You are developing a Web application. Your code restricts access to some pages based on the users credentials. You need to configure IIS to supply the user‘s Windows credentials to your Web application. These credentials must be encrypted.What should you do? ()A. Enable Anonymous access. Enable Integrated Windows authentication.B. Enable Anonymous access. Enable Basic authentication.C. Disable Anonymous access. Enable Integrated Windows authentication.D. Disable Anonymous access. Enable Basic authentication.

You are developing a Web application. Your code restricts access to some pages based on the users credentials. You need to configure IIS to supply the user‘s Windows credentials to your Web application. These credentials must be encrypted.What should you do? ()

A. Enable Anonymous access. Enable Integrated Windows authentication.

B. Enable Anonymous access. Enable Basic authentication.

C. Disable Anonymous access. Enable Integrated Windows authentication.

D. Disable Anonymous access. Enable Basic authentication.


相关考题:

You are developing a Windows Communication Foundation (WCF) service.You enable message logging, trace listeners, activity propagation, and tracing on the trace sources.You have the following code segment in the client application. (Line numbers are included for reference only.)01 Guid multiCallActivityId = Guid.NewGuid();02 TraceSource ts = new TraceSource(Multicall);03 Trace.CorrelationManager.ActivityId = multiCallActivityId;04You encounter errors when your client application consumes the service.You need to ensure that your client application can correlate tracing information with the service.Which code segment should you add at line 04?()A.B.C.D.

You configure parental controls on your computer for your child‘s user account. Your child logs on with a different account and is able to access inappropriate Web sites. You need to ensure that your child cannot access inapproriate Web sites.What should you do?()A.AB.BC.CD.D

The relevant portion of the Barrymore router configuration is displayed below:In your effort to conserve precious bandwidth, you set up some ACL‘s to deny internet access to the remote server located at 192.168.20.5. A few minutes after reconfiguring (as shown in the exhibit above) you notice that some web traffic is still going through.Based on the above output, what do you suspect as to why the traffic still traveling over the ISDN link?()A. Broadcasts are creating interesting traffic.B. The access-list is not configured correctly.C. The command ip access-group 129 out is missing from the bri0/0 interface.D. The dialer-group has not been applied to outbound traffic.

You create a Microsoft ASP.NET Web application by using the Microsoft .NET Framework version 3.5.  When you review the application performance counters, you discover that there is an unexpected increase in the value of the Application Restarts counter. You need to identify the reasons for this increase.  What are three possible reasons that could cause this increase?()A、Restart of the Microsoft IIS 6.0 host. B、Restart of the Microsoft Windows Server 2003 that hosts the Web application. C、Addition of a new assembly in the Bin directory of the application. D、Addition of a code segment that requires recompilation to the ASP.NET Web application. E、Enabling of HTTP compression in the Microsoft IIS 6.0 manager for the application. F、Modification to the Web.config file in the system.web section for debugging the application.

ou are the newly appointed system administrator at Certkiller.com. A former administratorcreated a Microsoft ASP.NET Web application using Microsoft .NET Framework v3.5.  You are responsible for maintaining the Web application. You use the source control repository toacquire the most recent version of the project. As soon as you attempt to compile the project onyour workstation you notice that the assembly reference is missing. To ensure productivity youneed to make sure that you are able to compile the project on your workstation. What should you do?()A、Your best option would be to ensure that the assembly reference is deleted.Thereafter you need to add a reference to the missing assembly.B、Your best option would be to ensure that a reference path in the property pages of the project is added to the location of the missing assembly.C、Your best option would be to ensure that a working directory in the property pages of theproject is added to the location of the missing assembly.D、Your best option would be to ensure that the output path in the property pages of the project is changed to the location of the missing assembly.

You are creating a templated Web control for use in your Web application. You need to add the Web control to your Web application pages without compiling your control into a .dll file. What should you do?()A、Ensure that the Web control inherits from the WebControl class.B、Ensure that the Web control inherits from the Control class.C、Ensure that the Web control inherits from the CompositeControl class.D、Ensure that the Web control inherits from the UserControl class.

You need to design an access control strategy for the marketing application. You solution must minimize impact on server and network performance. What should you do?()A、Require client computers to connect to the marketing application by using a VPN connectionB、Use IPSec to encrypt communications between the servers in the New York and Atlanta officesC、Require the high security setting on Terminal Services connections to the marketing applicationD、Configure all marketing application Web pages to require SSL

You are developing a Web application to display products. Products are displayed on different pages on your Web site. You want to create a user control to manage the display of products. You need a default visual implementation of the UI of the user control. In addition, you need to provide developers with the flexibility to change the layout and controls of the UI. Which three actions should you perform? ()A、Apply the TemplateContainerAttribute to a property of type ITemplate. Pass the type of the template's naming container as the argument to the attribute.B、Apply the TemplateContainerAttribute to the user control's class declaration.C、Implement a property of type INamingContainer in the user control's code-behind class.D、Implement a property of type ITemplate in the user control's code-behind class.E、Define a new class that inherits from the ITemplate interface. Implement the InstantiateIn method of the ITemplate interface.

You write a Web application. This application must support multiple languages. You store the localized strings in the application as resources. You want these resources to be accessed according to a users language preference. You create the following resource files in the App_GlobalResources folder of your application. myStrings.resx myStrings.en-CA.resx myString.en-US.resx myStrings.fr-CA.resx myStrings.es-MX.resxEach resource file stores a localized version of the following strings: Name, E-mail, Address, and Phone. You create a Web Form that contains one label for each of these strings. You need to ensure that the correct localized version of each string is displayed in each label, according to a users language preference. What should you do? ()A、Add the following configuration section to the Web.config file. B、Set the directive for each page in your site as follows: %@ page="" uiculture="”Auto”"C、Add the following code segment to the pages load event.lblName.Text = @”{myStrings}Name”; lblAddress.Text = @”{myStrings}Address”; lblEmail.Text = @”{myStrings}Email”; lblPhone.Text = @”{myStrings}Phone”;D、Add the following code segment to the pages load event.lblName.Text = Resources.myStrings.Name; lblAddress.Text = Resources.myStrings.Address; lblEmail.Text = Resources.myStrings.Email; lblPhone.Text = Resources.myStrings.Phone;

You are the desktop administrator for your company. Your company’s software developers use Windows XP Professional and IIS on their client computers to develop Web-based applications. All client computers use Microsoft Internet Explorer 6. 0 or later as their Web browser. One of the developers reports that he can no longer access the Web-based application on his desktop by using his Web browser. When you attempt to access the application by using your Web browser, you receive the following error message: “Cannot find server or DNS Error.” You verify that the World Wide Web Publishing Service is started on the developer’s computer. You also verify that you are using the correct URL to access the developer’s computer by using your Web browser. You need to ensure that the developer can access the Web application by using his Web browser. How should you configure the developer’s computer?() A、Start the default Web site.B、Start the IIS Admin Service.C、Run the IPconfig /registerdns command.D、In the default Web site properties,disable the host header setting.

You write a Web application. This application must support multiple languages. You store the localized strings in the application as resources. You want these resources to be accessed according to a users language preference. You create the following resource files in the App_GlobalResources folder of your application.myStrings.resxmyStrings.enCA.resxmyString.en-US.resxmyStrings.fr-CA.resxmyStrings.es-MX.resx resource file stores a localized version of the following strings: Name, E-mail, Address, and Phone. You create a Web Form that contains one label for each of these strings. You need to ensure that the correct localized version of each string is displayed in each label, according to a users language preference. What should you do? ()A、Add the following configuration section to the Web.config file. B、Set the directive for each page in your site as follows:%@ page="" uiculture="“Auto”"C、Add the following code segment to the pages load event.lblName.Text = @”{myStrings}Name”; lblAddress.Text = @”{myStrings}Address”; lblEmail.Text = @”{myStrings}Email”; lblPhone.Text = @”{myStrings}Phone”;D、Add the following code segment to the pages load event. lblName.Text = Resources.myStrings.Name; lblAddress.Text = Resources.myStrings.Address; lblEmail.Text = Resources.myStrings.Email; lblPhone.Text = Resources.myStrings.Phone;

You are developing a Web application. The Web application restricts access to an administrative page. The Web application uses the following code segment to protect the page.if (Page.User.Identity.Name != @"CONTOSO/Administrator") { the page, you are redirected to Login.aspx. You discover that the User.Identity.Name property is not being correctly populated. You need to ensure that you can access the page when you are logged on as Administrator. Which two actions should you perform? ()A、In the Web.config file, enable impersonation.B、In IIS, enable anonymous access.C、In IIS, disable anonymous access.D、In the Web.config file, set the authentication mode to Windows.

You work as a Web Application Developer at Certkiller.com. You make use of .NET Frameworkv3.5 to create an ASP.NET application.  You decide to create a Web user control named KingShare. KingShare is compiled as a library.The code segment below is written for KingShare. (The line numbers is included for reference purposes) 1 protected override void OnInit(EventArgs e) 2 { 3 base.OnInit(e); 4 5 }  The master pages in the application contains the %@ Master Language="C#" EnableViewState="false" % directive. You receive an instruction from the network administratorto make sure that the KingShare state is able to persist on the pages that reference the masterpage. You should thus identify the appropriate code segment you need to add to line 4 to achievethis.  What should you do?()A、Your best option would be to insert Page.RegisterRequiresPostBack(this)B、Your best option would be to insert Page.RegisterRequiresControlState(this)C、Your best option would be to insert Page.UnregisterRequiresControlState(this)D、Your best option would be to insert Page.RegisterStartupScript("KingShare","server")

单选题You are the desktop administrator for your company. Your company’s software developers use Windows XP Professional and IIS on their client computers to develop Web-based applications. All client computers use Microsoft Internet Explorer 6. 0 or later as their Web browser. One of the developers reports that he can no longer access the Web-based application on his desktop by using his Web browser. When you attempt to access the application by using your Web browser, you receive the following error message: “Cannot find server or DNS Error.” You verify that the World Wide Web Publishing Service is started on the developer’s computer. You also verify that you are using the correct URL to access the developer’s computer by using your Web browser. You need to ensure that the developer can access the Web application by using his Web browser. How should you configure the developer’s computer?()AStart the default Web site.BStart the IIS Admin Service.CRun the IPconfig /registerdns command.DIn the default Web site properties,disable the host header setting.

单选题You are developing an ASP.NET MVC 2 application. A view contains a form that allows users to submit their first name. You need to display the value that is submitted, and you must ensure that your code avoids cross-site scripting. Which code segment should you use?()A%: Model.FirstName %B%= Model.FirstName % C% Response.Write(Model.FirstName) %  D% Response.Write(HttpUtility.HtmlDecode(Model.FirstName)) %

多选题You are developing a Web application. The Web application restricts access to an administrative page. The Web application uses the following code segment to protect the page.if (Page.User.Identity.Name != @"CONTOSO/Administrator") { the page, you are redirected to Login.aspx. You discover that the User.Identity.Name property is not being correctly populated. You need to ensure that you can access the page when you are logged on as Administrator. Which two actions should you perform? ()AIn the Web.config file, enable impersonation.BIn IIS, enable anonymous access.CIn IIS, disable anonymous access.DIn the Web.config file, set the authentication mode to Windows.

单选题You create a Microsoft ASP.NET application by using the Microsoft .NET Framework version 3.5. You plan to deploy the application to a test server.  You need to ensure that during the initial request to the application, the code-behind files for the Web pages are compiled. You also need to optimize the performance of the application.  Which code fragment should you add to the Web.config file?()Acompilation debug=true Bcompilation debug=false Ccompilation debug=true batch=true Dcompilation debug=false batch=false

单选题You are developing a Web application. Your code restricts access to some pages based on the users credentials. You need to configure IIS to supply the user's Windows credentials to your Web application. These credentials must be encrypted. What should you do? ()AEnable Anonymous access. Enable Integrated Windows authentication.BEnable Anonymous access. Enable Basic authentication.CDisable Anonymous access. Enable Integrated Windows authentication.DDisable Anonymous access. Enable Basic authentication.

多选题You are developing a Web application. The Web application restricts access to an administrative page. The Web application uses the following code segment to protect the page.If Page.User.Identity.Name "CONTOSO/Administrator" Then Response.Redirect("login.aspx")End IfYou are logged on as Administrator. When you display the page, you are redirected to Login.aspx. You discover that the User.Identity.Name property is not being correctly populated. You need to ensure that you can access the page when you are logged on as Administrator. Which two actions should you perform? ()AIn the Web.config file, enable impersonation.BIn IIS, enable anonymous access.CIn IIS, disable anonymous access.DIn the Web.config file, set the authentication mode to Windows.

单选题You are a help desk technician for your company. Stefan and Irene are software developers for the company. Stefan is developing a Web application on his Windows XP Professional computer. The computer is named Stefan132.  All client computers use Microsoft Internet Explorer 6. 0 or later as their Web browser. When Irene types http://Stefan132 in the Address bar of her Web browser, she cannot access the Web application. However, Stefan can access the Web application by typing http://localhost or http://Stefan132 in the Address bar of his Web browser. He can also access resources on the company network. When you run the Ping command on your computer, you cannot connect to Stefan’s computer. When you attempt to access http://Stefan132 from your computer, Internet Explorer displays “DNS or Server Error.” You need to ensure that Irene can access the Web application on Stefan’s computer. First, you establish a Remote Assistance connection to Stefan’s computer. What should you do next on Stefan’s computer?()ARun the IPconfig /renew command. BStop and then restart the World Wide Web Publishing service. CEnsure that the Everyone group has Allow - Full Control permission on the Inetpub folder. DIn the properties of the Local Area Connection connection, allow a Windows Firewall exception for port 80.

单选题You are creating a templated Web control for use in your Web application.You need to add the Web control to your Web application pages without compiling your control into a .dll file. What should you do?()AEnsure that the Web control inherits from the WebControl class.BEnsure that the Web control inherits from the Control class.CEnsure that the Web control inherits from the CompositeControl class.DEnsure that the Web control inherits from the UserControl class.

单选题You are able to access a Web server from your computer by using the IP address of the Web server. You fail to access the Web server when you use its fully qualified domain name. Other users on your network can access the Web server by using both the IP address and the fully  qualified domain name. You need to access the Web server by using the fully qualified domain name.  What should you do? ()AUse the Diagnose and repair feature in the Network and Sharing Center.BAt the command prompt, type ipconfig /allcompartments.CDisable the NetBIOS feature on your network adapter.DConfigure the correct default gateway on the Alternate Configuration tab of your network connection properties dialog box.

单选题You modify an existing Microsoft ASP.NET application by using the Microsoft .NET Framework version 3.5.  You add a theme to the ASP.NET application.  You need to apply the theme to override any settings of individual controls.  What should you do?()AIn the Web.config file of the application,set the Theme attribute of the pages element to the name of the theme.BIn the Web.config file of the application,set the StyleSheetThemeattribute of the pages element to the name of the theme.CAdd a master page to the application. In the @Master directive,set the Theme attribute to the name of the theme.DAdd a master page to the application. In the @Master directive,set the StyleSheetTheme attribute to the name of the theme.

单选题You are developing an ASP.NET Dynamic Data Web application. Boolean fields must display as Yes or No instead of as a check box. You replace the markup in the default Boolean field template with the following markup.You need to implement the code that displays Yes or No. Which method of the FieldTemplateUserControl class should you override in the BooleanField class?()AOnLoadBConstructCOnDataBindingDSaveControlState

单选题You deploy your companys Internet Web site. You need to deny anonymous access to the Web site, allowing only authenticated users. Which code segment should you use?()Aauthorization allow users=?/ /authorizationBauthorization deny users=?/ /authorizationCauthorization deny users=*//authorizationDauthorization allow users=*/ /authorization

单选题You are developing a class library. Portions of your code need to access system environment variables. You need to force a runtime SecurityException only when callers that are higher in the call stack do not have the necessary permissions. Which call method should you use?()Aset.Demand();Bset.Assert();Cset.PermitOnly();Dset.Deny();