单选题Your company hosts web services in the company intranet.  The intranet is secured by a firewall.   Devices outside the firewall must be able to access the web services.  Company policies prohibit changes to firewall rules.  You need to recommend an approach for enabling inbound communication.  What should you recommend?()A Use Windows Server AppFabric.B Use the Windows Azure AppFabric Service Bus.C Use the Windows Azure AppFabric Access Control Service.D Use a Windows Communication Foundation (WCF) service in a Windows Azure role that relays to the internal web service

单选题
Your company hosts web services in the company intranet.  The intranet is secured by a firewall.   Devices outside the firewall must be able to access the web services.  Company policies prohibit changes to firewall rules.  You need to recommend an approach for enabling inbound communication.  What should you recommend?()
A

 Use Windows Server AppFabric.

B

 Use the Windows Azure AppFabric Service Bus.

C

 Use the Windows Azure AppFabric Access Control Service.

D

 Use a Windows Communication Foundation (WCF) service in a Windows Azure role that relays to the internal web service


参考解析

解析: 暂无解析

相关考题:

Are you responsible for the maintenance of surveillance cameras within one year?A.Yes. Our company promises to provide free serviceB.Yes. Our company promises to provide post-sale services.C.Yes. Our company promises to provide good post-sale services.D.No. Our company doesn’t promise to provide post-sale services.

What other services does your company provide in addition to dispatching securities?A.Our company can also provide escort serviceB.Our company can also provide patrolling serviceC.Our company can also provide investigation on the sceneD.Our company can also provide security techniques and equipment.

You create a Web application for your company‘s intranet. You want to enable users to customize their versions of the intranet home page. You create sections of content as Web Parts. You need to ensure that users can customize content at any time.Which two code segments should you use?()A.B.C.D.

Your Web site uses custom Themes. Your Web site must support additional Themes based on the user‘s company name. The company name is set when a user logs on to the Web site. The company‘s Theme name is stored in a variable named ThemeName. You need to use this variable to dynamically set the Web site‘s Theme.What should you do?()A.B.C.D.

Which of the following business scenarios is the LEAST appropriate for Web services?()A、 Expanding the reach of your company information.B、 Providing transactional services such as credit card payment processing.C、 Making existing services available to a business process to orchestrate services.D、 Enabling interoperability between heterogeneous services to create time-critical solutions.

You work as the IT professional in an international company which is named Wiikigo. You are experiencedin implementing and administering a network operating system. You are specialized in deploying servers,configuring Windows Server 2008 Terminal services and network application services, and configuring aweb services infrastructure. A Windows Server 2008 server is contained by your company and the WebServer (IIS) server role is installed on the server. A Web site is included by the server. Since you are thetechnical report, you are required to encrypt the cookies sent from the Web site on users computers. Which Web site feature should be configured to achieve the goal?()A、To achieve the goal, Authorization Rules should be configured.B、To achieve the goal, Pages And Controls should be configured.C、To achieve the goal, SSL Settings should be configured.D、To achieve the goal, Machine Key should be configured.

You have an Exchange Server 2010 organization.  Your company has a relationship with another company.  The partner company has an Exchange Server 2010 organization.  You need to recommend a security solution to meet the following requirements:  .Ensure that all e-mail delivery between your servers and the partner companys servers is encrypted .Ensure that all communication between your servers and the partner companys servers is authenticated What should you include in the solution?()A、Active Directory Rights Management Services (AD RMS)B、Domain SecurityC、Forms-based AuthenticationD、Secure/Multipurpose Internet Mail Extensions (S/MIME)

Your company runs Remote Desktop Services. You have a Remote Desktop Web Access (RD Web Access) server. You publish several applications on the internal networ k by using RD Web Access. You need to ensure that the published applications are accessible from the Internet via an HTTPS connection over port 443. What should you do first?()A、Use Internet Information Services (IIS) Manager to disable Forms Authentication .B、Use Internet Information Services (IIS) Manager to enable Windows Authentication.C、Install and configure the Remote Desktop Gateway (RD Gateway) role service on the RD Web Access server.D、Install and configure the Remote Desktop Connection Broker (RD Connection Broker) role service on the RD Web Access server.

Your network contains an Active Directory domain named contoso.com. The domain contains a   server named Server1. The Active Directory Federation Services (AD FS) role is installed on Server1. Contoso.com is defined as an account store.   A partner company has a Web-based application that uses AD FS authentication. The partner company  plans to provide users from contoso.com access to the Web application.   You need to configure AD FS on contoso.com to allow contoso.com users to be authenticated by the   partner company.   What should you create on Server1()A、a new applicationB、a resource partnerC、an account partnerD、an organization claim

ou work in a company which uses SQL Server 2008. You are the administrator of the company database. Now you are in charge of a SQL Server 2008 instance. According to the company requirement, you intend to perform an installation of an instance of SQL Server Reporting Services (SSRS) to the same machine. Now your company CIO wants version histories of all deployed reports can be kept. As a technical support, what should you do to ensure this?()A、You should use the http.sys listener to install the SSRS instance. B、You should configure the SSRS database, make it use Native mode C、You should configure the SSRS database, make it use SharePoint integrated mode D、You should use the Internet Information Services default Web site to install the SSRS instance

You work as the IT professional in an international company which is named Wiikigo. You are experiencedin implementing and administering a network operating system. You are specialized in deploying servers,configuring Windows Server 2008 Terminal services and network application services, and configuring aweb services infrastructure. You are in charge of a member server that runs Windows Server 2008. Themember server has the Web Server (IIS) server role installed. The server hosts a Web site that is onlyaccessible to the executives of your company. According to the requirement of the company policy, theexecutives must use user certificates to access the confidential Web content. You have to make sure thatthe executives can only access the secure Web site by using their installed certificates. What action shouldyou perform to make sure of this?()A、A Certificate Trust list should be configured to include the executives certification authority (CA)certificate.B、The SSL settings should be configured to Require 128-bit SSL on the confidential Web site.C、The Client Certificates settings should be configured to Accept on the SSL settings for the confidentialWeb site.D、The Client Certificates settings should be configured to Require on the SSL settings for the confidentialWeb site.

Your company has an Active Directory domain. The company has a server named Server1 that has the Terminal Services role and the Terminal Services Web Access role installed. The company has a server named Server2 that runs ISA Server 2006.  The company deploys the Terminal Services Gateway (TS Gateway) role on a new server named Server3. The company wants to use ISA as the SSL endpoint for Terminal Server connections. You need to configure the TS Gateway role on Server3 to use ISA 2006 on Server2. What should you do?()A、Configure the TS Gateway to use SSL HTTPS-HTTP bridging.B、Configure the Terminal Services Connection Authorization Policy Store on Server3 to use Server2 as the Central Network Policy Server.C、Export the SSL certificate from Server2 and install the SSL certificate on Server3. Configure the TS Gateway to use the SSL certificate from Server2.D、Export a self-signed SSL certificate from Server3 and install the SSL certificate on Server2. Configure the ISA service on Server2 to use the SSL certificate from Server3.

单选题Your company has an Active Directory forest. The company has servers that run Windows Server 2008 amd client computers that run Windows Vista. The domain uses a set of GPO administrative templates that have been approved to support regulatory compliance requirements. Your partner company has an Active Directory forest that contains a single domain, The company has servers that run Windows Server 2008 and client computers that run Windows Vista. You need to configure your partner company’s domain to use the approved set of administrative templates. What should you do()AUse the Group Policy Management Console (GPMC) utility to back up the GPO to a file. In each site, import the GPO to the default domain policy.BCopy the ADMX files from your company’s PDC emulator to the PolicyDefinitions folder on the partner company’s PDC emulatorCCopy the ADML files from your company’s PDC emulator to the PolicyDefinitions folder on the partner company’s PDC emulatorDDownload the conf.adm, system.adm, wuau.adm, and inetres.adm files from the Microsoft Updates Web site. Copy the ADM files to the PolicyDefinitions folder on thr partner company’s emulator.

单选题Your company has an Active Directory domain. The company has a server named Server1 that has the Terminal Services role and the Terminal Services Web Access role installed. All client computers run Windows XP Service Pack 2 (SP2).  You deploy and publish an application named TimeReport on Server1. The Terminal Services Web Access role uses Active Directory Domain Services (AD DS) and Network Level Authentication is enabled.  You need to ensure that the users can launch TimeReport on Server1 from the Terminal Services Web Access Web page. What should you do?()ADisable publishing to AD DS for the TimeReport remote application.BInstall the Remote Desktop Client 6.1 application on the client computers that run Windows XP SP2.CPublish TimeReport on Server1 as a Microsoft Windows Installer package. Distribute the Windows Installer package to the users.DInstall the Terminal Services Gateway (TS Gateway) role on Server1. Reconfigure the TimeReport remote application publishing to reflect the change in the infrastructure.

单选题You work as the IT professional in an international company which is named Wiikigo. You are experiencedin implementing and administering a network operating system. You are specialized in deploying servers,configuring Windows Server 2008 Terminal services and network application services, and configuring aweb services infrastructure. You are in charge of a member server that runs Windows Server 2008. Themember server has the Web Server (IIS) server role installed. The server hosts a Web site that is onlyaccessible to the executives of your company. According to the requirement of the company policy, theexecutives must use user certificates to access the confidential Web content. You have to make sure thatthe executives can only access the secure Web site by using their installed certificates. What action shouldyou perform to make sure of this?()AA Certificate Trust list should be configured to include the executives certification authority (CA)certificate.BThe SSL settings should be configured to Require 128-bit SSL on the confidential Web site.CThe Client Certificates settings should be configured to Accept on the SSL settings for the confidentialWeb site.DThe Client Certificates settings should be configured to Require on the SSL settings for the confidentialWeb site.

单选题Your company runs Windows Server Update Services (WSUS) on a server named Server1. Server1runs Windows Server 2008 R2. Server1 is located on the company intranet. You configure the WSUS Web site to use SSL. You need to configure a Group Policy object (GPO) to specify the intranet update locations. Which URLs should you use?()Ahttp: //SERVER1Bhttp: //SERVER1:8080Chttps: //SERVER1Dhttps: //SERVER1:8080

问答题Practice 11  ● You are the Manager of a small printing company. A new employee, Mark McCabe, is joining your company on 10th May.  ● Write a short memo to your office administrator.  ● Saying who is starting work and when;  ● Telling him what Mark McCabe’s desk should be put;  ● Suggesting where Mark McCabe’s job will be.  ● Write 30—40 words on your answer sheet.

单选题You work as the IT professional in an international company which is named Wiikigo. You are experiencedin implementing and administering a network operating system. You are specialized in deploying servers,configuring Windows Server 2008 Terminal services and network application services, and configuring aweb services infrastructure. A Windows Server 2008 server is contained by your company and the WebServer (IIS) server role is installed on the server. A Web site is included by the server. Since you are thetechnical report, you are required to encrypt the cookies sent from the Web site on users computers. Which Web site feature should be configured to achieve the goal?()ATo achieve the goal, Authorization Rules should be configured.BTo achieve the goal, Pages And Controls should be configured.CTo achieve the goal, SSL Settings should be configured.DTo achieve the goal, Machine Key should be configured.

单选题You work as the IT professional in an international company which is named Wiikigo. You are experiencedin implementing and administering a network operating system. You are specialized in deploying servers,configuring Windows Server 2008 Terminal services and network application services, and configuring aweb services infrastructure. A Web site is hosted by your company, and the web site is on a server thatruns Windows Server 2008. The Web Server (IIS) server role is installed on the server. The company configures SSL on the Web site for virtual directories which encryption is needed. A new Web application is implemented on the Web site. Its own logon page named userlogin.aspx is contained by the new application. Forms Authentication is enabled in the Web site properties. Since you are the technical support, you are required to configure the Web site so as to authenticate user accounts by utilizing userlogin.aspx. Which action should be performed to achieve the goal?()ATo achieve the goal, the Login URL property for the Forms Authentication Settings should be configured to the userlogin.aspx filename.BTo achieve the goal, the Default Document setting should be configured to add the userlogin.aspx filename in the Web site properties.CTo achieve the goal, the Forms Authentication Settings should be configured to Require SSL.DTo achieve the goal, the Name property of the Cookie Settings should be configured to the userlogin.aspx filename.

单选题Your company has an Active Directory forest. The company has servers that run Windows Server  2008 R2 and client computers that run Windows 7. The domain uses a set of GPO administrative  templates that have been approved to support regulatory compliance requirements.     Your partner company has an Active Directory forest that contains a single domain. The company  has servers that run Windows Server 2008 R2 and client computers that run Windows 7.     You need to configure your partner company’s domain to use the approved set of administrative  templates.   What should you do()AUse the Group Policy Management Console (GPMC) utility to back up the GPO to a file. In each site, import the GPBCopy the ADMX files from your company’s PDC emulator to the PolicyDefinitions folder on the partner company’s PDCCCopy the ADML files from your company’s PDC emulator to the PolicyDefinitions folder on the partner company’s PDC DDownload the conf.adm, system.adm, wuau.adm, and inetres.adm files from the Microsoft Updates Web site.

单选题Which of the following business scenarios is the LEAST appropriate for Web services?()A Expanding the reach of your company information.B Providing transactional services such as credit card payment processing.C Making existing services available to a business process to orchestrate services.D Enabling interoperability between heterogeneous services to create time-critical solutions.

单选题Your company has a new server that runs Windows Server 2008. The Web Server (IIS) role is installed.  Your company hosts a public Web site. You notice unusually high traffic volume on the Web site. You need to identify the source of the traffic. What should you do?()AEnable the Web scripting option.BRun the netstat Can command on the server.CCreate a custom view in Event Viewer to filter information from the security log.DEnable Web site logging in the IIS Server Manager and filter the logs for the source IP address.

多选题You work as the IT professional in an international company which is named Wiikigo. You are experiencedin implementing and administering a network operating system. You are specialized in deploying servers,configuring Windows Server 2008 Terminal services and network application services, and configuring aweb services infrastructure. There is a server that runs Windows Server 2008 in your company. The serverhas the Web Server (IIS) server role installed. Now you receive an order from the company management.You are asked to activate SSL for the default Web site. What should you do?()AUse the IIS Manager console to add bindings for the HTTPS protocol to the default Web site.BYou should use the IIS Manager console to obtain and import a server certificate.CUse the Server Manager console to perform the installation of the Digest Authentication component forthe Web server role.DYou should choose the Generate Key option in the Machine Key dialog box for the default Web site.

多选题You work as the IT professional in an international company which is named Wiikigo. You are experiencedin implementing and administering a network operating system. You are specialized in deploying servers,configuring Windows Server 2008 Terminal services and network application services,and configuring aweb services infrastructure. Your company has a Network Load Balancing cluster named nlb.wiikigo.com.The cluster hosts are named WEB1 and WEB2. The cluster is configured with a single port rule that evenlydistributes HTTP traffic between both hosts. WEB2 needs to be configured to handle all HTTPS traffic fornlb.wiikigo.com. You must retain the even distribution of HTTP traffic between WEB1 and WEB2. What should you do to achieve this?()AIn the properties for the cluster, create a new port rule for port TCP 443 that has the Filtering modeoption set to Single host.BIn the properties for WEB2, the Handling priority option for the TCP 443 port rule should be changed tothe value of 1.CIn the properties for WEB1, the Handling priority option for the TCP 443 port rule should be changed tothe value of 0.DIn the properties for the cluster, create a new port rule for port TCP 443 that has the Filtering modeoption set to Multiple host and the Affinity option set to the value of Single.

单选题Your network contains an Active Directory domain named contoso.com. The domain contains a  server named Server1. The Active Directory Federation Services (AD FS) role is installed on  Server1.     Contoso.com is defined as an account store.  A partner company has a Web-based application that uses AD FS authentication. The partner  company plans to provide users from contoso.com access to the Web application. You need to  configure AD FS on contoso.com to allow contoso.com users to be authenticated by the partner  company.     What should you create on Server1()Aa new applicationBa resource partnerCan account partnerDan organization claim

问答题Practice 2  ● Recently your company is planning to bid for hosting an exhibition and now the manager of your company has asked you to write a letter to the organizing committee to introduce your company to them.  ● Write a letter to introduce the details about your company.  ● introducing the department structure and service,  ● introducing previous exhibitions you have hosted,  ● expressing your confidence in the success if you are permitted to host it.