You have successfully configured EchoClient and EchoApplication secured by Web Services Security Management (WSSM). You want to test that authorization is correctly being performed on the request. Which technique would allow you to do this?()
第1题:
You work as the IT professional in an international company which is named Wiikigo. You are experiencedin implementing and administering a network operating system. You are specialized in deploying servers,configuring Windows Server 2008 Terminal services and network application services, and configuring aweb services infrastructure. You manage a server that runs Windows Server 2008. The TS Gateway roleservice is installed on this server. You have to provide a security group access to the TS Gateway server. So what action should you perform?()
第2题:
You want to allow all hosts on interface ge-0/0/0.0 to be able to ping the device’s ge-0/0/0.0 IP address.Where do you configure this functionality?()
第3题:
Every morning, you inspect your company‘s development and staging servers. You do this to ensure that the servers have the same versions of all files in your Web application.For security reasons, you can only access the staging server through FTP.You need to synchronize files from the staging server so that the staging server matches the development server.You want to achieve this goal by using the minimum amount of administrative effort.Which tool should you use?()
A. FTP
B. XCOPY
C. the Publish Web tool
D. the Copy Web tool
第4题:
You upgrade 11 computers in the accounting department from Windows NT Workstation 4.0 to Windows 2000 Professional. All of the upgraded computers are configured to have the default security settings. After the upgrade, users in the accounting department report that they can no longer run any financial or credit applications on their computers. You want all accounting department users to be able to run these applications. You want to allow only the rights that allow users to run the applications. What should you do?()
第5题:
Your company has an Active Directory domain. A server named Server2 runs Windows Server 2008. All client computers run Windows Vista. You install the Terminal Services role,Terminal Services Web Access role service,and Terminal Services Gateway role service on Server2. You need to ensure that all client computers have compliant firewall, antivirus software,and antispyware. Which two actions should you perform?()
第6题:
You work as the IT professional in an international company which is named Wiikigo. You are experiencedin implementing and administering a network operating system. You are specialized in deploying servers,configuring Windows Server 2008 Terminal services and network application services, and configuring aweb services infrastructure. A Windows Server 2008 server is contained by your company and the WebServer (IIS) server role is installed on the server. A Web site is included by the server. Since you are thetechnical report, you are required to encrypt the cookies sent from the Web site on users computers. Which Web site feature should be configured to achieve the goal?()
第7题:
You work as a database administrator for Supportcenter.cn. You want to administer your database servers, which are running on different host machines, using the Web-enabled grid control interface. You have configured the agent on the host machines. You have started the Oracle Database 10g Grid Control utility on your machine. Which two additional components would you configure to achieve this objective?()
第8题:
You deploy your companys Internet Web site. You need to deny anonymous access to the Web site, allowing only authenticated users. Which code segment should you use?()
第9题:
Every morning, you inspect your company's development and staging servers. You do this to ensure that the servers have the same versions of all files in your Web application.For security reasons, you can only access the staging server through FTP.You need to synchronize files from the staging server so that the staging server matches the development server.You want to achieve this goal by using the minimum amount of administrative effort. Which tool should you use?()
第10题:
You work as the IT professional in an international company which is named Wiikigo. You are experiencedin implementing and administering a network operating system. You are specialized in deploying servers,configuring Windows Server 2008 Terminal services and network application services, and configuring aweb services infrastructure. You are in charge of a server that runs Windows Server 2008. The server hasthe Web Server (IIS) server role installed. The server contains a Web site that is configured to use onlyWindows Authentication. You have a security group named Group1 that contains several user accounts.Now you receive an order from the company management. According to the company requirement, youhave to prevent the members of Group1 from accessing a Web site. But you are not allowed prevent otherusers from accessing the Web site. Which Web site feature should you configure?()