单选题An enterprise has a web application running both HTTP and HTTPS. How many Clusters must becreated?()A1B2C3D4
单选题
An enterprise has a web application running both HTTP and HTTPS. How many Clusters must becreated?()
A
1
B
2
C
3
D
4
参考解析
解析:
暂无解析
相关考题:
An enterprise has a web application running both HTTP and HTTPS. How many Clusters must becreated?() A.1B.2C.3D.4
How many token buckets are needed to support a multi-actions policer that meters conforming, exceedingand violating traffic?()A、1B、2C、3D、4E、5F、6
How many CallManager clusters can an IPCC Express cluster with High Availability communicate with? ()A、1B、2C、Depends upon the number of agentsD、Depends upon the locations of the CallManager clustersE、Depends upon how many nodes are in the CallManager clusters
A retail customer has a database application that is accessed by a large number of people through a web interface from multiple remote locations. Which questions will provide the information necessary to design the best performing storage solution of the following?()A、How many web servers will be connected to the database?B、How many concurrent applications will run against the database?C、How many concurrent users will be accessing the database?D、What are the types of transactions run against the database?
An enterprise has a web application running both HTTP and HTTPS. How many Clusters must becreated?()A、1B、2C、3D、4
You are a systems administrator troubleshooting a problem with accessing a Web server running WindowsServer 2008. Previously, another administrator created and installed a server certificate on the computer.Users report that they are able to connect to the site using HTTP but that they receive a warning in InternetExplorer when trying to connect by HTTPS. You want to enable users to connect using both HTTP andHTTPS. You attempt to access the site by using an instance of Internet Explorer on the server itself, andyou receive the same warning message for HTTPS connections. How can you resolve this issue?()A、Change the site binding for the Web site to enable connections on port 443.B、Change the SSL settings for the Web site to enable the Require SSL option.C、Obtain and install an Internet Certificate on the Web server.D、Export and re import the existing security certificate.
How many simultaneous Telnet sessions does a Cisco router support by default?()A、1B、2C、3D、4E、5F、6
Which of the following describes how many VRM’s would be required in a system with quad Xeon CPU’s?()A、1B、2C、3D、4
A system has a mirrored data volume group that has a filesystem /data of 10 logical partitions. How many physical partitions will the filesystem have?()A、1B、2C、10D、20
A customer has an LPAR with 4 dedicated cores on a POWER7 server with SMT4 enabled. How many logical processors are presented to an application running on this LPAR?()A、4B、8C、16D、32
A customer has a database application that is accessed by a large number of people through a web interface from multiple remote locations. Which of the following questions will provide the information necessary to design the best performing storage solution?()A、How many web servers will be connected to the database?B、Will the database be run on a Windows solution?C、How many concurrent users will be accessing the database?D、What are the types of transactions run against the database?
A web application uses the HttpSession mechanism to determine if a user is "logged in." When a usersupplies a valid user name and password, an HttpSession is created for that user. The user has access tothe application for only 15 minutes after logging in. The code must determine how long the user has beenlogged in, and if this time is greater than 15 minutes, must destroy the HttpSession. Which method in HttpSession is used to accomplish this?()A、GetcreationtimeB、InvalidateafterC、GetlastaccessedtimeD、Getmaxinactiveinterval
Host A opens a Telnet connection to Host B. Host A then opens another Telnet connection to Host B. These connections are the only communication between Host A and Host B. The security policy configuration permits both connections. How many sessions exist between Host A and Host B?()A、1B、2C、3D、4
How many strict-high priority forwarding classes can be applied to a given interface?()A、1B、2C、3D、4
A metro Ethernet user is connected using a PPP over Ethernet service.How many Layer 2 headers are attached to each IP datagram?()A、1B、2C、3D、4
You are the network administrator for your company. The network consists of a single Active Directory domain. All servers run Windows Server 2003. The network contains a Web server that runs IIS 6.0 and hosts a secure intranet site. All users are required to connect to the intranet site by authenticating and using HTTPS. However, because an automated Web application must connect to the Web site by using HTTP, you cannot configure the intranet site to require HTTPS. You need to collect information about which users are connecting to the Web site by using HTTPS. What should you do?()A、Check the application log on the Web server.B、Use Network Monitor to capture network traffic on the Web server.C、Review the log files created by IIS on the Web server.D、Configure a performance log to capture all Web service counters. Review the performance log data.
You need to recommend a strategy for using managed service accounts on the Web servers.How many managed service accounts should you recommend?()A、1B、2C、3D、5
单选题How many CallManager clusters can an IPCC Express cluster with High Availability communicate with? ()A1B2CDepends upon the number of agentsDDepends upon the locations of the CallManager clustersEDepends upon how many nodes are in the CallManager clusters
单选题An enterprise has a web application running both HTTP and HTTPS. How many Clusters must becreated?()A1B2C3D4
多选题You are a systems administrator responsible for managing a Windows Server 2008 Web Server Currently,there are no Web sites configured on the server. You need to configure the server to host two Web applications: Engineering App and Sales App. Both Web applications must be accessible by using HTTPport 80 without the use of host headers. Also, you must protect against problems in one Web applicationaffecting the performance or reliability of the other Web application. Which two steps should you take tomeet these requirements?()ACreate a single Web site that contains both Web applications.BCreate two Web sites, one for each Web application.CAssign both Web applications to the same application pool.DAssign each Web application to its own application pool.
单选题Company.com has decided to implement virtual hosts in their web server. The current estimate is to create six virtual hosts with unique URL’s and IP addresses. The solution is going to use the IP aliasing faction in HACMP. How many resource groups are required to support this configuration?()A 1B 2C 6D 7
单选题A customer has an LPAR with 4 dedicated cores on a POWER7 server with SMT4 enabled. How many logical processors are presented to an application running on this LPAR?()A4B8C16D32
单选题You are the network administrator for your company. The network consists of a single Active Directory domain. All servers run Windows Server 2003. The network contains a Web server that runs IIS 6.0 and hosts a secure intranet site. All users are required to connect to the intranet site by authenticating and using HTTPS. However, because an automated Web application must connect to the Web site by using HTTP, you cannot configure the intranet site to require HTTPS. You need to collect information about which users are connecting to the Web site by using HTTPS. What should you do?()ACheck the application log on the Web server.BUse Network Monitor to capture network traffic on the Web server.CReview the log files created by IIS on the Web server.DConfigure a performance log to capture all Web service counters. Review the performance log data.
单选题A web application uses the HttpSession mechanism to determine if a user is "logged in." When a usersupplies a valid user name and password, an HttpSession is created for that user. The user has access tothe application for only 15 minutes after logging in. The code must determine how long the user has beenlogged in, and if this time is greater than 15 minutes, must destroy the HttpSession. Which method in HttpSession is used to accomplish this?()AGetcreationtimeBInvalidateafterCGetlastaccessedtimeDGetmaxinactiveinterval
单选题You are a systems administrator troubleshooting a problem with accessing a Web server running WindowsServer 2008. Previously, another administrator created and installed a server certificate on the computer.Users report that they are able to connect to the site using HTTP but that they receive a warning in InternetExplorer when trying to connect by HTTPS. You want to enable users to connect using both HTTP andHTTPS. You attempt to access the site by using an instance of Internet Explorer on the server itself, andyou receive the same warning message for HTTPS connections. How can you resolve this issue?()AChange the site binding for the Web site to enable connections on port 443.BChange the SSL settings for the Web site to enable the Require SSL option.CObtain and install an Internet Certificate on the Web server.DExport and re import the existing security certificate.