单选题You are a systems administrator responsible for securing a Windows Server 2008 Web server. You havecreated a new Web site called Contoso Intranet that will contain seven Web applications. One of theapplication developers has told you that her Web application requires a new request handler that isprocessed using a .NET library her team created. How can you meet these requirements while also maximizing security for the server?()AAdd a new managed handler to the Contoso Intranet Web site.BAdd a new managed handler for the specific Web application that requires it.CAdd a new module mapping to the Contoso Intranet Web site.DAdd a new module mapping for the specific Web application that requires it.

单选题
You are a systems administrator responsible for securing a Windows Server 2008 Web server. You havecreated a new Web site called Contoso Intranet that will contain seven Web applications. One of theapplication developers has told you that her Web application requires a new request handler that isprocessed using a .NET library her team created. How can you meet these requirements while also maximizing security for the server?()
A

Add a new managed handler to the Contoso Intranet Web site.

B

Add a new managed handler for the specific Web application that requires it.

C

Add a new module mapping to the Contoso Intranet Web site.

D

Add a new module mapping for the specific Web application that requires it.


参考解析

解析: 暂无解析

相关考题:

Do you want to be responsible ______ this assignmen? A、inB、onC、atD、for

A Windows Communication Foundation (WCF) service is responsible for transmitting XML documents between systems.The service has the following requirements:It must minimize the transmission size by attaching the XML document as is without using escape characters or base64 encoding.It must interoperate with systems that use SOAP but are not built on the .NET plafform.You need to configure the service to support these requirements. Which message encoding should you use?()A. Binary message encodingB. MTOM (Message Transmission Optimization Mechanism) message encodingC. Text message encoding with message version set to noneD. Text message encoding with message version set to SOAP 1.2

We are confident ( ) securing large orders for you if your offer is competitive.A、ofB、withC、by

You are the administrator responsible for security and user desktop settings on your network. You need to configure a custom registry entry for all users. You want to add the custom registry entry into a Group Policy object (GPO) with the least amount of administrative effort.What should you do?A.Configure an ADM template and add the template to the GPO.B.Configure an INF policy and add the policy to the GPO.C.Configure a Microsoft Windows installer package and add the package to the GPO.D.Configure RIS to include the registry entry.

You have a domain controller named Server1 that runs Windows Server 2003 Service Pack 2 (SP2).You start Server1 in Directory Services Restore Mode and attempt to log on by using the username administrator and a password of Pa$$w0rd. The logon attempt fails.You restart Server1 normally and successfully log on to the server by using the username administrator and a password of Pa$$w0rd.You need to ensure that you can log on to Server1 in Directory Services Restore Mode.What should you do? ()A. From ntdsutil.exe, run Set DSRM Password.B. From ntdsutil.exe, run Security account management.C. From Active Directory Users and Computers, select the Account is trusted for delegation option for the Administrator account.D. From Active Directory Users and Computers, select the Store password using reversible encryption option for the Administrator account.

The securing systems for containers were developed to prevent container movement during which ship motion ________.A.SurgeB.RollC.SwayD.Yaw

An administrator attempts a traceroute but receives a "Destination Unreadable" message. Which protocol is responsible for that message?()A、RARPB、RUDPC、ICMPD、SNMP

A system administrator is responsible for a vast and growing collection of dissimilar AIX systems. The verification of microcode levels and installation of new microcode is becoming increasingly unmanageable. What tool can be used to discover the existence of new microcode and automate the download and installation?()A、NIMB、HMCC、sumaD、invscout

You work as the exchange administrator at Company.com.the Company.com network contains an exchange server 2010 organization.Company.com has its headquarters in stockholm where you are located.you are responsible for an exchange 2010 edge transport server named -ex01.during the course of the week you receive an instruction from the cio to make sure that e-mail messages sent to unknown addresses in the organization is rejected automatically.What should you do?()A、You should consider configuring recipient filtering.B、You should consider configuring sender reputation.C、You should consider configuring content filtering.D、You should consider configuring sender filtering.

A Windows Communication Foundation (WCF) service is responsible for transmitting XML documents between systems. The service has the following requirements: It must minimize the transmission size by attaching the XML document as is without using escape characters or base64 encoding. It must interoperate with systems that use SOAP but are not built on the .NET plafform. You need to configure the service to support these requirements. Which message encoding should you use?()A、Binary message encodingB、MTOM (Message Transmission Optimization Mechanism) message encodingC、Text message encoding with message version set to noneD、Text message encoding with message version set to SOAP 1.2

You are a systems administrator responsible for managing a Windows Server 2008 SMTP server.Recently, users have complained that a Web application running on the same server is experiencing performance problems at specific times of the day. You suspect that the problem might be related to loadplaced on the SMTP Server service. Which of the following methods should you use to monitor theperformance of an SMTP virtual server over time?()A、The Current Sessions section of IIS 6.0 ManagerB、SMTP Server counters collected by Performance MonitorC、Windows Event Viewer: Application LogD、Windows Event Viewer: System Log

You work as the enterprise exchange administrator at Xxx .The Xxx network is running in a Microsoft Exchange Server 2010 environment.You are responsible for managing an Exchange Server 2010 server named XXX-EX02 that has IMAP4 installed.What actions must you take to determine the ability of users to e-mail hosts on the Internet?()A、You must connect to port 587, from a workstation.B、You must use the Get-MessageTrackingReport cmd.C、You must enable the Receive connectors and Send connectors.D、You must use the Remote Connectivity Analyzer.

Company.com has employed you as their Exchange administrator.The Company.com network contains an Exchange Server 2010 Organization.You are responsible for managing the Company.com network.You receive an instruction from management to reject e-mail messages that have a spam confidence level (SCL) of 5.You thus decide to configure the organization to accomplish this task. What should you do?()A、You should consider configuring the sender reputation.B、You should consider configuring the sender filtering.C、You should consider configuring the content filtering.D、You should consider configuring the recipient filtering.

An administrator named Admin1 plans to deploy operating systems to the planned VMs. You need to recommend a configuration plan for the VMs. The plan must ensure that the operating systems can be deployed to the VMs. What should you include in the recommendation?()A、a synthetic network adapterB、an emulated network adapterC、virtual machine queue (VMQ)D、Virtual Machine Chimney

You work as the enterprise exchange administrator at Xxx .The Xxx network is running in a Microsoft Exchange Server 2010 environment.You are responsible for managing a Mailbox server named XXX-EX02.The employees at Xxx use Microsoft Office Outlook 2010 to access to the Exchange environment.What actions must you take to determine the amount of lag for connections to XXX- EX02?()A、You must use the Test-Mailflow cmdlet.B、You must use the MSExchangeTransport diagnostic logging.C、You must use the Test-ServiceHealth cmdlet.D、You must use the Test-OutlookConnectivity cmdlet.

You work as the enterprise exchange administrator at Xxx .The Xxx network is running in a Microsoft Exchange Server 2010 environment.You are responsible for managing an Exchange Server 2010 server named XXX-EX02.What command can be used to determine if the employees can utilize Outlook Anywhere to access XXXEX02?()A、You must use the Test-ImapConnectivity cmdlet.B、You must use the Test-OutlookConnectivity cmdlet.C、You must use the Get-MessageTrackingReport cmd.D、You must use the Exchange Remote Connectivity Analyzer.

多选题You work as a database administrator for Certkiller .com. In your development environmentenvironment, the developers are responsible for modifying the table structure according to the application requirements. However, you want to keep track of the ALTER TABLE commands being executed by developers, so you enable auditing to achieve this objective.  Which two views would you refer to find out the audit information?()ADBA_AUDIT_TRAILBDBA_AUDIT_SESSIONCDBA_FGA_AUDIT_TRAILDDBA_COMMON_AUDIT_TRAIL

多选题You are an administrator in a company that has Windows 2000 Professional systems. Your users have been installing unsupported USB drivers on to their systems causing them to lock up and fail. You want to insure that only drivers that are in the HAL can be installed. What must be done?()AIgnore - Install all files, regardless of file signatureBWarn - Display a message before installing an unsigned fileCBlock - Prevent installation of unsigned filesDApply setting as system default

单选题You are an administrator for a corporate network. At a branch office,you want to deploy Windows Vista to21 client computers and Windows Server 2008 to four servers. For which operating systems is the branchoffice eligible for KMS licensing?()AWindows VistaBWindows Server 2008CBoth Windows Vista and Windows Server 2008DNeither Windows Vista nor Windows Server 2008

单选题You are a Windows Server 2008 systems administrator responsible for configuring FTP Publishing Servicefor use by members of your organization’s engineering department. The name of the server is FTPServer01. Several users have reported that they are able to access most files through the FTP site,but they cannot access the contents of the Drawings folder. You have verified that these users. Windowsaccounts have the correct file system permissions for this folder. You want to minimize the permissionsgranted to all the users. Which of the following changes should you make to enable users to access thisfolder?()AChange the permissions for the IUSR_FTPServer01 account on the Drawings folder.BCreate new TCP/IP Address Restrictions entries for the users who cannot access the Drawings folder.CDisable the Allow Only Anonymous Connections option.DAdd the users to the local Administrators group on FTPServer02.

单选题You have a domain controller named Server1 that runs Windows Server 2003 Service Pack 2 (SP2).You start Server1 in Directory Services Restore Mode and attempt to log on by using the username administrator and a password of Pa$$w0rd. The logon attempt fails.You restart Server1 normally and successfully log on to the server by using the username administrator and a password of Pa$$w0rd.You need to ensure that you can log on to Server1 in Directory Services Restore Mode.What should you do? ()AFrom ntdsutil.exe, run Set DSRM Password.BFrom ntdsutil.exe, run Security account management.CFrom Active Directory Users and Computers, select the Account is trusted for delegation option for the Administrator account.DFrom Active Directory Users and Computers, select the Store password using reversible encryption option for the Administrator account.

单选题You are a systems administrator responsible for managing a Windows Server 2008 Web server. Recently,your organization set up a new IIS Web site that will be accessed by users outside of your organizations.Consultants should be able to connect to this Web site, using IIS Manager. Your organization’s securitypolicy prevents you from creating domain accounts or local user accounts for these users. You attempt touse the IIS Manager Permissions feature for the Web site. However, when you click Allow User, you areable to select only Windows users.  How can you resolve this problem?()AVerify that Management Service has been started.BReconfigure the file system permissions for the root folder of the Web site.CReconfigure Management Service to enable Windows And IIS Manager Credentials.DVerify the Authentication settings for the Web site.

单选题You are a database administrator for your company. You are responsible for a SQL Server 2005 database that has several indexes. You need to write a stored procedure that checks the indexes for fragmentation. Which Transact-SQL statement should you use?()ADBCC DBREINDEXBSELECT * FROM sys.dm_db_index_physical_statsCDBCC INDEXDEFRAGDSELECT * FROM sys.indexes

多选题You are a systems administrator responsible for managing a Windows Server 2008 Web Server Currently,there are no Web sites configured on the server. You need to configure the server to host two Web applications: Engineering App and Sales App. Both Web applications must be accessible by using HTTPport 80 without the use of host headers. Also, you must protect against problems in one Web applicationaffecting the performance or reliability of the other Web application. Which two steps should you take tomeet these requirements?()ACreate a single Web site that contains both Web applications.BCreate two Web sites, one for each Web application.CAssign both Web applications to the same application pool.DAssign each Web application to its own application pool.

多选题You are a systems administrator responsible for configuring a Windows Server 2008 SMTP server. Yourorganization is currently using the default SMTP virtual server for sending order notifications from a single Web application called ContosoOrderManagement. Recently, you have noticed that a largenumber of messages have been sent to the SMTP virtual server from other computers and users. Which two methods can you use to prevent unauthorized access to the SMTP server?()AEnable Basic Authentication.BConfigure a smart host for use by the SMTP virtual server.CAdd Connection Control entries to limit which IP addresses can use the SMTP server.DModify settings on the Security tab of the properties of the SMTP virtual server.

单选题An administrator named Admin1 plans to deploy operating systems to the planned VMs. You need to recommend a configuration plan for the VMs. The plan must ensure that the operating systems can be deployed to the VMs. What should you include in the recommendation?()Aa synthetic network adapterBan emulated network adapterCvirtual machine queue (VMQ)DVirtual Machine Chimney

单选题The securing systems for containers were developed to prevent container movement during which ship motion?().ASurgeBRollCSwayDYaw