单选题You need to implement an authentication method on SQL4. The TravelOnline database will be accessed through a Web services application. You need to make the authentication method as secure as possible.What should you do?()ACreate an HTTP endpoint with NTLM authentication, and create a service principal name (SPN).BCreate an HTTP endpoint with digest authentication, and create a service principal name (SPN).CCreate an HTTP endpoint with integrated authentication, and create a service principal name (SPN).DCreate an HTTP endpoint with Kerberos authentication.

单选题
You need to implement an authentication method on SQL4. The TravelOnline database will be accessed through a Web services application. You need to make the authentication method as secure as possible.What should you do?()
A

Create an HTTP endpoint with NTLM authentication, and create a service principal name (SPN).

B

Create an HTTP endpoint with digest authentication, and create a service principal name (SPN).

C

Create an HTTP endpoint with integrated authentication, and create a service principal name (SPN).

D

Create an HTTP endpoint with Kerberos authentication.


参考解析

解析: 暂无解析

相关考题:

You are creating a Windows Communication Foundation (WCF) service that implements operations in a RESTful manner. You need to add a delete operation. You implement the delete method as follows:void DeleteItems(string id);You need to configure WCF to call this method when the client calls the service with the HTTP DELETE operation. What should you do?()A. Add the WebInvoke(UriTemplate=/Items/{id}, Method=DELETE) attribute to the operationB. Add the HttpDelete atribute to the operationC. Replace the string parameter with a RemovedActivityAction parameterD. Replace the return type with RemovedActivityAction.

You are creating a Windows Forms application for a financial service provider by using the .NET Framework 3.5. You have to implement a multiple document interface (MDI) in the application to allow users to open multiple financial documents simultaneously.You need to ensure that whenever the child MDI form is created, the application displays a message in the title bar of the parent MDI that a child form has received focus.   What should you do?()A、Implement theActivated eventB、Implement the MdiChildActivate eventC、Override the OnParentVisibleChanged methodD、Override the OnParentBindingContextChanged method

How do you define the authentication method that will be used with AAA?()A、With the method aaa commandB、With the method commandC、With a method listD、With a method statement

An administrator has been having problems with server security. Many of the servers have been infected with viruses in the past. Which of the following can be done to ensure that systems avoid OS exploits? ()A、 Implement an intrusion detection system (IDS).B、 Implement a dual-factor authentication method.C、 Implement a patch management process.D、 Implement stronger user passwords.

You are creating a Windows Forms application by using the .NET Framework 3.5. You plan to develop a new control for the application.You need to ensure that the control extends the TreeView control by adding a custom node tag and a highlight color.What should you do?()A、Override the OnPaint method.B、Write a code segment in the DrawNode event handler to specify the highlight color.C、Set the DrawMode property of the control to OwnerDrawAll, and then implement a custom DrawNode event handler.D、Set the DrawMode property of the control to OwnerDrawText,and then implement a custom DrawNode event handler.

Your network contains one Active Directory domain. You have a member server named Server1 that runs Windows Server 2008. The server has the Routing and Remote Acecss role service installed. You implement Network Access Protection (NAP) for the domain. You need to configure the Point-to-Point (PPP) authentication method on Server1. Which autnetication method should you choose?()A、Challenge Handshake Authentication Protocol (CHAP)B、Extensible Authentication Protocol (EAP)C、Microsoft Challenge Handshake Authentication Protocol version 2 (MS-CHAP v2)D、Password Authentication Protocol (PAP)

You are developing a Web application to display products. Products are displayed on different pages on your Web site. You want to create a user control to manage the display of products. You need a default visual implementation of the UI of the user control. In addition, you need to provide developers with the flexibility to change the layout and controls of the UI. Which three actions should you perform? ()A、Apply the TemplateContainerAttribute to a property of type ITemplate. Pass the type of the template's naming container as the argument to the attribute.B、Apply the TemplateContainerAttribute to the user control's class declaration.C、Implement a property of type INamingContainer in the user control's code-behind class.D、Implement a property of type ITemplate in the user control's code-behind class.E、Define a new class that inherits from the ITemplate interface. Implement the InstantiateIn method of the ITemplate interface.

You are developing a custom-collection class.You need to create a method in your class. You need to ensure that the method you create in your class returns a type that is compatible with the Foreach statement. Which criterion should the method meet?()A、The method must return a type of either IEnumerator or IEnumerable.B、The method must return a type of IComparable.C、The method must explicitly contain a collection.D、The method must be the only iterator in the class.

You need to recommend changes to the infrastructure to ensure that DFS meets the company’s  security requirements.   What should you include in the recommendation?()A、Upgrade DFS2 to Windows Server 2008 R2.B、Implement access-based enumeration (ABE).C、Implement Authentication Mechanism Assurance.D、Configure the DFS namespace to use Windows Server 2008 mode.

Your company has an Active Directory Domain Serv ices (AD DS) domain. All client computers run Windows 7. You have a Remote Desktop Session Host (RD Session Host) server. You need to ensure that computer identities are validated before user authentication is performed. What should you do?()A、Configure the Set RD Gateway authentication method Group Policy setting to Use smart card.B、Configure the Set RD Gateway authentication method Group Policy setting to Use locally logged - on credentials.C、Enable the Configure server authentication for client Group Poli cy setting and then select Do not connect if authentication fails.D、Enable the Configure server authentication for client Group Policy setting and then select Always connect, even if authentication fails.

Your company has deployed Network Access Protection (NAP).You configure secure wireless access to the network by using 802.1X authentication from any access point. You need to ensure that all client computers that access the network are evaluated by NAP.  What should you do?()A、Configure all access points as RADIUS clients to the Remediation Servers.B、Configure all access points as RADIUS clients to the Network Policy Server (NPS).C、Create a Network Policy that defines Remote Access Server as a network connection method.D、Create a Network Policy that specifies EAP-TLS as the only available authentication method.

All servers on your network run Windows Server 2008 R2. You deploy Remote Desktop Services  (RDS).You are configuring the Remote Desktop Session Host (RD Session Host) role service. You need to ensure that authentication occurs before the Remote Desktop Connection logon screen appears. What should you do?()A、In the RD Session Host Configuration tool, select the Allow connections only from computers running Remote Desktop with Network Level Authentication option.B、In the RD Session Host Configuration tool, select the Allow connections from computers running any version of Remote Desktop option.C、In the Group Policy Object Editor, configure the Set TS Gateway authentication method setting to Use smart card.D、In the Group Policy Object Editor, configure the Set TS Gateway authentication method setting to Use locally logged-on credentials.

You need to recommend a strategy to ensure that the administration of AD LDS is encrypted.  What should you include in the recommendation?()A、a server authentication certificateB、client authentication certificatesC、Digest authenticationD、Windows Integrated authentication

You have an Exchange Server 2007 organization.  All users connect to mailboxes by using Microsoft Office Outlook 2003. You plan to transition the organization to Exchange Server 2010.  You need to recommend a solution for mailbox access that meets the following requirements:.Minimize support costs.Minimize software costs .Provide access to Public Folders What should you recommend?()A、Implement POP3 and IMAP4 access.B、Implement Personal Archives and forms-based authentication.C、Implement Autodiscover and upgrade all client computers to Outlook 2010.D、Implement Outlook Anywhere and modify the Outlook RPC encryption settings.

Your network contains one Active Directory domain. You have a member server named Server1 that runs Windows Server 2008 R2. The server has the Routing and Remote Access Services role service installed.You implement Network Access Protection (NAP) for the domain.You need to configure the Point-to-Point Protocol (PPP) authentication method on Server1. Which authentication method should you use?()A、Challenge Handshake Authentication Protocol (CHAP)B、Extensible Authentication Protocol (EAP)C、Microsoft Challenge Handshake Authentication Protocol version 2 (MS-CHAP v2)D、Password Authentication Protocol (PAP)

You have a self-hosted Windows Communication Foundation (WCF) service. You need to configure the service to provide an X509 certificate during authentication. What should you use to configure the service?()A、the Certificate property of the X509 Certificate lnitiator Service Credential classB、the SetCertificate method of the X509 Certificate Initiator Service Credential classC、the SetCertificate method of the X509 Certificate Recipient Service Credential classD、the TrustedStoreLocation property of the X509 Certificate Recipient Service Credential class

You need to recommend a security strategy for WebApp2 that meets the company’s applicaton  requirements.What should you include in the recommendation?()A、Basic authentication and connection security rulesB、Basic authentication and SSLC、Digest authentication and connection security rulesD、Digest authentication and SSL

You need to design a method of communication between the IT and HR departments. Your solution must meet business requirements. What should you do?()A、Design a custom IPSec policy to implement Encapsulating Security Payload (ESP) for all IP traffic Design the IPSec policy to use certificate-based authentication between the two departments’ computersB、Design a customer IPSec policy to implement Authentication Header (AH) for all IP traffic. Desing the IPSec policy to use preshared key authentication between the two departments’ computersC、Design a customer IPSec policy to implement Encapsulating Payload (ESP) for all IP traffic. Desing the IPSec policy to use preshared key authentication between the two departments’ computersD、Design a customer IPSec policy to implement Authentication Header (AH) for all IP traffic. Desing the IPSec policy to use certificate-based authentication between the two departments’ computers

单选题You need to implement an authentication method on SQL4. The TravelOnline database will be accessed through a Web services application. You need to make the authentication method as secure as possible.What should you do?()ACreate an HTTP endpoint with NTLM authentication, and create a service principal name (SPN).BCreate an HTTP endpoint with digest authentication, and create a service principal name (SPN).CCreate an HTTP endpoint with integrated authentication, and create a service principal name (SPN).DCreate an HTTP endpoint with Kerberos authentication.

单选题Your web application requires the adding and deleting of many session attributes during a complex usecase. A bug report has come in that indicates that an important session attribute is being deleted too soonand a NullPointerException is being thrown several interactions after the fact. You have decided to create asession event listener that will log when attributes are being deleted so you can track down when theattribute is erroneously being deleted. Which listener class will accomplish this debugging goal?()ACreate an HttpSessionAttributeListener class and implement the attributeDeleted method and log the attribute name using the getName method on the event object.BCreate an HttpSessionAttributeListener class and implement the attributeRemoved method and log the attribute name using the getName method on the event object.CCreate an SessionAttributeListener class and implement the attributeRemoved method and log the attribute name using the getAttributeName method on the event object.DCreate an SessionAttributeListener class and implement the attributeDeleted method and log the attribute name using the getAttributeName method on the event object.

单选题In your web application,you need to execute a block of code whenever the session object is first created. Which design will accomplish this goal?()ACreate an HttpSessionListener class and implement the sessionInitialized method with that block ofcode.BCreate an HttpSessionActivationListener class and implement the sessionCreated method with thatblock of code.CCreate a Filter class, call the getSession(false) method, and if the result was null, then execute that block of code.DCreate an HttpSessionListener class and implement the sessionCreated method with that block of code.

单选题You are creating a Windows Communication Foundation (WCF) service that implements operations in a RESTful manner.You need to add a delete operation. You implement the delete method as follows. string void DeleteItems(string id);You need to configure WCF to call this method when the client calls the service with the HTTP DELETE operation. What should you do?()A Add the WebInvoke(UriTemplate = /Items/{id},Method=DELETE) attribute to the operation.B Add the HttpDelete attribute to the operation.C Replace the string parameter with a RemovedActivityAction parameter.D Replace the return type with RemovedActivityAction.

单选题You are creating a Windows Communication Foundation (WCF) service that implements operations in a RESTful manner. You need to add a delete operation. You implement the delete method as follows:void DeleteItems(string id);You need to configure WCF to call this method when the client calls the service with the HTTP DELETE operation. What should you do?()AAdd the WebInvoke(UriTemplate=/Items/{id}, Method=DELETE) attribute to the operationBAdd the HttpDelete atribute to the operationCReplace the string parameter with a RemovedActivityAction parameterDReplace the return type with RemovedActivityAction.

单选题You need to recommend a strategy to ensure that the administration of AD LDS is encrypted.  What should you include in the recommendation?()Aa server authentication certificateBclient authentication certificatesCDigest authenticationDWindows Integrated authentication

单选题You are developing an ASP.NET Dynamic Data Web application. Boolean fields must display as Yes or No instead of as a check box. You replace the markup in the default Boolean field template with the following markup.You need to implement the code that displays Yes or No. Which method of the FieldTemplateUserControl class should you override in the BooleanField class?()AOnLoadBConstructCOnDataBindingDSaveControlState

单选题Your company has deployed network access protection (NAP). You configure secure wireless access to the network by using 802.1x authentication from any access point. You need to ensure that all client computers that access the network are evaluated by NAP what should you do?()AConfigure all access points as RADIUS clients to the remediation servers.BConfigure all access points as RADIUS clients to the network Policy Server (NPS).CCreate a network policy that defines remote access server as a network connection method.DCreate a network policy that specifies EAP-TLS as the only available authentication method.

单选题How do you define the authentication method that will be used with AAA?()AWith the method aaa commandBWith the method commandCWith a method listDWith a method statement

单选题You are developing a custom-collection class.You need to create a method in your class. You need to ensure that the method you create in your class returns a type that is compatible with the Foreach statement. Which criterion should the method meet?()AThe method must return a type of either IEnumerator or IEnumerable.BThe method must return a type of IComparable.CThe method must explicitly contain a collection.DThe method must be the only iterator in the class.