单选题A developer for the Company.com web site has been told that users may turn off cookie support in their browsers. What must the developer do to ensure that these customers can still use the web application?()A The developer must ensure that every URL is properly encoded using the appropriate URL rewriting APIsB The developer must provide an alternate mechanism for managing sessions and abandon theHttpSession mechanism entirelyC The developer can ignore this issue. Web containers are required to support automatic URL rewriting when cookies are not supportedD The developer must ass the string ?id= to the end of every URL to ensure that the conversion with the browser can continue.

单选题
A developer for the Company.com web site has been told that users may turn off cookie support in their browsers. What must the developer do to ensure that these customers can still use the web application?()
A

 The developer must ensure that every URL is properly encoded using the appropriate URL rewriting APIs

B

 The developer must provide an alternate mechanism for managing sessions and abandon theHttpSession mechanism entirely

C

 The developer can ignore this issue. Web containers are required to support automatic URL rewriting when cookies are not supported

D

 The developer must ass the string ?id= to the end of every URL to ensure that the conversion with the browser can continue.


参考解析

解析: 暂无解析

相关考题:

He told me that he ____ in Naples the previous year.A、has been workingB、has workedC、had been workingD、had been worked

The notice has been told everyone __________ a party will be held in the open air tomorrow.A.whetherB.whenC.whereD.that

The manager __________the workers how to improve the program since 9 a.m.A.has toldB.is tellingC.has been tellingD.will have told

A developer is designing a web application that must verify for each request: The originating request is froma trusted network. The client has a valid session.The client has been authenticated. Which design pattern provides a solution in this situation?()A、Transfer ObjectB、Session FacadeC、Intercepting FilterD、Template MethodE、Model-View-Controller

Your company has an Active Directory domain. All computers are members of the domain. Your networkcontains an internal Web site that uses Integrated Windows Authentication. From a computer that runs Windows 7, you attempt to connect to the Web site and are prompted for authentication. You verify that youruser account has permission to access the Web site. You need to ensure that you are automaticallyauthenticated when you connect to the Web site.  What should you do?()A、Create a complex password for your user account.B、Open Credential Manager and modify your credentials.C、Add the URL of the Web site to the Trusted sites zone.D、Add the URL of the Web site to the Local intranet zone.

The technician has suspicions that a browser has been hijacked. Which of the following should the technician look for in this situation?()A、A new default gateway has been setup.B、A new Internet shortcut has been added.C、A new web browser has been installed and is now the default.D、A proxy server has been enabled.

The fire site has been ()up.A、takenB、putC、cleanedD、kept

A user is browsing to a newly created internal site called www.comptia.org. After putting incredentials the page comes up blank. Which of the following is MOST likely the cause?()A、The user must add the new site to the local log file.B、A proxy exception has not been configured.C、SMTP has not been configured.D、The loopback address has not been configured.

Company.com has a database application and a Web server application running on the same p5-570 server in a single partition. Recently there have been a number of instances where the increased load on the database server has impacted the performance of the Web server. What can the technical specialist recommend to keep the database application from impacting the performance of the Web server?()A、Create a VLAN between the web server and database server.B、Purchase APV and install the VIOS.C、Increase the priority of the Web server.D、Create separate LPARs for Web and database workloads.

The same Web site is visited for the second time using a branch SRX Series Services Gateway configured with SurfControl integrated Web filtering.Which statement is true?()A、The SRX device sends the URL to the SurfControl server in the cloud and the SurfControl server provides the SRX.B、The SRX device sends the URL to the SurfControl server in the cloud and the SurfControl server asks the SRX device previously visited.C、The SRX device looks at its local cache to find the category of the URL.D、The SRX device does not perform any Web filtering operation as the Web site has already been visited.

You copy a Web site from a development site to a staging site. You do not have the Web site in a source control application. Another developer begins to fix bugs on the staging site while the development team adds features on the development site. You need to synchronize the development site and the staging site and copy the latest version of each file to both locations. What should you do? ()A、Use the Copy Web tool.B、Create a Web Setup project.C、Use the Publish Web tool.D、Use the command line to XCOPY the files.

Your company has a server that runs Windows Server 2008. The server has the Web Server (IIS) role installed.  You need to activate SSL for the default Web site.  Which two actions should you perform?()A、Obtain and import a server certificate by using the IIS Manager console.B、Select the Generate Key option in the Machine Key dialog box for the default Web site.C、Add bindings for the HTTPS protocol to the default Web site by using the IIS Manager console.D、Install the Digest Authentication component for the Web server role by using the Server Manager console.

You work as a network administrator for Tailspintoys.com. Your job responsibilities include supporting company servers. The Tailspintoys.com network hosts a Web server that runs on a single server namedWebsrv1. Recently, traffic to the Web site has been increasing, and the performance of the Web serverhas been deteriorating. Traffic to the Web site is expected to continue to increase over the next five toeight years. You want a solution that can solve the performance problems of the Web server and meet theincreasing workload requirements for the Web site for the next five to eight years. What should you do?()A、Migrate the Web site to a more powerful server.B、Use NLB to create a Web farm to support the Web site.C、Use failover clustering to support the Web site with multiple servers in a cluster.D、Add a second Web server, and then use DNS round-robin to distribute Web requests between the twoservers. Add more servers as necessary.

You have a Windows Server 2008 server that has the Web Server (IIS) server role installed. The server contains a Web site.  You need to ensure that the cookies sent from the Web site are encrypted on users computers.  Which Web site feature should you configure?()A、Authorization RulesB、Machine KeyC、Pages And ControlsD、SSL Settings

You are the desktop administrator for your company. Your company’s software developers use Windows XP Professional and IIS on their client computers to develop Web-based applications. All client computers use Microsoft Internet Explorer 6. 0 or later as their Web browser. One of the developers reports that he can no longer access the Web-based application on his desktop by using his Web browser. When you attempt to access the application by using your Web browser, you receive the following error message: “Cannot find server or DNS Error.” You verify that the World Wide Web Publishing Service is started on the developer’s computer. You also verify that you are using the correct URL to access the developer’s computer by using your Web browser. You need to ensure that the developer can access the Web application by using his Web browser. How should you configure the developer’s computer?() A、Start the default Web site.B、Start the IIS Admin Service.C、Run the IPconfig /registerdns command.D、In the default Web site properties,disable the host header setting.

单选题You are the desktop administrator for your company. Your company’s software developers use Windows XP Professional and IIS on their client computers to develop Web-based applications. All client computers use Microsoft Internet Explorer 6. 0 or later as their Web browser. One of the developers reports that he can no longer access the Web-based application on his desktop by using his Web browser. When you attempt to access the application by using your Web browser, you receive the following error message: “Cannot find server or DNS Error.” You verify that the World Wide Web Publishing Service is started on the developer’s computer. You also verify that you are using the correct URL to access the developer’s computer by using your Web browser. You need to ensure that the developer can access the Web application by using his Web browser. How should you configure the developer’s computer?()AStart the default Web site.BStart the IIS Admin Service.CRun the IPconfig /registerdns command.DIn the default Web site properties,disable the host header setting.

单选题A developer is designing a web application that must verify for each request: The originating request is froma trusted network. The client has a valid session.The client has been authenticated. Which design pattern provides a solution in this situation?()ATransfer ObjectBSession FacadeCIntercepting FilterDTemplate MethodEModel-View-Controller

多选题You manage a server that runs Windows Server 2008. The server has the Web Server (IIS) role installed. The server hosts an Internet-accessible Web site that has a virtual directory named /orders/. A Web server certificate is installed and an SSL listener has been configured for the Web site. The /orders/ virtual directory must meet the following company policy requirements: Be accessible to authenticated users only. Allow authentication types to support all browsers. Encrypt all authentication traffic by using HTTPS.  All other directories of the Web site must be accessible to anonymous users and be available withoutSSL.  You need to configure the /orders/ virtual directory to meet the company policy requirements.  Which two actions should you perform?()AConfigure the Web site to the Require SSL setting.BConfigure the /orders/ virtual directory to the Require SSL setting.CConfigure the Digest Authentication setting to Enabled for the /orders/ virtual directory.DConfigure the Basic Authentication setting to Enabled and the Anonymous Authentication setting to Disabled for the Web site.EConfigure the Basic Authentication setting to Enabled and the Anonymous Authentication setting to Disabled for the /orders/ virtual directory.

单选题A user is browsing to a newly created internal site called www.comptia.org. After putting incredentials the page comes up blank. Which of the following is MOST likely the cause?()AThe user must add the new site to the local log file.BA proxy exception has not been configured.CSMTP has not been configured.DThe loopback address has not been configured.

单选题You have a Windows Server 2008 server that has the Web Server (IIS) server role installed. The servercontains a Web site. You need to ensure that the cookies sent from the Web site are encrypted on userscomputers. Which Web site feature should you configure?()AAuthorization RulesBMachine KeyCPages And ControlsDSSL Settings

单选题You are a systems administrator who is attempting to troubleshoot a problem with accessing a Web site ona computer running Windows Server 2008. In the past, users have been able to access the Web site byusing http://hr.contoso.com. However, when they attempt to access the site now, they receive the errormessage "Internet Explorer Cannot Display The Web page." Which of the following steps should you taketo resolve the error?()AUsing Server Manager, add the HTTP Errors server role.BUsing Server Manager, verify that the World Wide Web Publishing Service has been started.CVerify the configuration of the usersWeb browsers.DUsing Server Manager, add the HTTP Logging server role.

单选题You are a systems administrator responsible for managing a Windows Server 2008 Web server. Recently,your organization set up a new IIS Web site that will be accessed by users outside of your organizations.Consultants should be able to connect to this Web site, using IIS Manager. Your organization’s securitypolicy prevents you from creating domain accounts or local user accounts for these users. You attempt touse the IIS Manager Permissions feature for the Web site. However, when you click Allow User, you areable to select only Windows users.  How can you resolve this problem?()AVerify that Management Service has been started.BReconfigure the file system permissions for the root folder of the Web site.CReconfigure Management Service to enable Windows And IIS Manager Credentials.DVerify the Authentication settings for the Web site.

多选题A Company.com developer has created a web application that includes a servlet for each use case in the application. These servlets have become rather difficult to maintain because the request processing methods have become very large. There is also common processing code in many servlets because these use cases are very similar.  Which two design patterns can be used together to refactor and simplify this web application? ()AProxyBView HelperCFront ControllerDSession FaçadeEBusiness DelegateFModel-View-Controller

单选题You are a systems administrator responsible for securing a Windows Server 2008 Web server. You havecreated a new Web site called Contoso Intranet that will contain seven Web applications. One of theapplication developers has told you that her Web application requires a new request handler that isprocessed using a .NET library her team created. How can you meet these requirements while also maximizing security for the server?()AAdd a new managed handler to the Contoso Intranet Web site.BAdd a new managed handler for the specific Web application that requires it.CAdd a new module mapping to the Contoso Intranet Web site.DAdd a new module mapping for the specific Web application that requires it.

单选题The technician has suspicions that a browser has been hijacked. Which of the following should the technician look for in this situation?()AA new default gateway has been setup.BA new Internet shortcut has been added.CA new web browser has been installed and is now the default.DA proxy server has been enabled.

单选题The same Web site is visited for the second time using a branch SRX Series Services Gateway configured with SurfControl integrated Web filtering.Which statement is true?()AThe SRX device sends the URL to the SurfControl server in the cloud and the SurfControl server provides the SRX.BThe SRX device sends the URL to the SurfControl server in the cloud and the SurfControl server asks the SRX device previously visited.CThe SRX device looks at its local cache to find the category of the URL.DThe SRX device does not perform any Web filtering operation as the Web site has already been visited.

单选题The notice has been told everyone _____ a party will be held in the open air tomorrow.AwhetherBwhenCwhereDthat