SMTP
SIP
HTTP
SSL
第1题:
Which of the following protocols is used to encrypt data between web servers and web browsers?()
第2题:
Which of the following is used by RADIUS to encrypt messages between the server and the client?()
第3题:
Which of the following protocols should be used to monitor network performance?()
第4题:
Which of the following ports are used by default for web servers? ()(Select TWO)
第5题:
Identify architecturally where in an application, Coherence stack will be used ()
第6题:
You need to design a method to encrypt confidential data. Your solution must address the concerns of the chief information officer. What should you do?()
第7题:
Encrypt customer information when it is stored and when it is being transmitted
Require encrypted connections to the public Web site, which is hosted on the Web server on the perimeter network
Encrypt all marketing information on file servers and client computers
Require encrypted connections to all file servers
第8题:
SMTP
SIP
HTTP
SSL
第9题:
Public key
CSU/DSU
Private key
Shared secret
第10题:
HTTPS
TELNET
SMTP
DNS
SSH
第11题:
Multicast
Active/passive cluster
Active/active cluster
DNS round robin
第12题:
coherence resides locally on the machines of all remote application users
coherence resides between remote users and the Web tier
coherence resides between the Web tier and application tier
coherence resides between the application tier and data tier
第13题:
Which tool is used to simplify the migration, management and deployment of IIS Web servers, Web applications and Web sites?()
第14题:
An administrator is attempting to recover from a power failure in the data center. Which of the following is the BEST way to recover the servers?()
第15题:
When load balancing traffic between two web servers, which of the following technologies provides the LOWEST cost solution?()
第16题:
Which of the following technologies can provide geographically based load balancing with high availability between two web servers with static content?()
第17题:
You need to design a method to allow the new-ideas-testking.com Web site to function in accordance with security and business requirements. What should you do?()
第18题:
You manage a server that runs Windows Server 2008. The server has the Web Server (IIS) role installed. The server hosts an Internet-accessible Web site that has a virtual directory named /orders/. A Web server certificate is installed and an SSL listener has been configured for the Web site. The /orders/ virtual directory must meet the following company policy requirements: Be accessible to authenticated users only. Allow authentication types to support all browsers. Encrypt all authentication traffic by using HTTPS. All other directories of the Web site must be accessible to anonymous users and be available withoutSSL. You need to configure the /orders/ virtual directory to meet the company policy requirements. Which two actions should you perform?()
第19题:
Active/passive cluster
Active/active cluster
Log shipping
DNS round robin
第20题:
Active/passive cluster
Active/active cluster
Log shipping
DNS round robin
第21题:
System Designer
XCOPY deployment
Deployment Designer
Web Deployment
第22题:
Multicast
Active/passive cluster
Active/active cluster
DNS round robin
第23题:
Require a PPTP VPN for all connections to the Web server
Require that traffic between Web browsers and the Web server uses an L2TP/IPSec tunnel
Require that traffic between Web browsers and the Web server uses SSL
Require certificate mappings between the Web server and Active Directory
第24题:
Bring up the WINS server, the DNS server, then the web server
Bring up the web server, the time clock server, then the DHCP server
Bring up the backup tape server, the DNS server, then the web server
Bring up the active directory server, the DNS server, then the web server