Which command is used to enable access to J-Web using HTTPS?()
第1题:
You need to enable hibernation support for a computer that runs Windows XP Professional. What should you do?()
第2题:
You need to determine the correct wireless LAN topology for use in the Company network. Which three statements are true about the various WLAN topologies?()
第3题:
A machine has just been installed with AIX, and no system parameters have been changed. In order to enable routing function, which of the following "no" options should be changed?()
第4题:
Which CLI command do you use to block MIME content at the [edit security utm feature-profile] hierarchy?()
第5题:
Which configuration command is used to make the ERX Edge Router an NTP server?()
第6题:
You issued the following command at the UNIX environment: % setenv ORA_SDTZ ’OZ_TZ’ What will be the impact of issuing the above command?()
第7题:
You work as the IT professional in an international company which is named Wiikigo. You are experiencedin implementing and administering a network operating system. You are specialized in deploying servers,configuring Windows Server 2008 Terminal services and network application services, and configuring aweb services infrastructure. You have a Terminal Services farm that contains several Terminal Servers. One of the Terminal Serversshould be configured as a dedicated redirector. After you configure the appropriate DNS records,what action should you perform next?()
第8题:
You work as the IT professional in an international company which is named Wiikigo. You are experiencedin implementing and administering a network operating system. You are specialized in deploying servers,configuring Windows Server 2008 Terminal services and network application services, and configuring aweb services infrastructure. You are in charge of a member server which runs Windows Server 2008. The Terminal Services serverrole has been installed on the server. Microsoft Windows System Resource Manager (WSRM) is installedon the server. Now you receive report from users saying about performance degradation on the TerminalServer. You monitor the server and notice that one user is consuming 100 percent of the processor time.You create a resource-allocation policy named Policy1 that limits each user to 30 percent of the totalprocessor time. But you do not see any performance improvement. WSRM needs to be configured toenforce Policy1. What action should you perform?()
第9题:
You work as the IT professional in an international company which is named Wiikigo. You are experiencedin implementing and administering a network operating system. You are specialized in deploying servers,configuring Windows Server 2008 Terminal services and network application services,and configuring aweb services infrastructure. You are in charge of a server that runs Windows Server 2008. The TerminalServices server role is installed on the server. A Terminal Services application runs on the server. Now youreceive report from users saying that that the application stops responding. You monitor the memory usageon the server for a week and find that the application has a memory leak. A patch is not currently available.You create a new resource-allocation policy in Microsoft Windows System Resource Manager (WSRM).You configure a Process Matching Criteria named TrackShip and choose the application. You have toterminate the application when the application consumes more than half of the available memory on theserver. What action should you perform?()
第10题:
The operating system local time zone will be set for a user session using the operating system environment variable.
The database local time zone will be set for a user session using the operating system environment variable.
The operating system local time zone will be set for the database using the operating system environment
The database local time zone will be set for the database using the operating system environment variable.
第11题:
set system remote-access provle https
set services remote-access profile j-web-https
set system services web-management https
set services web-management j-web-https
第12题:
set ntp-server
set ntp server
ntp-server enable
ntp server enable
第13题:
Which JUNOS software command establishes a connection to a RADIUS server with an IP addressof 10.100.200.1?()
第14题:
A system has a critical need for network services on a small network with a limited number of hosts. System overhead is not a concern. Which of the following should the system administrator do to help ensure connectivity in the event of a gateway failure?()
第15题:
Which operational mode command can be used to synchronize the local system time with an NTP server?()
第16题:
Which operational mode command can be used to synchronize the local system with an NTP server?()
第17题:
You have configured a UTM profile called Block-Spam, which has the appropriate antispam configuration to block undesired spam e-mails.Which configuration would protect an SMTP server in the dmz zone from spam originating in the untrust zone?()
第18题:
You work as the IT professional in an international company which is named Wiikigo. You are experiencedin implementing and administering a network operating system. You are specialized in deploying servers,configuring Windows Server 2008 Terminal services and network application services, and configuring aweb services infrastructure. There is an Active Directory domain in your company. The company runsTerminal Services. You have the head office printer configured as the default printer on the TerminalServer. According to the requirements of the company policy, all remote client computers must meet thefollowing requirements: Users must be able to access their local printers during a terminal session. The head office printer must bethe default printer of the client computers. A Group Policy object (GPO) needs to be created by using theTerminal Services Printer Redirection template to meet the company policy. What action should you perform?()
第19题:
Your network consists of a single Active Directory domain. The network contains a server that runs Windows Server 2003 Service Pack 2 (SP2). The server has an application that runs as a service. The application uses a domain service account to access other servers in the domain. Security policies require that users reset their passwords every 30 days. After the application runs for a month, the application fails.You need to ensure that the application starts and can access the remote servers. What should you do?()
第20题:
You are creating an ASP.NET web application that hosts several Windows Communication Foundation (WCF) services. The services have ASP.NET Compatibility Mode enabled. Users authenticate with the Web application by using a cookie-based ASP.NET Forms Authentication model. You add a service file named Authentication.svc that contains the following code segment: <%@ ServiceHost Service="System.Web.ApplicationServices.AuthenticationService" Factory="System.Web.ApplicationServices.ApplicationServicesHostFactory" %> You need to ensure that users can access the WCF services without having to re-authenticate. Which two configuration settings should you add? (Each is part of a complete solution. Choose two.)()
第21题:
In the system web. Extensions scripting/webServices/authenticationService element, set the enabled attribute to true.
In the system web. Extensions scripting/webServices/profileService element, set the enabled attribute to true.
Add a service endpoint with basicHttpBinding for the contract System.Web.ApplicationServices.AuthenticationService.
Add a custom service behavior named AuthenticationService Type Behaviors with a service AuthenticationManager element that has service AuthenticationManagerType set to System.Web.Security.SQL Membership Provider
第22题:
In ad hoc mode, the Independent Basic Service Set (IBSS) is a framework in which mobile clients connect directly without an intermediate access point.
In Infrastructure mode, the Basic Service Set (BSS) is a framework in which mobile clients use a single access point for connecting to each other or to wired network resources.
In Infrastructure mode, the Extended Services Set (ESS) is a framework in which two or more Basic Service Sets are connected by a common distribution system (DS).
In Infrastructure mode, the Independent Basic Service Setet (IBSS) is a framework in which mobile clients connect directly without an intermediate access point.
In ad hoc mode, the Basic Service Set (BSS) is a framework in which mobile clients use a single AP for connecting to each other or to wired network resources.
In ad hoc mode, the Extended Services Set (ESS) is a framework in which two or more Basic Service Sets are connected by a common distribution system (DS)
第23题:
set system remote-access profile https
set services remote-access profile j-web-https
set system services web-management https
set services web-management j-web-https