You are creating a Windows Communication Foundation (WCF) service based on WSHttpBinding. New audit requirements dictate that callers must be authenticated on every call to ensure that their credentials have not been revoked.You need to ensure that the service will not cache the security request token. What should you do?()A、Apply a ServiceBehavior attribute to the service implementation class with the lnstanceContextMode property set to Single.B、In the message security configuration, change clientCredentialType from lssuedToken to UserNameC、In the message security configuration, set establishSecurityContext to false.D、At the end of every operation, call the SessionStateUtility.RaiseSessionEnd method.
You are creating a Windows Communication Foundation (WCF) service based on WSHttpBinding. New audit requirements dictate that callers must be authenticated on every call to ensure that their credentials have not been revoked.You need to ensure that the service will not cache the security request token. What should you do?()
- A、Apply a ServiceBehavior attribute to the service implementation class with the lnstanceContextMode property set to Single.
- B、In the message security configuration, change clientCredentialType from lssuedToken to UserName
- C、In the message security configuration, set establishSecurityContext to false.
- D、At the end of every operation, call the SessionStateUtility.RaiseSessionEnd method.
相关考题:
You are creating an application that consumes a Windows Communication Foundation (WCF) service. The service implements the IService contract. The client application contains the CallbackHandler class, which implements IServiceCallback.You need to ensure that a client proxy is created that can communicate with the service over a duplex channel.Which code segment should you use?()A.B.C.D.
You are creating a Windows Communication Foundation (WCF) service. You need to ensure that the service is compatible with ASP.NET to make use of the session state. Which binding should you use?() A. NetTcpContextBindingB. BasicHttpContextBindingC. NetTcpBindingD. NetMsmqBinding
You are creating a Windows Communication Foundation (WCF) service that implements operations in a RESTful manner. You need to add a delete operation. You implement the delete method as follows:void DeleteItems(string id);You need to configure WCF to call this method when the client calls the service with the HTTP DELETE operation. What should you do?()A. Add the WebInvoke(UriTemplate=/Items/{id}, Method=DELETE) attribute to the operationB. Add the HttpDelete atribute to the operationC. Replace the string parameter with a RemovedActivityAction parameterD. Replace the return type with RemovedActivityAction.
You work as an administrator at ABC.com.The ABC.com network consists of a single domain named ABC.com. All servers on the ABC.com network have Windows Server 2012 R2 installed. ABC.com has a server, named ABC-SR13, which is configured as the primary DNS server in the ABC.com domain. ABC.com has another server, named ABC-SR14, which makes use of ABCSR13 for DNS queries.You want to make sure that running nslookup.exe from ABC-SR14 produces a result that shows the proper name of the default server. Which of the following actions should you take?()A、You should consider creating a reverse lookup zone on ABC-SR14.B、You should consider creating a forward lookup zone on ABC-SR14.C、You should consider creating a reverse lookup zone on ABC-SR13.D、You should consider creating a forward lookup zone on ABC-SR13.
You are employed as the exchange administrator at Company.com.the Company.com network contains an exchange 2010 organization.you are responsible for managing an exchange server 2010 mailbox server named -ex01.You are in the process of implementing a policy that deletes e-mail messages automatically after 60 days.You receive an instruction from management to identify another location where users can store their messages after 60 days.However, administrators need to locate the e-mail messages in both locations when executing multi- mailbox searches. What should you do?()A、You should consider creating a Retention Policy.B、You should consider creating a.pst file for each user that is stored in a shared folder.C、You should consider creating a Personal Archive for each user.D、You should consider creating a journal rule.
You work as an administrator at ABC.com. The ABC.com network consists of two Active Directory forests, named ABC.com and test.com. There is no trust relationship configured between the forests.A backup of Group Policy object (GPO) from the test.com domain is stored on a domain controller in the ABC.com domain. You are informed that a GPO must be created in the ABC.com domain, and must be based on the settings of the GPO in the test.com domain. You start by creating the new GPO using the New-GPO Windows PowerShell cmdlet.You want to complete the task via a Windows PowerShell cmdlet. Which of the following actions should you take?()A、You should consider making use of the Invoke-GPUpdate Windows PowerShell cmdlet.B、You should consider making use of the Copy-GPO Windows PowerShell cmdlet.C、You should consider making use of the New-GPLink Windows PowerShell cmdlet.D、You should consider making use of the Import-GPO Windows PowerShell cmdlet.
You have an Active Directory Domain Services (AD DS) domain. All servers run Windows Server 2008 R2. The Remote Desktop Services (RDS) environment includes a Remote Desktop Session Host (RD Session Host) server in the LAN environment, and a Remote Desktop Gateway (RD Gateway) server in the perimeter network. You deploy a Remote Desktop Web Access (RD Web Access) server in the perimeter network. You publish a RemoteApp application. The RemoteApp application is not visible to users when they log in to RD Web Access.You need to ensure that authorized users can run RemoteApp applications from RD Web Access. What should you do?()A、Restart the World Wide Web Publishing Service on the RD Web Access server.B、Disab le Forms Authentication on the Default Web Site on the RD Web Access server.C、Allow Windows Management Instrumentation (WMI) communication between the RD Gateway server and the RD Session Host server.D、Allow Windows Management Instrumentation (WMI) commu nication between the RD Web Access server and the RD Session Host server.
You are creating a Windows Forms application by using the .NET Framework 3.5.You have resource files in five different languages.You need to test the application in each language. What should you do?()A、Set the CurrentCulture property explicitly to the respective culture for each language.B、Set the CurrentCulture property explicitly to IsNeutralCulture for each language.C、Set the CurrentUICulture property explicitly to IsNeutralCulture for each language.D、Set the CurrentUICulture property explicitly to the respective culture for each language.
You are designing a Windows Azure application that will use a worker role. The worker role will create temporary files. You need to recommend an approach for creating the temporary files that minimizes storage transactions. What should you recommend?()A、 Create the files on a Windows Azure Drive.B、 Create the files in Windows Azure local storage.C、 Create the files in Windows Azure Storage page blobs.D、 Create the files in Windows Azure Storage block blobs.
You are creating a Windows Forms application by using the .Net Framework 3.5.You plan to display detailed help instructions for each control in the form.You create a help file.You configure a HelpProvider component on the form.You need to display the help file for the control that is focused when the F1 key is pressed.Which method of the HelpProvider class should you call for each control?()A、SetShowHelpB、SetHelpStringC、SetHelpKeywordD、SetHelpNavigator
You are creating a Windows Forms application by using the .NET Framework 3.5 The application is used by a financial service provider.You discover that the service provider transfers large amounts of data by using XML.You need to read and validate the XMLdocuments in the most time efficient manner.Which technology should you use?()A、The XmlReader classB、The XmlDocument classC、The XmlResolver classD、The LINQ to XML method
You work as a network Exchange administrator at Company.com.The Company.com network currently consists of a single Active Directory forest containing a single domain named Company.com.The Company.com organization makes use of Microsoft Exchange Server 2010 as their messaging solution.During the course of the week you receive an instruction from the CIO to stop internal users from sending e-mail messages containing the words "Classified Data" to users outside the organization. What should you do?()A、You should consider creating a message classification.B、You should consider creating a Transport rule.C、You should consider creating a Send connector.D、You should consider creating a managed folder mailbox policy.
You are creating a Windows Communication Foundation (WCF) service. You have the following requirements: Messages must be sent over TCP The service must support transactions. Messages must be encoded using a binary encoding Messages must be secured using Windows stream-based security.You need to implement a custom binding for the service. In which order should the binding stack be configured?()A、tcp Transport, windows Stream Security, transaction Flow, binary Message EncodingB、transaction Flow, binary Message Encoding, windows Stream Security, tcp TransportC、windows Stream Security, tcp Transport, binary Message Encoding, transaction FlowD、binary Message Encoding, transaction Flow, tcp Transport, windows Stream Security
You work as the enterprise exchange administrator at Company.com.The Company.com network consists of a single Active Directory domain named Company.com.Company.com has an Exchange Server 2010 organization.You have received instructions from the CIO to support Autodiscover from the Internet by creating a resource record in DNS.What should you do?()A、You should consider creating a Host (A) resource record.B、You should consider creating a Text (TXT) resource record.C、You should consider creating a Pointer (PTR) resource record.D、You should consider creating a Mail exchange (MX) resource record.
You are the administrator of Etechsol.com Enterprises. Your company consists of a small 20-user network. Management has decided to upgrade all computers to Windows 2000. After having a closer examination of your company’s network, you realize that only half of the network interface cards are Net PC compliant. You decide to create Windows 2000 remote boot floppies. What executable is used for creating RIS boot disks for non-PXE compliant clients?()A、RBFG*EXEB、RIPREP*EXEC、RIS*EXED、RISPXE*EXEE、RISBOO*EXE
单选题You work as the enterprise exchange administrator at Company.com.The Company.com network consists of a single Active Directory domain named Company.com.Company.com has an Exchange Server 2010 organization.You have received instructions from the CIO to support Autodiscover from the Internet by creating a resource record in DNS.What should you do?()AYou should consider creating a Host (A) resource record.BYou should consider creating a Text (TXT) resource record.CYou should consider creating a Pointer (PTR) resource record.DYou should consider creating a Mail exchange (MX) resource record.
单选题You work as an administrator at ABC.com. The ABC.com network consists of two Active Directory forests, named ABC.com and test.com. There is no trust relationship configured between the forests.A backup of Group Policy object (GPO) from the test.com domain is stored on a domain controller in the ABC.com domain. You are informed that a GPO must be created in the ABC.com domain, and must be based on the settings of the GPO in the test.com domain. You start by creating the new GPO using the New-GPO Windows PowerShell cmdlet.You want to complete the task via a Windows PowerShell cmdlet. Which of the following actions should you take?()AYou should consider making use of the Invoke-GPUpdate Windows PowerShell cmdlet.BYou should consider making use of the Copy-GPO Windows PowerShell cmdlet.CYou should consider making use of the New-GPLink Windows PowerShell cmdlet.DYou should consider making use of the Import-GPO Windows PowerShell cmdlet.
单选题You are creating a Windows Forms application by using the .NET Framework 3.5.You plan to develop a custom control for the application. The control will be a composite control.Your need to derive from the class that will create the control by using the minimum amount of development effort.What should you do?()ADerive from the Control class.BDerive from the UserControl class.CDerive from the FrameworkElement class.DDerive from the ContainerControl class.
单选题You are creating a Windows Communication Foundation (WCF) service that implements operations in a RESTful manner. You need to add a delete operation. You implement the delete method as follows:void DeleteItems(string id);You need to configure WCF to call this method when the client calls the service with the HTTP DELETE operation. What should you do?()AAdd the WebInvoke(UriTemplate=/Items/{id}, Method=DELETE) attribute to the operationBAdd the HttpDelete atribute to the operationCReplace the string parameter with a RemovedActivityAction parameterDReplace the return type with RemovedActivityAction.
单选题You are creating a Windows Communication Foundation (WCF) service. You have the following requirements: Messages must be sent over TCP The service must support transactions. Messages must be encoded using a binary encoding Messages must be secured using Windows stream-based security.You need to implement a custom binding for the service. In which order should the binding stack be configured?()Atcp Transport, windows Stream Security, transaction Flow, binary Message EncodingBtransaction Flow, binary Message Encoding, windows Stream Security, tcp TransportCwindows Stream Security, tcp Transport, binary Message Encoding, transaction FlowDbinary Message Encoding, transaction Flow, tcp Transport, windows Stream Security
单选题You are a systems administrator responsible for managing a Windows Server 2008 Web server. Recently,your organization set up a new IIS Web site that will be accessed by users outside of your organizations.Consultants should be able to connect to this Web site, using IIS Manager. Your organization’s securitypolicy prevents you from creating domain accounts or local user accounts for these users. You attempt touse the IIS Manager Permissions feature for the Web site. However, when you click Allow User, you areable to select only Windows users. How can you resolve this problem?()AVerify that Management Service has been started.BReconfigure the file system permissions for the root folder of the Web site.CReconfigure Management Service to enable Windows And IIS Manager Credentials.DVerify the Authentication settings for the Web site.
单选题You are creating a Windows Forms Application by using the .NET Framework 3.5.You plan to create a Windows Installer package for a Windows Forms application. The package will be deployed on Windows Vista computers.You need to ensure that during deployment the installation does not elevate privileges of the user installing the application.What should you do?()ACreate a custom action and set the NoImpersonate property to trueBCreate a custom action and set the NoImpersonate property to falseCCreate a manifest and set the RequestedExecutionLevel level attribute to AsInvokerDCreate a manifest and set the RequestedExecutionLevel level attribute to AsAdministrator
单选题You are creating a Windows Communication Foundation (WCF) service. You need to ensure that the service is compatible with ASP.NET to make use of the session state. Which binding should you use?()ANetTcpContextBindingBBasicHttpContextBindingCNetTcpBindingDNetMsmqBinding
单选题You are creating a Windows Forms application by using the .Net Framework 3.5.You plan to design a composite control for the application.You need to derive the control from a base class that supports templates.What should you do?()ADerive from the Control class.BDerive from the UserControl class.CDerive from the ScrollableControl class.DDerive from the ContainerControl class.
单选题You are designing a Windows Azure application that will use a worker role. The worker role will create temporary files. You need to recommend an approach for creating the temporary files that minimizes storage transactions. What should you recommend?()A Create the files on a Windows Azure Drive.B Create the files in Windows Azure local storage.C Create the files in Windows Azure Storage page blobs.D Create the files in Windows Azure Storage block blobs.
单选题You are creating a Windows Forms Application by using the .NET Framework 3.5.You plan to create a Windows Installer package for a Windows Forms application.The package will be deployed on Windows Vista computers.You need to ensure that during deployment the installation does not elevate privileges of the user installing the application.What should you do?()ACreate a custom action and set the NoImpersonate property to trueBCreate a custom action and set the NoImpersonate property to falseCCreate a manifest and set the RequestedExecutionLevel level attribute to AsInvoker.DCreate a manifest and set the RequestedExecutionLevel level attribute to AsAdministrator.
单选题You are creating a Windows Forms application by using the .NET Framework 3.5.You plan to develop a new control for the application. You need to ensure that the control extends the DataGridView control by allowing the cells to contain multicolored text. What should you do?()AOverride the OnPaint method.BWrite a code segment to handle the CellPainting event.CWrite a code segment to handle the CellParsing event.DWrite a code segment to handle the RowPostPaint event.