windows 2000.D From the properties of the application executable, enable the Allow non-administrators to run this program setting.

考题 单选题ou work in a company which is named Wiikigo Corp. The company uses SQL Server 2008. You are the administrator of the company database. Now for a new application, a SQL Server 2008 instance has to be installed on an existing server. The server contains a default SQL Server 2005 instance. Your company CIO wants their corresponding certified third-party applications can access to both database instances. The company assigns this task to you. You must achieve this by using as little database administrative effort as possible, and never change the existing application environments. What should you do? ()A You should install SQL Server 2008 as the default instance, and configure the new application to use the default instance B You should upgrade the SQL Server 2005 application to use SQL Server 2008 C You should upgrade the SQL Server 2005 instance to a SQL Server 2008 instance D You should install SQL Server 2008 as a named instance, and make the new application use the new instance. 

考题 单选题Your network consists of a single Active Directory domain. The network contains a server that runs Windows Server 2003 Service Pack 2 (SP2). The server has an application that runs as a service. The application uses a domain service account to access other servers in the domain. Security policies require that users reset their passwords every 30 days. After the application runs for a month, the application fails.You need to ensure that the application starts and can access the remote servers. What should you do?()A In the Services snap-in, set the service to log on as the Local System account and start the service.B In the Services snap-in, set the service to log on as the Local Administrator account and start the service.C In Active Directory Users and Computers, reset the server’s computer account. In the Services snap-in, start the service.D In Active Directory Users and Computers, set the Account Expires option to Never. In the Services snap-in, start the service. 

考题 单选题You are creating a Windows Communication Foundation (WCF) service. The service endpoints change frequently. On the service, you add a new ServiceDiscoveryBehavior to the Behaviors collection of the ServiceHost Description property. You need to ensure that client applications can communicate with the service and discover changes to the service endpoints. What should you do?()A Add a new ServiceDiscoveryBehavior to the Behaviors collection in the client application.B Add a new AnnouncementClient to the Behaviors collection in the client application.C Use the FindCriteria class and the UdpDiscoveryEndpoint class to set up the binding in the client application.D Use the DiscoveryProxy class and the EndpointDiscoveryMetadata class to set up the binding in the client application.

考题 多选题A brand new network application is required for the Acme Company, and they are considering the use of a connectionless service. What are the characteristics of a connectionless service?()AIt uses a Reliable transport mechanism.BIt uses a Non-reliable transport mechanismCIt is less bandwidth-intensive than connection oriented servicesDit uses handshaking