更多“单选题Which of the following protocols is used to encrypt data between web servers and web browsers?()A SMTPB SIPC HTTPD SSL”相关问题
  • 第1题:

    Which of the following protocols is used to encrypt data between web servers and web browsers?()

    • A、SMTP
    • B、SIP
    • C、HTTP
    • D、SSL

    正确答案:D

  • 第2题:

    Which of the following is used by RADIUS to encrypt messages between the server and the client?()

    • A、Public key
    • B、CSU/DSU
    • C、Private key
    • D、Shared secret

    正确答案:D

  • 第3题:

    Which of the following protocols should be used to monitor network performance?()

    • A、SNTP
    • B、SMTP
    • C、HTTP
    • D、SNMP

    正确答案:D

  • 第4题:

    Which of the following ports are used by default for web servers? ()(Select TWO)

    • A、80
    • B、110
    • C、123
    • D、143
    • E、443

    正确答案:A,E

  • 第5题:

    Identify architecturally where in an application, Coherence stack will be used ()

    • A、 coherence resides locally on the machines of all remote application users
    • B、 coherence resides between remote users and the Web tier
    • C、 coherence resides between the Web tier and application tier
    • D、 coherence resides between the application tier and data tier

    正确答案:D

  • 第6题:

    You need to design a method to encrypt confidential data. Your solution must address the concerns of the chief information officer. What should you do?()

    • A、Encrypt customer information when it is stored and when it is being transmitted
    • B、Require encrypted connections to the public Web site, which is hosted on the Web server on the perimeter network
    • C、Encrypt all marketing information on file servers and client computers
    • D、Require encrypted connections to all file servers

    正确答案:A

  • 第7题:

    单选题
    You need to design a method to encrypt confidential data. Your solution must address the concerns of the chief information officer. What should you do?()
    A

    Encrypt customer information when it is stored and when it is being transmitted

    B

    Require encrypted connections to the public Web site, which is hosted on the Web server on the perimeter network

    C

    Encrypt all marketing information on file servers and client computers

    D

    Require encrypted connections to all file servers


    正确答案: C
    解析: 暂无解析

  • 第8题:

    单选题
    Which of the following protocols is used to encrypt data between web servers and web browsers?()
    A

    SMTP

    B

    SIP

    C

    HTTP

    D

    SSL


    正确答案: D
    解析: 暂无解析

  • 第9题:

    单选题
    Which of the following is used by RADIUS to encrypt messages between the server and the client?()
    A

    Public key

    B

    CSU/DSU

    C

    Private key

    D

    Shared secret


    正确答案: D
    解析: 暂无解析

  • 第10题:

    多选题
    Which of the following protocols encrypt communication?()
    A

    HTTPS

    B

    TELNET

    C

    SMTP

    D

    DNS

    E

    SSH


    正确答案: C,A
    解析: 暂无解析

  • 第11题:

    单选题
    Which of the following technologies can provide geographically based load balancing with high availability between two web servers with static content?()
    A

     Multicast

    B

     Active/passive cluster

    C

     Active/active cluster

    D

     DNS round robin


    正确答案: C
    解析: 暂无解析

  • 第12题:

    单选题
    Identify architecturally where in an application, Coherence stack will be used ()
    A

     coherence resides locally on the machines of all remote application users

    B

     coherence resides between remote users and the Web tier

    C

     coherence resides between the Web tier and application tier

    D

     coherence resides between the application tier and data tier


    正确答案: B
    解析: 暂无解析

  • 第13题:

    Which tool is used to simplify the migration, management and deployment of IIS Web servers, Web applications and Web sites?()

    • A、System Designer
    • B、XCOPY deployment
    • C、Deployment Designer
    • D、Web Deployment

    正确答案:D

  • 第14题:

    An administrator is attempting to recover from a power failure in the data center. Which of the following is the BEST way to recover the servers?()

    • A、 Bring up the WINS server, the DNS server, then the web server
    • B、 Bring up the web server, the time clock server, then the DHCP server
    • C、 Bring up the backup tape server, the DNS server, then the web server
    • D、 Bring up the active directory server, the DNS server, then the web server

    正确答案:D

  • 第15题:

    When load balancing traffic between two web servers, which of the following technologies provides the LOWEST cost solution?()

    • A、 Active/passive cluster
    • B、 Active/active cluster
    • C、 Log shipping
    • D、 DNS round robin

    正确答案:D

  • 第16题:

    Which of the following technologies can provide geographically based load balancing with high availability between two web servers with static content?()

    • A、Multicast
    • B、Active/passive cluster
    • C、Active/active cluster
    • D、DNS round robin

    正确答案:C

  • 第17题:

    You need to design a method to allow the new-ideas-testking.com Web site to function in accordance with security and business requirements.  What should you do?()

    • A、Require a PPTP VPN for all connections to the Web server
    • B、Require that traffic between Web browsers and the Web server uses an L2TP/IPSec tunnel
    • C、Require that traffic between Web browsers and the Web server uses SSL
    • D、Require certificate mappings between the Web server and Active Directory

    正确答案:C

  • 第18题:

    You manage a server that runs Windows Server 2008. The server has the Web Server (IIS) role installed. The server hosts an Internet-accessible Web site that has a virtual directory named /orders/. A Web server certificate is installed and an SSL listener has been configured for the Web site. The /orders/ virtual directory must meet the following company policy requirements: Be accessible to authenticated users only. Allow authentication types to support all browsers. Encrypt all authentication traffic by using HTTPS.  All other directories of the Web site must be accessible to anonymous users and be available withoutSSL.  You need to configure the /orders/ virtual directory to meet the company policy requirements.  Which two actions should you perform?()

    • A、Configure the Web site to the Require SSL setting.
    • B、Configure the /orders/ virtual directory to the Require SSL setting.
    • C、Configure the Digest Authentication setting to Enabled for the /orders/ virtual directory.
    • D、Configure the Basic Authentication setting to Enabled and the Anonymous Authentication setting to Disabled for the Web site.
    • E、Configure the Basic Authentication setting to Enabled and the Anonymous Authentication setting to Disabled for the /orders/ virtual directory.

    正确答案:B,E

  • 第19题:

    单选题
    When load balancing traffic between two web servers,which of the following technologies provides the LOWEST cost solution?()
    A

    Active/passive cluster

    B

    Active/active cluster

    C

    Log shipping

    D

    DNS round robin


    正确答案: D
    解析: 暂无解析

  • 第20题:

    单选题
    When load balancing traffic between two web servers, which of the following technologies provides the LOWEST cost solution?()
    A

     Active/passive cluster

    B

     Active/active cluster

    C

     Log shipping

    D

     DNS round robin


    正确答案: B
    解析: 暂无解析

  • 第21题:

    单选题
    Which tool is used to simplify the migration, management and deployment of IIS Web servers, Web applications and Web sites?()
    A

    System Designer

    B

    XCOPY deployment

    C

    Deployment Designer

    D

    Web Deployment


    正确答案: C
    解析: 暂无解析

  • 第22题:

    单选题
    Which of the following technologies can provide geographically based load balancing with high availability between two web servers with static content?()
    A

    Multicast

    B

    Active/passive cluster

    C

    Active/active cluster

    D

    DNS round robin


    正确答案: D
    解析: 暂无解析

  • 第23题:

    单选题
    You need to design a method to allow the new-ideas-testking.com Web site to function in accordance with security and business requirements.  What should you do?()
    A

    Require a PPTP VPN for all connections to the Web server

    B

    Require that traffic between Web browsers and the Web server uses an L2TP/IPSec tunnel

    C

    Require that traffic between Web browsers and the Web server uses SSL

    D

    Require certificate mappings between the Web server and Active Directory


    正确答案: A
    解析: 暂无解析

  • 第24题:

    单选题
    An administrator is attempting to recover from a power failure in the data center. Which of the following is the BEST way to recover the servers?()
    A

     Bring up the WINS server, the DNS server, then the web server

    B

     Bring up the web server, the time clock server, then the DHCP server

    C

     Bring up the backup tape server, the DNS server, then the web server

    D

     Bring up the active directory server, the DNS server, then the web server


    正确答案: B
    解析: 暂无解析