A brand new network application is required for the Acme Company, and they are considering the use of a connectionless service. What are the characteristics of a connectionless service?()A、It uses a Reliable transport mechanism.B、It uses a Non-reliable tr

题目

A brand new network application is required for the Acme Company, and they are considering the use of a connectionless service. What are the characteristics of a connectionless service?()

  • A、It uses a Reliable transport mechanism.
  • B、It uses a Non-reliable transport mechanism
  • C、It is less bandwidth-intensive than connection oriented services
  • D、it uses handshaking

相似考题
更多“A brand new network application ”相关问题
  • 第1题:

    OSI参考模型有哪些层,按顺序()。

    A.Application、session、transport、network、physical、physical、datalink

    B.Application、presentation、session、network、transport、datalink,physical

    C.Application、presentation、session、transport、network、datalink、physical

    D.Application、session、transport、physical、network、physical、datalink


    正确答案:C

  • 第2题:

    How are custom controls made?()

    • A、By assembling existing controls
    • B、By combining multipleXPages together
    • C、By creating a brand new widget from scratch
    • D、By writing the code for a brand new control

    正确答案:A

  • 第3题:

    Multicast is being deployed in the network, and only ip pim sparse-dense mode has been configured on all interfaces in the network to support a new video streaming application. No other multicast configuration was applied anywhere in the network. Since enabling multicast, the network monitoring tools show periodic spikes in link utilization throughout the network, even in areas where the video application is not being used. What could be a possible cause?()

    • A、PIM sparse mode is being used.
    • B、PIM dense mode is being used.
    • C、The BGP multicast address family has not been configured.
    • D、IGMP version 3 is being used.
    • E、IP PIM neighbor filters have not been applied.

    正确答案:B

  • 第4题:

    Your network consists of Windows XP computers in a single Active Directory directory service   domain. All computers are located in a single Active Directory site. You need to design and deploy a new  Group Policy object (GPO) that automatically installs a custom application on computers.  What are two possible ways to achieve this goal?()

    • A、 Link the GPO to the domain and assign the application.
    • B、 Link the GPO to the site and assign the application.
    • C、 Link the GPO to the domain and publish the application.
    • D、 Link the GPO to the site and publish the application.

    正确答案:A,B

  • 第5题:

    You create Windows Forms applications by using the .NET Framework 3.5.You plan to deploy a new application by using the ClickOnce deployment technology.  The application is signed by using a certificate obtained from a trustworthy authority. You need to ensure that the application can be deployed as a trusted application to Windows Vista client computers on a corporate network.What should you do?()

    • A、Create a manifest and set the RequestedExecutionLevel level attribute to AsInvoker.
    • B、Create a manifest and set the RequestedExecutionLevel level attribute to AsAdministrator.
    • C、Create a new certificatetrust list (CTL).Install the CTL on the server that has the ClickOnce application published.
    • D、Create a new certificate trust list (CTL).Request the network administrator to deploy the CTL by using Group Policy.

    正确答案:D

  • 第6题:

    You are the network administrator for your company. The network consists of a single Active Directory domain. The network contains an application server running Windows Server 2003.   Users report intermittent slow performance when they access the application server throughout the day. You find out that the network interface on the application server is being heavily used during the periods of slow performance. You suspect that a single computer is causing the problem.You need to create a plan to identify the problem computer.   What should you do?()

    • A、 Monitor the performance monitor counters on the application server by using System Monitor.  
    • B、 Monitor the network traffic on the application server by using Network Monitor.
    • C、 Monitor network statistics on the application server by using Task Manager.
    • D、 Run network diagnostics on the application server by using Network Diagnostics.

    正确答案:B

  • 第7题:

    Your network contains an Active Directory domain named contoso.com. The network has DirectAccess deployed.You deploy a new server named Server1 that hosts a management application.You need to ensure that Server1 can initiate connections to DirectAccess client computers.Which settings should you modify from the DirectAccess Setup console?()

    • A、Application Servers
    • B、DirectAccess Server
    • C、Infrastructure Servers
    • D、Remote Clients

    正确答案:C

  • 第8题:

    单选题
    Your network contains an Active Directory domain. You have a server that runs Windows Server 2008 R2 and has the Remote Desktop Services server role enabled. All client computers run Windows 7. You need to plan the deployment of a new line-of-business application to all client computers. The  deployment must meet the following requirements:   èUsers must access the application from an icon on their desktops.   èUsers must have access to the application when they are not connected to the network. What should you do?()
    A

    Publish the application as a RemoteApp.

    B

    Publish the application by using Remote Desktop Web Access (RD Web Access).

    C

    Assign the application to the Remote Desktop Services server by using a Group Policy object (GPO).

    D

    Assign the application to all client computers by using a Group Policy object (GPO).


    正确答案: A
    解析: 暂无解析

  • 第9题:

    单选题
    Your network contains an Active Directory forest. The functional level of the forest is Windows Server  2008 R2.   Your companys corporate security policy states that the password for each user account must be  changed at least every 45 days.   You have a user account named Service1. Service1 is used by a network application named Application1.   Every 45 days, Application1 fails.   After resetting the password for Service1, Application1 runs properly.   You need to resolve the issue that causes Application1 to fail. The solution must adhere to the corporate  security policy.   What should you do()
    A

    Run the Set-ADAccountControl cmdlet.

    B

    Run the Set-ADServiceAccount cmdlet.

    C

    Create a new password policy.

    D

    Create a new Password Settings object (PSO).


    正确答案: D
    解析: 暂无解析

  • 第10题:

    单选题
    You are the network administrator for your company. The network consists of a single Active Directory domain. The network contains 50 application servers that run Windows Server 2003.   The security configuration of the application servers is not uniform. The application servers were deployed by local administrators who configured the settings for each of the application servers differently based on their knowledge and skills. The application servers are configured with different authentication methods, audit settings, and account policy settings.   The security team recently completed a new network security design. The design includes a baseline configuration for security settings on all servers. The baseline security settings use the Hisecws.inf predefined security template. The design also requires modified settings for servers in an application role. These settings include system service startup requirements, renaming the administrator account, and more stringent account lockout policies. The security team created a security template named Application.inf that contains the modified settings.   You need to plan the deployment of the new security design. You need to ensure that all security settings for the application servers are standardized, and that after the deployment, the security settings on all application servers meet the design requirements.   What should you do? ()
    A

     Apply the Setup security.inf template first, the Hisecws.inf template next, and then the Application.inf template.

    B

     Apply the Application.inf template and then the Hisecws.inf template.

    C

     Apply the Application.inf template first, the Setup security.inf template next, and then the Hisecws.inf template.

    D

     Apply the Setup security.inf template and then the Application.inf template.


    正确答案: C
    解析: 暂无解析

  • 第11题:

    单选题
    You are the network administrator for The network consists of a single Active Directory domain named All servers run Windows Server 2003 You install a new server named TestKing6. You install an application on TestKing6. The application fails to start because of the NTFS permission on TestKing6 are too restrictive. You use a security template from the manufacturer of the application to modify the NTFS permissions on TestKing6 to allow the application work. A new update to the application is released. The application no longer requires the modified NTFS permissions. You need to restore the default permissions on TestKing6 to restore the original level of system security. Which security template should you import into the local security policy of TestKing6?()
    A

    The Syssetup.inf template.

    B

    The Profsec.inf template.

    C

    The Defltsv.inf template.

    D

    The Netserv.inf template.


    正确答案: D
    解析: 暂无解析

  • 第12题:

    多选题
    A brand new network application is required for the Acme Company, and they are considering the use of a connectionless service. What are the characteristics of a connectionless service?()
    A

    It uses a Reliable transport mechanism.

    B

    It uses a Non-reliable transport mechanism

    C

    It is less bandwidth-intensive than connection oriented services

    D

    it uses handshaking


    正确答案: C,B
    解析: 暂无解析

  • 第13题:

    A brand new network application is required for the Acme Company, and they are considering the use of a connectionless service. What are the characteristics of a connectionless service?()

    A. It uses a Reliable transport mechanism.

    B. It uses a Non-reliable transport mechanism

    C. It is less bandwidth-intensive than connection oriented services

    D. it uses handshaking


    参考答案:B, C

  • 第14题:

    OSI参考模型有哪些层,按顺序()

    • A、Application、session、transport、network、physical、physical、datalink
    • B、Application,presentation,session,network,transport,datalink,physical
    • C、Application,presentation,session,transport,network,datalink,physical
    • D、Application,session,transport,physical、network、physical、datalink

    正确答案:C

  • 第15题:

    You are the network administrator for your company. The network consists of a single Active Directory domain. The network contains 50 application servers that run Windows Server 2003.   The security configuration of the application servers is not uniform. The application servers were deployed by local administrators who configured the settings for each of the application servers differently based on their knowledge and skills. The application servers are configured with different authentication methods, audit settings, and account policy settings.   The security team recently completed a new network security design. The design includes a baseline configuration for security settings on all servers. The baseline security settings use the Hisecws.inf predefined security template. The design also requires modified settings for servers in an application role. These settings include system service startup requirements, renaming the administrator account, and more stringent account lockout policies. The security team created a security template named Application.inf that contains the modified settings.   You need to plan the deployment of the new security design. You need to ensure that all security settings for the application servers are standardized, and that after the deployment, the security settings on all application servers meet the design requirements.   What should you do? ()

    • A、 Apply the Setup security.inf template first, the Hisecws.inf template next, and then the Application.inf template.
    • B、 Apply the Application.inf template and then the Hisecws.inf template.
    • C、 Apply the Application.inf template first, the Setup security.inf template next, and then the Hisecws.inf template.
    • D、 Apply the Setup security.inf template and then the Application.inf template.

    正确答案:A

  • 第16题:

    You create Windows Forms application by using the .Net FrameWork 3.5 You plan to deploy a new application to client computers that use the Windows Vista operating system. You need to ensure that the user can install the application without being prompted fore elevated permission.What should you do?()

    • A、Sign the deployment manifest by using an Authenticode certificate.Publish the application to a CD-ROM.Install the application on each client computer from the CD-ROM
    • B、Sign the deployment manifest by using an Authenticode certificate.Publish the application to a server on the network.Install the application on each client computer.
    • C、Add the requestedExecutionLevel="highestAvailable" attribute to the deployment.Publish the application to a server on the network.Install the application on each client computer.
    • D、Add the requestedExecutionLevel="requiresAdministrator" attribute to the deployment.Publish the application to a server on the network.Install the application on each client computer.

    正确答案:A

  • 第17题:

    You are the network administrator for Testking.com. The TestKing network contains seven application servers. Each application server runs a database application named TestKingApp. Requirements for TestKingApp state that when you add a new user, you must add the user to the server that has the most available disk space. You need to ensure that you meet the requirements when you add new users to TestKingApp. What should you do?()

    • A、Use Event Viewer to review the application logs on each of the seven servers.
    • B、Use Performance Logs and Alerts to record the PhysicalDisk object on all seven servers.
    • C、Use Task Manager to view the performance data on each of the seven servers.
    • D、Use System Monitor to generate a histogram view of the LogicalDisk object on all seven servers.

    正确答案:B

  • 第18题:

    You are the network administrator for . The network consists of single Active directory domain. The domain contains a Windows Server 2003 domain controller named TestKing3. The securews.inf security policy has been applied to the domain. A network application requires a service account. The network application runs constantly. You create and configure a service account named SrvAcct for the network application. The software functions properly using the new account and service. You discover an ongoing brute force attack against the SrvAcct account. The intruder appears to be attempting a distributed attack from several Windows XP Professional domain member computers on the LAN. The account has not been compromised and you are able to stop the attack, you restart Server6 and attempt to run the network application, but the application does not respond.()

    • A、Reset the SrvAcct password,
    • B、Configure the default Domain Controllers policy to assign the SrvAcct account the right to log on locally.
    • C、Unlock the SrvAcct account.
    • D、Restart the NetAppService service.

    正确答案:C

  • 第19题:

    单选题
    How are custom controls made?()
    A

    By assembling existing controls

    B

    By combining multipleXPages together

    C

    By creating a brand new widget from scratch

    D

    By writing the code for a brand new control


    正确答案: B
    解析: 暂无解析

  • 第20题:

    单选题
    Your company has 1,000 client computers.  You are planning to deploy Windows 7 and a new line-of-business application.   You have the following requirements:   Install the application as part of the standard Windows 7 deployment. Use a single Windows 7 image for the deployment.  The application must be available for use on client computers that are not connected to the network.   You need to ensure that the application is installed on all new client computers.   What should you do?()
    A

    Publish the application by using Group Policy Software Installation.

    B

    Deploy the application by using Windows Server Update Services (WSUS).

    C

    Service an online image of Windows 7 to add the new application.

    D

    Service an offline image of Windows 7 to add the new application.


    正确答案: A
    解析: 暂无解析

  • 第21题:

    单选题
    You perform a security audit on a server named server1. You install the Microsoft network monitor 3.0 application on server1. You find that only some of the captured frames dsplay host mnemonic names in the source column and the destination column. All other frames display ip addresses. You need to display mnemonic host names instead of ip addresses for all the frames what should you do?()
    A

    Create a new display filter and apply the filter to the capture.

    B

    Create a new capture filter and apply the filter to the capture.

    C

    Populate the aliases table and apply the aliases to the capture.

    D

    Configure the network monitor application to enable the enable converstations option, recapture the data to a new file.


    正确答案: A
    解析: 暂无解析

  • 第22题:

    多选题
    You are an enterprise administrator for Cer-tech .com. The corporate network of the company consists ofan Active Directory domain. All the servers on the network run Windows Server 2008. The network runs aTerminal services role on a server to enable remote users to run commonly required applications from theirterminal. A Terminal Services application called App1 that runs on the server has suddenly stopped responding. Todiagnose the problem, you monitored the memory usage on the server for a week and discover that App1application has a memory leak. To resolve the problem, you first looked for a patch but that was not currently available. So you created a new resource-allocation policy in Microsoft Windows Server ResourceManager and configured a Process Matching Criteria named TrackMem for the application. Which of the following options would you choose to terminate the application when the application consumes more than half of the available memory on the server?()
    A

    Configure the resource-allocation policy and set the maximum working set limit option to half theavailable memory on the server.

    B

    Configure the resource-allocation policy and set the maximum committed memory option to half theavailable memory on the server.

    C

    Set the new policy as a Profiling Policy.

    D

    Set the new policy as a Managing Policy.


    正确答案: D,A
    解析: 暂无解析

  • 第23题:

    单选题
    From your Windows 2000 Professional computer, you need to print from a 16-bit accounting application to a network printer named Printer02.Printer02 is attached to a print server named PrtSrv. The accounting application allows you to print only to a local LPT port. You currently have two printers attached to your local LPT1 and LPT2 ports. You need to be able to print to the network printer and to both local printers. You install the driver for the network printer on your computer.   What must you do next to enable printing on the network printer?()
    A

    Create a new local printer port named PrtSrv/Printer02, and configure the printer to use the new port.

    B

    Create a new local printer port named PrtSrv/Printer02.in the properties for the new port, select the option to print directly to the printer.  Configure the printer to use the new port.

    C

    Run the net use Ipt3 //PrtSrv/Printer02 command.

    D

    Run the net print //PrtSrv/Printer02 command.


    正确答案: C
    解析: The net use command is the only method available for accessing a network printer from client computers that are running 16-bit DOS applications.