You need to reduce the level of access that a malicious Web site might have to your computer.What should you do?() A.AB.BC.CD.D
You need to reduce the level of access that a malicious Web site might have to your computer.What should you do?()
A.A
B.B
C.C
D.D
相关考题:
You create a Web site that is for members only. The Web site allows members to create lists of users that have access to information about member profiles. The name of the list is stored in the listName variable. The user name of the user to whom access is given is stored in the username variable.You need to enable members to manage their lists of users.Which code segment should you use?()A.B.C.D.
Your Web site uses custom Themes. Your Web site must support additional Themes based on the user‘s company name. The company name is set when a user logs on to the Web site. The company‘s Theme name is stored in a variable named ThemeName. You need to use this variable to dynamically set the Web site‘s Theme.What should you do?()A.B.C.D.
You discover audit log entries that report attempts to log on to your computer. You need to be notified of all logon attempts that occur on your computer.What should you do?() A.AB.BC.CD.D
You configure parental controls on your computer for your child‘s user account. Your child logs on with a different account and is able to access inappropriate Web sites. You need to ensure that your child cannot access inapproriate Web sites.What should you do?()A.AB.BC.CD.D
You have a computer that runs Windows Vista.You connect to your company’s network by using a virtual private network (VPN) connection. You notice that when you establish the VPN connection, you are unable to access Internet Web sites. When you disconnect the VPN connection, you can access Internet Web sites.You need to access Internet Web sites while you are connected to the VPN connection.What should you do?()A.AB.BC.CD.D
You need to identify if malware is causing performance issues on your computer.What should you do?() A.AB.BC.CD.D
Your company has an Active Directory domain. All computers are members of the domain. Your networkcontains an internal Web site that uses Integrated Windows Authentication. From a computer that runs Windows 7, you attempt to connect to the Web site and are prompted for authentication. You verify that youruser account has permission to access the Web site. You need to ensure that you are automaticallyauthenticated when you connect to the Web site. What should you do?()A、Create a complex password for your user account.B、Open Credential Manager and modify your credentials.C、Add the URL of the Web site to the Trusted sites zone.D、Add the URL of the Web site to the Local intranet zone.
Your company has an Actrve Directory forest that runs at the functional level of Windows Server 2008 You implement Actrve Directory Rights Management Services (AD RMS) You install Microsoft SOL Server 2005 When you attempt to open the AD RMS administration Web site, you recerve the following error message: "SOL Server does not exist or access denied" You need to open the AD RMS administration Web site Which two actions should you perform()A、Restart liSB、Install Message OueuingC、Start the MSSOLSVC serviceD、Manualy delete the Service Connection Point in AD OS and restart AD RMS
You copy a Web site from a development site to a staging site. You do not have the Web site in a source control application. Another developer begins to fix bugs on the staging site while the development team adds features on the development site. You need to synchronize the development site and the staging site and copy the latest version of each file to both locations. What should you do? ()A、Use the Copy Web tool.B、Create a Web Setup project.C、Use the Publish Web tool.D、Use the command line to XCOPY the files.
You are working with a team of developers on a Web site. You copy the Web site from the staging server to work on it locally. While making changes, you create new C# source code files and delete old ones. You need to ensure that your changes propagate to the staging server without affecting any files that you have not modified. Which tool should you use? ()A、XCOPYB、the Copy Web toolC、the Publish Web toolD、a Web Setup project
You create a Web site that you must copy from a development server to a testing server, along with all source files. You do not have terminal access to the testing server. You need to create the virtual directory. Then you must copy the Web site to the virtual directory on the testing server without precompiling the site. What should you do? ()A、Use the Publish Web tool.B、Use the Copy Web tool.C、Use the command line to XCOPY the files.D、Create a Web Setup project.
单选题You need to reduce the level of access that a malicious Web site might have to your computer. What should you do? ()AStart a Windows Defender scan.BEnable Microsoft Windows Internet Explorer Phishing Filter.CEnable Microsoft Windows Internet Explorer Pop-up Blocker.DConfirm that Microsoft Windows Internet Explorer Protected Mode is enabled on the Internet security zone.
单选题Your company has an internal Web site that requires HTTPS. The Web site s certificate is self-signed. Youhave a computer that runs Windows 7 and Windows Internet Explorer 8. You use HTTPS to browse to theWeb site and receive the following warning message: There is a problem with this website s security certificate. You need to prevent the warning message from appearing when you access the Web site. What should you do?()AFrom Internet Explorer, enable InPrivate Browsing.BFrom Internet Explorer, add the Web site to the Trusted sites zone.CFrom Certificate Manager, import the Web site s certificate into your Personal store.DFrom Certificate Manager, import the Web site s certificate into your Trusted Root CertificationAuthorities store.
单选题You are working with a team of developers on a Web site. You copy the Web site from the staging server to work on it locally. While making changes, you create new C# source code files and delete old ones. You need to ensure that your changes propagate to the staging server without affecting any files that you have not modified. Which tool should you use? ()AXCOPYBthe Copy Web toolCthe Publish Web toolDa Web Setup project
单选题You install the Web Server (IIS) role on a new server that runs Windows Server 2008. You install a Microsoft .NET Framework 1.0 application on a Web site on the Web server. The company security policy states that all applications must run by using the minimum level of permission. You need to configure the Web site application so that it has the permissions to execute without creating any other content and without accessing any operating system components. What should you do?()ASet the .NET Framework trust level to Full for the Web site.BSet the .NET Framework trust level to Low for the Web site.CSet the .NET Framework trust level to High for the Web site.DSet the .NET Framework trust level to Medium for the Web site.
单选题You have a public computer that runs Windows XP Professional. All users log on to the computer by using the same user account. You log on to the computer by using the local administrator account and attempt to access a secure Web site. You discover that you have automatically logged on to the secure Web site by using the credential of another user. You need to connect to the secure Web site by using your own credentials. What should you do?()ARun ipconfig /flushdns at the command prompt. BReset the password for the local administrator user account. CFrom the Internet Options in Internet Explorer, clear the AutoComplete history.DFrom the Internet Options in Internet Explorer, delete the Temporary Internet Files.
单选题You create a Web site for a customer. You need to deploy the Web site to the customers server without any of the source files for the Web site. You do not want the customer to be able to update any of the static pages on the Web site. Which tool should you use? ()Aaspnet_compiler.exeBInstallUtil.exeCCSC.exeDaspnet_wp.exe
单选题You are deploying a Web site to a server managed by a hosting company. The only access you have to the server is through FTP. You need to precompile and deploy the Web site without its source files. What should you do? ()AUse the Copy Web tool.BUse the Publish Web tool.CUse XCOPY.DUse the Web Setup project Installer.
单选题You deploy your companys Internet Web site. You need to deny anonymous access to the Web site, allowing only authenticated users. Which code segment should you use?()Aauthorization allow users=?/ /authorizationBauthorization deny users=?/ /authorizationCauthorization deny users=*//authorizationDauthorization allow users=*/ /authorization
单选题You have a computer that runs Windows 7 and Windows Internet Explorer 8. You open Internet Explorerand access a Web site. The Web site displays a page that has misaligned text and graphic images. Youverify that the Web page displays correctly in previous versions of Internet Explorer. You need to view theWeb page correctly. What should you do?()AModify the text size.BEnable Caret Browsing.CEnable Compatibility View.DDisable the SmartScreen Filter.