You manage a server that runs Windows Server 2008. The server has the Web Server (IIS) role installed. The server hosts an Internet-accessible Web site that has a virtual directory named /orders/. A Web server certificate is installed and an SSL listener has been configured for the Web site. The /orders/ virtual directory must meet the following company policy requirements: Be accessible to authenticated users only. Allow authentication types to support all browsers. Encrypt all authentication traffic by using HTTPS.  All other directories of the Web site must be accessible to anonymous users and be available withoutSSL.  You need to configure the /orders/ virtual directory to meet the company policy requirements.  Which two actions should you perform?()A、Configure the Web site to the Require SSL setting.B、Configure the /orders/ virtual directory to the Require SSL setting.C、Configure the Digest Authentication setting to Enabled for the /orders/ virtual directory.D、Configure the Basic Authentication setting to Enabled and the Anonymous Authentication setting to Disabled for the Web site.E、Configure the Basic Authentication setting to Enabled and the Anonymous Authentication setting to Disabled for the /orders/ virtual directory.

You manage a server that runs Windows Server 2008. The server has the Web Server (IIS) role installed. The server hosts an Internet-accessible Web site that has a virtual directory named /orders/. A Web server certificate is installed and an SSL listener has been configured for the Web site. The /orders/ virtual directory must meet the following company policy requirements: Be accessible to authenticated users only. Allow authentication types to support all browsers. Encrypt all authentication traffic by using HTTPS.  All other directories of the Web site must be accessible to anonymous users and be available withoutSSL.  You need to configure the /orders/ virtual directory to meet the company policy requirements.  Which two actions should you perform?()

  • A、Configure the Web site to the Require SSL setting.
  • B、Configure the /orders/ virtual directory to the Require SSL setting.
  • C、Configure the Digest Authentication setting to Enabled for the /orders/ virtual directory.
  • D、Configure the Basic Authentication setting to Enabled and the Anonymous Authentication setting to Disabled for the Web site.
  • E、Configure the Basic Authentication setting to Enabled and the Anonymous Authentication setting to Disabled for the /orders/ virtual directory.

相关考题:

As space of our office is limited Is it possible to pile cartons here?A.No. Something more important is expected to be put here So, you’ve got to find somewhere to pile cartons.B.No. This place is not vacant. You mustn’t pile anything hereC.No. This is an emergency exit. You mustn’t pile anything hereD.Maybe you can. If you manage to persuade them to let you pile cartons, you can do that.

N-连接型糖蛋白的糖基化位点是( )A、Asp-X-Ser/ThrB、Ala-X-Ser/ThrC、Asn-X-Ser/ThrD、Arg-X-Ser/ThrE、Gln-X-Ser/Thr

I really appreciate ()to help me,but I am sure that I will be able to manage by myself.A、you to offerB、your offeringC、that you offer

Could I help you with the heavy box? You look so-fired.()I can manage it.A. No, thanks.B. Yes, please.C. All right.

Paul: Can I help with your luggage?Lisa:______.A、No, many thanks. I can doB、No, thanks. I can manage itC、No, not necessary. Thank you anywayD、No, you needn't. Thank you anyway

Jackson: What's there to do at night?Clerk: There are clubs, concerts, plays, and so on._______!A、You make itB、You name itC、You find itD、You manage it

A: Let me help you with that. B: That's all right. I can manage.() 此题为判断题(对,错)。

You would be using mainly English in this job. Can you manage English conversation?

Don′t ___________ more responsibilities than you can manage.A.turnB.bringC.workD.take

You have been assigned to manage a set of databases. The previous DBA did not leave you notes regarding the structure of each of the databases. While analyzing an instance, you notice that the system identifier (SID) for the instance is set to ’+ASM’. What is the purpose of this instance?()A、 This instance is being used to manage the operating system files.B、 This instance is being used to manage the files of other databases.C、 This instance is being used to manage the instances of other databases.D、 This instance is being used to manage the background processes of other instances.

下列哪种情况最可能形成α-螺旋?()A、polyProB、Ala–Val–Ala–Val–Ala–ValC、polyGlyD、Gly–Ser–Gly–Ser–Gly–Ser

You have a Windows Server 2008 R2 Enterprise Root certification authority (CA). You need to  grant members of the Account Operators group the ability to only manage Basic EFS certificates.     You grant the Account Operators group the Issue and Manage Certificates permission on the CA .   Which three tasks should you perform next()A、Enable the Restrict Enrollment Agents option on the CA .B、Enable the Restrict Certificate Managers option on the CA .C、Add the Basic EFS certificate template for the Account Operators group.D、Grant the Account Operators group the Manage CA permission on the CA .E、Remove all unnecessary certificate templates that are assigned to the Account Operators group.

You work as a network Exchange administrator at Company.com.Company.com has its headquarters located in Miami and branch office located in Toronto.The Company.com network currently consists of a single Active Directory forest containing a single domain named Company.com.The Company.com organization makes use of Microsoft Exchange Server 2010 as their messaging solution.Company.com has recently made the Toronto office administrators members of a custom management role group which is configured to allow members to manage recipients.During your routine maintenance you discover that Toronto office administrators are able to manage recipients in both offices.During the course of the business week you receive instruction from Company.com to ensure that the Toronto office administrators are able to manage recipients in the Toronto office only.  What should you do?()A、You should consider having a new linked role group created.You should then have the Toronto office administrators added to the role group.B、You should consider having a new role created.You should then have the management role entries added to the role.C、You should consider having a management scope created and associated to the role group.D、You should consider having a management role assignment policy created and associated to the role group.

You need to design an administrative model that meets the business and technical requirements. What should you do?()A、Assign permissions to manage Mailbox and Exchange Server configuration to the server-admins groupB、Assign permissions to manage Mailbox and Exchange Server configuration to the domain-admins groupC、Assign permissions to manage Mailboxes to the server-admins group. Assign permissions to manage Exchange Servers configuration to the domain-admins groupD、Assign permissions to manage Mailboxes to the domain-admins group. Assign permissions to manage Exchange Servers configuration to the server-admins group

You have a computer that runs Windows XP Professional. You connect one local print device and install a printer. You share the printer. You need to give a user the ability to manage all new print jobs submitted to the printer. Your solution must prevent the user from installing additional local printers. What should you do?()A、In the printer properties, assign the Manage Printers permission to the user.B、In the printer properties, assign the Manage Documents permission to the user.C、From the Local Users and Groups snap-in, add the user to the Power Users group.D、From the Local Users and Groups snap-in, add the user to the Replicators group.

You need to design a remote administration solution for servers on the internal network. Your solution must meet business and security requirements. What should you do?()A、Permit administrators to use an HTTP interface to manage servers remotelyB、Permit only administrators to connect to the servers’ Telnet serviceC、Permit administrators to manage the servers by using Microsoft NetMeetingD、Require administrators to use Remote Desktop for Administration connections to manage the servers

Your company has a main office and a branch office.The branch office administrators are the only members of a custom management role group.The role group is configured to allow members to manage recipients. You notice that the branch office administrators can manage recipients in both offices.You need to ensure that the branch office administrators can manage recipients in the branch office only. What should you do?()A、Create and associate a management scope to the role group.B、Create and associate a management role assignment policy to the role group.C、Create a new linked role group, and then add the branch office administrators to the role group.D、Create a new role, and then add management role entries to the role.

单选题Bob: Can I help with your luggage?  Mary: ______ .ANo, thanks. I can manage it.BNo, Many thanks. I can do.CNo, not necessary. Thank you anyway.DNo, you needn't. Thank you anyway.

单选题Paul: Can I help with your luggage? Lisa:()ANo, many thanks. I can doBNo, thanks. I can manage itCNo, not necessary. Thank you anywayDNo, you needn't. Thank you anyway

单选题A:Can I do anything for you? B:()ANo. You can't do anything for me.BNo,it's alright. I can manage myself.CNever mindDIt's my pleasure

单选题A:Can I do anything for you? B:()ANo. You can't do anything for me.BNo,it's alright. I can manage myself.CNever mindDIt's my pleasure.

单选题You have been assigned to manage a set of databases. The previous DBA did not leave you notes regarding the structure of each of the databases. While analyzing an instance, you notice that the system identifier (SID) for the instance is set to ’+ASM’. What is the purpose of this instance?()A This instance is being used to manage the operating system files.B This instance is being used to manage the files of other databases.C This instance is being used to manage the instances of other databases.D This instance is being used to manage the background processes of other instances.

单选题You and Stephen are the desktop administrators for your company. You install a printer on your Windows XP Professional computer. You share this printer on the company network. You want to ensure that only members of the DTAdmins local group can use this printer, and that only you and Stephen can manage the printer and all print jobs. You also want to ensure that members of the DTAdmins local group can manage only their own print jobs. How should you configure security on this printer?()AGrant Allow - Print permission to the DTAdmins group. Grant Allow - Manage Documents permission to your user account and to Stephen’s user account. BGrant Allow - Print permission to the DTAdmins group. Grant Allow - Manage Documents and Allow - Manage Printers permissions to your user account and to Stephen’s user account. CGrant Allow - Manage Documents permission to the DTAdmins group. Grant Allow - Manage Printers permission to your user account and to Stephen’s user account. DGrant Allow - Print permission to the DTAdmins group. Remove Allow - Manage Documents permission from the Creator Owner group. Grant Allow - Manage Printers permission to your user account and to Stephen’s user account.

单选题You need to recommend a tool to manage the SANs. The tool must support the company’s planned changes and technical requirements. Which tool should you recommend?()ADisk ManagementBShare and Storage ManagementCStorage ExplorerDStorage Manager for SANs

多选题Your company has an Active Directory Domain Services (AD DS) domain. You have a Windows Server 2008 R2 Hyper-V server. You manage the virtual environment by using Microsoft System Center Virtual Machine Manager (VMM) 2008 R2. You need to ensure that a user can create new virtual machines (VMs) on only a specific set of servers . The user must not be able to see or manage servers outside of that set within VMM . Which two actions should you perform?()ACreate a host group. Add the host servers that the user will manage to the host group.BCreate a failover cluster. Join the host servers that the user will manage to the failover cluster.CUsing Authorization Manager, assign the user to a role with the necessary permission to manage the servers by using VMM.DUsing Authorization Manager, assign the user to a role with the necessary permission to manage the servers by using the VMM Self-Service Portal.

单选题You manage a domain controller that runs Windows Server 2008 R2 and the DNS Server server role.The DNS server hosts an Active Directory-integrated zone for your domain.You need to provide a user with the ability to manage records in the zone. The user must not be able to modify the DNS server settings.What should you do?()AAdd the user to the DNSUpdateProxy Global security group.BAdd the user to the DNSAdmins Domain Local security group.CGrant the user permissions on the zone.DGrant the user permissions on the DNS server.

单选题You have an enterprise subordinate certification authority (CA). You have a group named  Group1.     You need to allow members of Group1 to publish new certificate revocation lists. Members of  Group1 must not be allowed to revoke certificates.     What should you do()AAdd Group1 to the local Administrators group.BAdd Group1 to the Certificate Publishers group.CAssign the Manage CA permission to Group1.DAssign the Issue and Manage Certificates permission to Group1.

单选题N-连接型糖蛋白的糖基化位点是()AAsp-X-Ser/ThrBAla-X-Ser/ThrCAsn-X-Ser/ThrDArg-X-Ser/ThrEGln-X-Ser/Thr