-
You need to reduce the level of access that a malicious Web site might have to your computer. What should you do? ()
A . Start a Windows Defender scan.
B . Enable Microsoft Windows Internet Explorer Phishing Filter.
C . Enable Microsoft Windows Internet Explorer Pop-up Blocker.
D . Confirm that Microsoft Windows Internet Explorer Protected Mode is enabled on the Internet security zone.
-
You install WSUS on a server that runs Windows Server 2008. You need to ensure that the traffic between the WSUS administrative web site and the server administrators computer is encrypted What should you do()?
A . Configure SSL encryption on the WSUS server website
B . Run the netdom trust /SecurePasswordPrompt command on the WSUS server
C . Configure the NTFS permissions on the content directory to Deny Full control permission to the Everyone group
D . Configure the WSUS server to require integrated Windows authentication (IWA) hen users connect to the WSUS server.
-
Which of the following are common issues that should be considered when establishing ortroubleshooting site-to-site VPNs?(Choose all that apply.)()
A . User authentication
B . Overlapping IP address space
C . GRE or IPsec configuration
D . MTU size
E . VPN client software
F . Authentication server configured ly
-
You are designing a DNS name resolution strategy to allow all users access to internal and external web sites. What should you do?()
A . Allow zone transfers to any DNS server.
B . Create a new stub zone for the DNS zone on the DNS server.
C . Configure the DNS server to forward all unanswered queries to a DNS server located at the ISP.
D . Add the DNS server located at the ISP to the list of name servers for the fourthcoffee.com DNS zone.
-
Your company has a server that runs Windows Server 2008. The server has the Web Server (IIS) role installed. You need to activate SSL for the default Web site. Which two actions should you perform?()
A . Obtain and import a server certificate by using the IIS Manager console.
B . Select the Generate Key option in the Machine Key dialog box for the default Web site.
C . Add bindings for the HTTPS protocol to the default Web site by using the IIS Manager console.
D . Install the Digest Authentication component for the Web server role by using the Server Manager console.
-
You create a Web site that stores users' active themes in user profile objects. You need to apply users' preferred themes when they log on to the Web site. What should you do? ()
A . In the InitComplete event handler, set the Theme property of the Page object based on the user profile.
B . In the PreLoad event handler, set the Theme property of the Page object based on the user profile.
C . In the OnLoad event handler, set the Theme property of the Page object based on the user profile.
D . In the PreInit event handler, set the Theme property of the Page object based on the user profile.
-
You need to recommend a management solution for the corporate Web sites that meets the museum’s security policy What should you include in the recommendation?()
A . Internet Information Services (IIS) Manager
B . Remote Desktop Services (RDS)
C . Remote Server Administration Tools (RSAT)
D . Windows PowerShell 2.0
-
You need to prevent users from storing cookies that come from the www.contoso.com Web site. The solution must allow users to browse to the www.contoso.com Web site. What should you do?()
A . Add an entry to the Lmhosts file.
B . From the local area connection, add a DNS suffix.
C . From Internet Explorer, modify the Privacy settings.
D . From Internet Explorer, modify the Manage Add-ons settings.&e
-
You are implementing a Web page that displays text that was typed by a user. You need to display the user input in the Web page so that a cross-site scripting attack will be prevented. What should you do?()
A . Call document.write.
B . Call Response.Write.
C . Call HttpUtility.UrlEncode.
D . Call HttpUtility.HtmlEncode.
-
Which of the following are troubleshooting targets common to both site-to-site and remote-accessVPNs?(Choose all that apply.)()
A . Routing loops
B . Misconfiguration of VPN end points
C . Overiapping IP address space
D . DMVPN
E . User profiles
F . MTU
-
You are working on an existing Web site. You need to secure the Web site by redirecting all users to the logon page, Login.aspx. After logging on, users must be sent back to the page that they originally requested. Which code segment should you use?()
A .https://assets.asklib.com/images/image2/2018072714005024244.jpg
B .https://assets.asklib.com/images/image2/201807271401023676.jpg
C .https://assets.asklib.com/images/image2/2018072714010645375.jpg
D .https://assets.asklib.com/images/image2/2018072714011271828.jpg
-
You are deploying a Web site to a server managed by a hosting company. The only access you have to the server is through FTP. You need to precompile and deploy the Web site without its source files. What should you do? ()
A . Use the Copy Web tool.
B . Use the Publish Web tool.
C . Use XCOPY.
D . Use the Web Setup project Installer.
-
You are working on an existing Web site. You need to secure the Web site by redirecting all users to the logon page, Login.aspx. After logging on, users must be sent back to the page that they originally requested. Which code segment should you use? ()
A . In the Web.config file: <authorization> <deny users="?" /></authorization> On each page in the Web site: Protected Sub Page_Load(ByVal sender As Object, _ ByVal e As System.EventArgs) Handles Me.Load FormsAuthentication.Initialize() End Sub
B . On each page in the Web site: Protected Sub Page_Load(ByVal sender As Object, _ ByVal e As System.EventArgs) Handles Me.Load FormsAuthentication RedirectToLoginPage("login.aspx") End Sub
C . On each page in the Web site: Protected Sub Page_Load(ByVal sender As Object, _ ByVal e As System.EventArgs) Handles Me.Load Response.Redirect("login.aspx") End Sub
D . In the Web.config file: <authentication mode="Forms"> <forms name=".ASPXUSERDEMO" loginUrl="login.aspx" protection="All" timeout="60" /></authentication>
-
A developer for the Company.com web site has been told that users may turn off cookie support in their browsers. What must the developer do to ensure that these customers can still use the web application?()
A . The developer must ensure that every URL is properly encoded using the appropriate URL rewriting APIs
B . The developer must provide an alternate mechanism for managing sessions and abandon theHttpSession mechanism entirely
C . The developer can ignore this issue. Web containers are required to support automatic URL rewriting when cookies are not supported
D . The developer must ass the string ?id=
-
You are designing a DNS name resolution strategy to allow all users access to internal and external web sites. What should you do?()
A . Allow zone transfers to any DNS server.
B . Create a new stub zone for the DNS zone on the DNS server.
C . Configure the DNS server to forward all unanswered queries to a DNS server located at the ISP
D . Add the DNS server located at the ISP to the list of name servers for the fourthcoffee.com DNS zone
-
You create a Web site. The Web site has many predefined roles and associated users that will be used for security purposes. You need to manage these roles and user accounts. Which tool should you use? ()
A . the Microsoft .NET Framework Configuration tool
B . the Code Access Security Policy tool
C . the ASP.NET IIS Registration tool
D . the Web Site Administration Tool
-
A customer has a web application with HTTP Sessions that need to be replicated to a backup site that is more than 100 miles away from the primary site, connected over the Internet. Which type of session replication in WebLogic is recommended?()
A . MAN Replication
B . WAN Replication
C . Synchronous Replication
D . Asynchronous Replication
E . Database Replicatio
-
You have a Web server named Server1 that runs Windows Server 2003 Service Pack 2 (SP2). Server1 hosts 100 Web sites. Each Web site uses a different application pool. You need to limit the network bandwidth for one of the Web sites. What should you do? ()
A . From Internet Information Services (IIS) Manager, modify the properties of the Web site.
B . From the Properties of the Local Area Connection, install QoS Packet Scheduler. From the Local Security Policy, configure the QoS Packet Scheduler settings.
C . From the Local Security Policy, enable auditing for Object Access. From the System Properties, modify the Performance settings.
D . From the Properties of the Local Area Connection, enable and configure Network Load Balancing.
-
A college admissions Web site page that breaks down and categorizes the geographical make-up of its incoming class is an example of writing that emphasizes _____.
-
A computer that hosts web sites is called a web server.()
是
否
-
You are the network administrator for The network consists of a single Active Directory domain named All servers run Windows Server 2003.The network contains a Web server that runs IIS 6.0 and hosts a secure intranet site. All users are required to connect to the intranet site by authenticating and using HTTPS. However, because an automated Web application must connect to the Web site by using HTTP, you cannot configure the intranet site to require HTTPS.You need to collect information about which users are connecting to the Web site by using HTTPS.What should you do?()
A. Check the application log on the Web server.
B. Use Network Monitor to capture network traffic on the Web server.
C. Review the log files created by IIS on the Web server.
D. Configure a performance log to capture all Web service counters. Review the performance log data.
-
You are working on an existing Web site. You need to secure the Web site by redirecting all users to the logon page, Login.aspx. After logging on, users must be sent back to the page that they originally requested.Which code segment should you use?()
A.<img src='https://img2.soutiyun.com/shangxueba/ask/64260001-64263000/64260017/31ddc27d6b5afe8bae451bdd794657cf.jpg' />
B.<img src='https://img2.soutiyun.com/shangxueba/ask/64260001-64263000/64260017/19ad18c2d6af540e3af3cc6cf5e26d31.jpg' />
C.<img src='https://img2.soutiyun.com/shangxueba/ask/64260001-64263000/64260017/c6671967b4ef53d8df6205db1b9bc9dc.jpg' />
D.<img src='https://img2.soutiyun.com/shangxueba/ask/64260001-64263000/64260017/f2dbfcb0e5210e6a8f01932d905b2566.jpg' />
-
You are creating a custom user control. The custom user control will be used on 10 Web Forms for an ASP.NET Web site that allows users to register and log on to a personalized experience.The custom user control uses two TextBox controls and two Button controls.You need to ensure that the controls are visible only when users are not logged on to the Web site. You also need to minimize the amount of effort in development and maintenance for the Web site.Which two actions should you perform?()
A. Add the OnClick event handler for the Login button to the code used in the custom user control.
B. Add the OnClick event handler for the Login button to the code used in the Web Form where the control is added.
C. In the Page_Load method of the Web Form, add a code segment to set the visibility of the TextBox and Button controls where the control is added.
D. In the Page_Load method of the custom user control, add a code segment to set the visibility of the TextBox and Button controls.