单选题What is the LEAST appropriate scenario for Web services?()A To integrate legacy systemsB To propagate security contextC To expose fine grained operationsD To use with process choreographyE For B2B (business to business) applications

单选题
What is the LEAST appropriate scenario for Web services?()
A

 To integrate legacy systems

B

 To propagate security context

C

 To expose fine grained operations

D

 To use with process choreography

E

 For B2B (business to business) applications


参考解析

解析: 暂无解析

相关考题:

NET is both a business strategy from Microsoft and its(6)of(7)support for what are known as Web services, the ability to use the Web rather than your own computer for various services. Microsoft's goal is to provide individual and business users with a(8)interoperable and Web-enabled interface for applications and computing devices and to make computing activities increasingly Web browser-oriented. The NET(9)includes servers; building-block services, such as Web-based data storage; and device software. It also includes Passport, Microsoft's fill-in-the-form-only-once identity(10)service.A.individualB.collectionC.setD.unit

Network integration helps to build a powerful business foundation. Which approach does Ciscouse to integrate applications and services across the network infrastructure?()A、 application-levelB、 systems-levelC、 policy-levelD、 advanced services

As customers deploy converged services across their business infrastructures, access routers must integrate security services and IP communications. Which router series is designed to achieve this level of integration?()A、 Cisco 7000 Series WAN edge routersB、 Cisco 800 Series routersC、 Cisco Integrated Services RoutersD、 Cisco Small Business Series routers

Cisco Clean Access ensures that computers connecting to your network have which of the following?()A、 No vulnerable applications or operating systemsB、 No viruses or wormsC、 Appropriate security applications and patch levelsD、 Current IPS signaturesE、 Cisco Security Agent

When a business suffers a security breach, there are be serious ramifications. What is one of the immediate impacts that the business can suffer because of a security breach?()A、 loss of retail salesB、 loss of customer faithC、 disruption of business operationsD、 inability to deliver products or services

Which two are characteristics of the cost-containment business challenge?()A、reducing security breachesB、using the Internet moreC、reducing upgrade chargesD、adopting new applications and services

The integrated services routing architecture provides the performance, availability, and reliabilityneeded to scale mission-critical business applications in the most demanding environments.Which statement best describes the benefits of Cisco Integrated Services Routers?()A、 ISRs provide threat defense against attacks from hackers and viruses that can occur in thenetwork.B、 ISRs provide the framework to integrate and extend wired and wireless networksC、 ISRs provide concurrent security, voice, data, wireless, and application optimization services.D、 ISRS provide the common fabric, functionality, and CLI across the network.

When a business suffers a security breach, there can be serious ramifications. What is one of the immediate impacts that the business can suffer because of a security breach?()A、 loss of retail salesB、 loss of customer faithC、 disruption of business operationsD、 inability to deliver products or services

Which of the following business scenarios is the LEAST appropriate for Web services?()A、 Expanding the reach of your company information.B、 Providing transactional services such as credit card payment processing.C、 Making existing services available to a business process to orchestrate services.D、 Enabling interoperability between heterogeneous services to create time-critical solutions.

What is BPR?()A、Business production relationB、Business promotion relationC、Business process reengineeringD、Business placement ratio

What is BPR? ()A、Business production elationB、Business promotion relationC、Business process re-engineeringD、Business placement ratio

As customers deploy converged services across the business infrastructure, access routers must integrate security services and IP communications. Which router series extends intelligent networking to remote branches and offices?()A、 Cisco 700 Series ISDN Access RoutersB、 Cisco Integrated Services RoutersC、 Cisco 3700 Series Multiservice Access RoutersD、 Cisco 1700 Series Modular Access Routers

What is the LEAST appropriate scenario for Web services?()A、 To integrate legacy systemsB、 To propagate security contextC、 To expose fine grained operationsD、 To use with process choreographyE、 For B2B (business to business) applications

Which of the following is MOST likely to improve the performance of SOAP-based Web services?()A、 Use message level securityB、 Use fine-grained Web servicesC、 Use document/literal instead of RPC/encodedD、 Avoid stale data in the UDDI registry by turning off caching

You need to design a method to update the content on the Web server. Your solution must meet business and security requirements. What are two possible ways to achieve this goal?()A、Use SSH to encrypt content as it is transferred to the Web server on the perimeter networkB、Install the Microsoft FrontPage Server Extensions, and use FrontPage to update contentC、Use Web Distributed Authoring and Versioning (WebDAV) over and SSL connection to the Web server to update contentD、Use FTP over an IPSec connection to transfer content to the Web serverE、Use Telnet to connect to the Web server, and then perform content changes directly on the server

You are designing a Windows Azure web application.   The application must integrate with on-premise business services.   The business services are running on an on-premise server and cannot be rewritten. The business services are not exposed externally.   You need to recommend an approach for accessing the business services.  What should you recommend?()  A、 Move business service functionality to Windows Azure.B、 Connect to the on-premise server from a custom service in Windows Azure.C、 Create a VPN connection between the application and the on-premise server.D、 Expose the business services to the Windows Azure AppFabricService Bus by using a custom service that configures relay binding.

单选题Which of the following is MOST likely to improve the performance of SOAP-based Web services?()A Use message level securityB Use fine-grained Web servicesC Use document/literal instead of RPC/encodedD Avoid stale data in the UDDI registry by turning off caching

单选题Which of the following business scenarios is the LEAST appropriate for Web services?()A Expanding the reach of your company information.B Providing transactional services such as credit card payment processing.C Making existing services available to a business process to orchestrate services.D Enabling interoperability between heterogeneous services to create time-critical solutions.

单选题What is the LEAST appropriate scenario for Web services?()A To integrate legacy systemsB To propagate security contextC To expose fine grained operationsD To use with process choreographyE For B2B (business to business) applications

单选题Network integration helps to build a powerful business foundation. Which approach does Ciscouse to integrate applications and services across the network infrastructure?()A application-levelB systems-levelC policy-levelD advanced services

单选题As customers deploy converged services across their business infrastructures, access routers must integrate security services and IP communications. Which router series is designed to achieve this level of integration?()A Cisco 7000 Series WAN edge routersB Cisco 800 Series routersC Cisco Integrated Services RoutersD Cisco Small Business Series routers

单选题As customers deploy converged services across the business infrastructure, access routers must integrate security services and IP communications. Which router series extends intelligent networking to remote branches and offices?()A Cisco 700 Series ISDN Access RoutersB Cisco Integrated Services RoutersC Cisco 3700 Series Multiservice Access RoutersD Cisco 1700 Series Modular Access Routers

单选题You are designing a Windows Azure web application.   The application must integrate with on-premise business services.   The business services are running on an on-premise server and cannot be rewritten. The business services are not exposed externally.   You need to recommend an approach for accessing the business services.  What should you recommend?()A Move business service functionality to Windows Azure.B Connect to the on-premise server from a custom service in Windows Azure.C Create a VPN connection between the application and the on-premise server.D Expose the business services to the Windows Azure AppFabricService Bus by using a custom service that configures relay binding.

单选题Cisco Clean Access ensures that computers connecting to your network have which of the following?()A No vulnerable applications or operating systemsB No viruses or wormsC Appropriate security applications and patch levelsD Current IPS signaturesE Cisco Security Agent

单选题When a business suffers a security breach, there can be serious ramifications. What is one of the immediate impacts that the business can suffer because of a security breach?()A loss of retail salesB loss of customer faithC disruption of business operationsD inability to deliver products or services

单选题When a business suffers a security breach, there are be serious ramifications. What is one of the immediate impacts that the business can suffer because of a security breach?()A loss of retail salesB loss of customer faithC disruption of business operationsD inability to deliver products or services

单选题The integrated services routing architecture provides the performance, availability, and reliabilityneeded to scale mission-critical business applications in the most demanding environments.Which statement best describes the benefits of Cisco Integrated Services Routers?()A ISRs provide threat defense against attacks from hackers and viruses that can occur in thenetwork.B ISRs provide the framework to integrate and extend wired and wireless networksC ISRs provide concurrent security, voice, data, wireless, and application optimization services.D ISRS provide the common fabric, functionality, and CLI across the network.

单选题You are the network administrator for your company. The network consists of a single Active Directory domain. All domain controllers run Windows Server 2003. All client computers run Windows XP Professional.   The company has legacy applications that run on UNIX servers. The legacy applications use the LDAP protocol to query Active Directory for employee information.  The domain controllers are currently configured with the default security settings. You need to configure enhanced security for the domain controllers. In particular, you want to configure stronger password settings, audit settings, and lockout settings. You want to minimize interference with the proper functioning of the legacy applications.   You decide to use the predefined security templates. You need to choose the appropriate predefined security template to apply to the domain controllers.  What should you do?()A Apply the Setup security.inf template to the domain controllers.B Apply the DC security.inf template to the domain controllers.C Apply the Securedc.inf template to the domain controllers.D Apply the Rootsec.inf template to the domain controllers.