多选题You have been contracted to create a web site for a free dating service. One feature is the ability for oneclient to send a message to another client, which is displayed in the latter client’s private page. Your contract explicitly states that security

题目
多选题
You have been contracted to create a web site for a free dating service. One feature is the ability for oneclient to send a message to another client, which is displayed in the latter client’s private page. Your contract explicitly states that security is a high priority. Therefore, you need to prevent cross-site hacking inwhich one user inserts JavaScript code that is then rendered and invoked when another user views thatcontent. Which two JSTL code snippets will prevent cross site hacking in the scenario above? ()
A

<c:out>${message}</c:out>

B

<c:out value=’${message}’ />

C

<c:out value=’${message}’ escapeXml=’true’ />

D

<c:out eliminateXml=’true’>${message}</c:out>

E

<c:out value=’${message}’ eliminateXml=’true’ />


相似考题
参考答案和解析
正确答案: D,C
解析: 暂无解析
更多“多选题You have been contracted to create a web site for a free dating service. One feature is the ability for oneclient to send a message to another client, which is displayed in the latter client’s private page. Your contract explicitly states that security”相关问题
  • 第1题:

    Your company has a single Active Directory directory service domain. All servers in your environment run Windows Server 2003. Client computers run Windows XP or Windows Vista. You plan to create a security update scan procedure for client computers. You need to choose a security tool that supports all the client computers.  Which tool should you choose? ()

    • A、 UrlScan Security Tool
    • B、 Enterprise Scan Tool (EST)
    • C、 Malicious Removal Tool (MRT)
    • D、 Microsoft Baseline Security Analyzer (MBSA)

    正确答案:D

  • 第2题:

    You are building a dating web site. The client’s date of birth is collected along with lots of other information.The Person class has a derived method, getAge():int, which returns the person’s age calculated from thedate of birth and today’s date. In one of your JSPs you need to print a special message to clients within theage group of 25 through 35. Which two EL code snippets will return true for this condition? ()

    • A、${client.age in [25,35]}
    • B、${client.age between [25,35]}
    • C、${client.age between 25 and 35}
    • D、${client.age <= 35 && client.age >= 25}
    • E、${client.age le 35 and client.age ge 25}

    正确答案:D,E

  • 第3题:

    You have a single Active Directory directory service domain. You use a Group Policy object (GPO) to apply security settings to your client computers. You configure the startup type for system services settings in a new GPO, and you link the GPO to an organizational unit (OU).  You discover that the startup type for system services on one of the client computers has not been updated. You need to ensure that the Group Policy settings are applied to the client computer. What should you do?()

    • A、  Restart the client computer.
    • B、 Instruct the user to log off and then log on to the client computer.
    • C、 On the client computer, run the Gpupdate.exe command with the /Force parameter.
    • D、 On the client computer, run the Gpupdate.exe command with the /Target:computer parameter.

    正确答案:A

  • 第4题:

    You are the desktop administrator for your company. Your company’s software developers use Windows XP Professional and IIS on their client computers to develop Web-based applications. All client computers use Microsoft Internet Explorer 6. 0 or later as their Web browser. One of the developers reports that he can no longer access the Web-based application on his desktop by using his Web browser. When you attempt to access the application by using your Web browser, you receive the following error message: “Cannot find server or DNS Error.” You verify that the World Wide Web Publishing Service is started on the developer’s computer. You also verify that you are using the correct URL to access the developer’s computer by using your Web browser. You need to ensure that the developer can access the Web application by using his Web browser. How should you configure the developer’s computer?() 

    • A、Start the default Web site.
    • B、Start the IIS Admin Service.
    • C、Run the IPconfig /registerdns command.
    • D、In the default Web site properties,disable the host header setting.

    正确答案:A

  • 第5题:

    All client computers in your network run Windows 7 with default firewall settings.   You have a server-based application that requires an agent to be installed on all client computers.   You need to use Group Policy to allow the application to initiate installation of the agent on all client computers.   What should you do?()

    • A、Create inbound port rules.
    • B、Create inbound program rules.
    • C、Create connection security rules.
    • D、Create Windows service hardening rules.

    正确答案:A

  • 第6题:

    Your company has client computers that run Windows Vista and client computers that run Windows 7.   The client computers connect directly to the Microsoft Update Web site once per week and automatically install all available security updates.  Microsoft releases a security update for Windows 7.   You have the following requirements:   Create a report of all Windows 7 computers that are currently connected to the network and that do not have the security update installed. Use the least amount of administrative effort.  You need to manage the software update process to meet the requirements.   What should you do?()

    • A、 Deploy Microsoft Windows Server Update Services (WSUS). Approve the security update for installation,and forcea detection cycle on the client computers.
    • B、 Deploy Microsoft Windows Server Update Services (WSUS). Approve the security update for detection, and force adetection cycle on the client computers.
    • C、 Use the Microsoft Baseline Security Analyzer (MBSA) to scan the client computers.Configure MBSA to use the Microsoft Update site catalog.
    • D、 Use the Microsoft Baseline Configuration Analyzer (MBCA) to scan the client computers.

    正确答案:C

  • 第7题:

    Your company has an internal Web site that requires HTTPS. The Web site s certificate is self-signed. Youhave a computer that runs Windows 7 and Windows Internet Explorer 8. You use HTTPS to browse to theWeb site and receive the following warning message: There is a problem with this website s security certificate. You need to prevent the warning message from appearing when you access the Web site.  What should you do?()

    • A、From Internet Explorer, enable InPrivate Browsing.
    • B、From Internet Explorer, add the Web site to the Trusted sites zone.
    • C、From Certificate Manager, import the Web site s certificate into your Personal store.
    • D、From Certificate Manager, import the Web site s certificate into your Trusted Root CertificationAuthorities store.

    正确答案:D

  • 第8题:

    A Windows Communication Foundation (WCF) service has a callback contract. You are developing a client application that will call this service.You must ensure that the client application can interact with the WCF service. What should you do?()

    • A、On the OperationContractAttribute, set the AsyncPattern property value to true.
    • B、On the OperationContractAttribute, set the ReplyAction property value to the endpoint address of the client.
    • C、On the client, create a proxy derived from DuplexClientBase<TChannel >.
    • D、On the client, use GetCallbackChannel<T >.

    正确答案:C

  • 第9题:

    多选题
    You have an Exchange 2010 organization.  Your companys security policy states that all connections to Outlook Web App (OWA) must use smartcard authentication.  You need to recommend a solution to meet the security policy requirements.  Which two possible ways to achieve this goal should you recommend?()
    A

    Require certificate-based authentication for all Internet-facing Client Access servers.

    B

    Require Windows Integrated Authentication for all Internet-facing Client Access servers.

    C

    Deploy an Edge Transport server, and then disable Windows Integrated Authentication.

    D

    Deploy a server that runs Microsoft Internet Security and Acceleration (ISA) Server, and then enableKerberos constrained delegation.


    正确答案: A,B
    解析: 暂无解析

  • 第10题:

    单选题
    You are building a dating web site. The client’s date of birth is collected along with lots of other information.You have created an EL function with the signature: calcAge(java.util.Date):int and it is assigned to the name, age, in the namespace, funct. In one of your JSPsyou need to print a special message to clients who are younger than 25.  Which EL code snippet will returntrue for this condition?()
    A

    ${calcAge(client.birthDate) < 25}

    B

    ${calcAge[client.birthDate] < 25}

    C

    ${funct:age(client.birthDate) < 25}

    D

    ${funct:age[client.birthDate] < 25}

    E

    ${funct:calcAge(client.birthDate) < 25}


    正确答案: A
    解析: 暂无解析

  • 第11题:

    单选题
    You are the desktop administrator for your company. Your company’s software developers use Windows XP Professional and IIS on their client computers to develop Web-based applications. All client computers use Microsoft Internet Explorer 6. 0 or later as their Web browser. One of the developers reports that he can no longer access the Web-based application on his desktop by using his Web browser. When you attempt to access the application by using your Web browser, you receive the following error message: “Cannot find server or DNS Error.” You verify that the World Wide Web Publishing Service is started on the developer’s computer. You also verify that you are using the correct URL to access the developer’s computer by using your Web browser. You need to ensure that the developer can access the Web application by using his Web browser. How should you configure the developer’s computer?()
    A

    Start the default Web site.

    B

    Start the IIS Admin Service.

    C

    Run the IPconfig /registerdns command.

    D

    In the default Web site properties,disable the host header setting.


    正确答案: D
    解析: 暂无解析

  • 第12题:

    单选题
    Your company has client computers that run Windows Vista and client computers that run Windows 7.   The client computers connect directly to the Microsoft Update Web site once per week and automatically install all available security updates.  Microsoft releases a security update for Windows 7.   You have the following requirements:   Create a report of all Windows 7 computers that are currently connected to the network and that do not have the security update installed. Use the least amount of administrative effort.  You need to manage the software update process to meet the requirements.   What should you do?()
    A

     Deploy Microsoft Windows Server Update Services (WSUS). Approve the security update for installation,and forcea detection cycle on the client computers.

    B

     Deploy Microsoft Windows Server Update Services (WSUS). Approve the security update for detection, and force adetection cycle on the client computers.

    C

     Use the Microsoft Baseline Security Analyzer (MBSA) to scan the client computers.Configure MBSA to use the Microsoft Update site catalog.

    D

     Use the Microsoft Baseline Configuration Analyzer (MBCA) to scan the client computers.


    正确答案: D
    解析: 暂无解析

  • 第13题:

    You are building a dating web site. The client’s date of birth is collected along with lots of other information.You have created an EL function with the signature: calcAge(java.util.Date):int and it is assigned to the name, age, in the namespace, funct. In one of your JSPsyou need to print a special message to clients who are younger than 25.  Which EL code snippet will returntrue for this condition?()

    • A、${calcAge(client.birthDate) < 25}
    • B、${calcAge[client.birthDate] < 25}
    • C、${funct:age(client.birthDate) < 25}
    • D、${funct:age[client.birthDate] < 25}
    • E、${funct:calcAge(client.birthDate) < 25}

    正确答案:C

  • 第14题:

    You have been contracted to create a web site for a free dating service. One feature is the ability for oneclient to send a message to another client, which is displayed in the latter client’s private page. Your contract explicitly states that security is a high priority. Therefore, you need to prevent cross-site hacking inwhich one user inserts JavaScript code that is then rendered and invoked when another user views thatcontent. Which two JSTL code snippets will prevent cross site hacking in the scenario above? ()

    • A、<c:out>${message}</c:out>
    • B、<c:out value=’${message}’ />
    • C、<c:out value=’${message}’ escapeXml=’true’ />
    • D、<c:out eliminateXml=’true’>${message}</c:out>
    • E、<c:out value=’${message}’ eliminateXml=’true’ />

    正确答案:B,C

  • 第15题:

    You are building a client for a Windows Communication Foundation (WCF) service. You need to create a proxy to consume this service. Which class should you use?()

    • A、ChannelFactory
    • B、 ServiceHost
    • C、ClientRuntime
    • D、CommunicationObject

    正确答案:A

  • 第16题:

    Cer-tech .com has a Windows Server 2008 server named S1. You have installed Web Server (IIS) serverrole on S1. The server has an SMTP gateway that connects to the internet. You have an internal firewallinstalled on the network which prevents all client machines from establishing a connection to the internetexcept the SMTP gateway over TCP port 25.You configure the SMTP gateway to relay e-mail for S1. What should you do to configure a website on S1 to send email to internet users?()

    • A、Install and configure SMTP server feature on S1
    • B、Configure the SMTP email feature for the website on S1
    • C、Create a DNS server on S1 and configure the SMTP mail service
    • D、Create an MX record for the SMTP gateway on an internal DNS server
    • E、None of the above

    正确答案:B

  • 第17题:

    You have an Exchange Server 2010 organization.  Your companys security policy states that users must not be able to encrypt e-mail messages by usingOutlook Web App (OWA).  You need to recommend a client access solution that meets the requirements of the security policy.  What should you include in the solution?()

    • A、managed folder mailbox policies
    • B、multiple OWA virtual directories
    • C、OWA segmentation
    • D、WebReady Document Viewing

    正确答案:C

  • 第18题:

    You are the network administrator for The network consists of a single Active directory domain named The domain contains 20 Windows Server 2003 computers and 5,000 Windows XP Professional computers. All client computer accounts are in the Clients organizational unit (OU). The client computers do not have any service packs installed. You install and configure Software Update Services (SUS) on a server named TestKing4. All client computers must download security updates from TestKing4. You need to prepare the client computers so they can connect to TestKing4 to download Windows security updates. What should you do?()

    • A、Create a logon script that connects to the Windows Update Catalog Web site, scans for available security updates, and downloads security updates to the client computes,
    • B、Install the automatic Updates client on all client computers. Configure the client computers to use Automatic Updates to connect to TestKing4.
    • C、Create a new Group Policy object (GPO) and link it to the clients OU. Configure the GPO to create a software package that assigns security updates from TestKing4 to the client computers.
    • D、Add http://TestKing4 as the value for WUStatusServer registry entries on all client computers.

    正确答案:B

  • 第19题:

    You create a Windows Communication Foundation (WCF) service and deploy it with wsHttpBinding and message security enabled.You create an intermediate WCF service for logging messages sent to the primary service.The intermediate service is called via endpoint behaviour. The primary service is receiving malformed data from a client application.You need to enable inspection of the malformed data and prevent message tampering. What do you do?()

    • A、Specify a protection level of None in the contract for the intermediate service. Disable message and transport security from the client application configuration file.
    • B、Specify a protection level of Sign in the contract for the intermediate service. Disable transport security from the client application configuration file.
    • C、Modify the binding on the intermediate service to use netNamedPipeBinding.
    • D、Modify the binding on the intermediate service to use webHttpBinding.

    正确答案:B

  • 第20题:

    单选题
    You are building a client for a Windows Communication Foundation (WCF) service. You need to create a proxy to consume this service. Which class should you use?()
    A

    ChannelFactory

    B

    ServiceHost

    C

    ClientRuntime

    D

    CommunicationObject


    正确答案: B
    解析: 暂无解析

  • 第21题:

    单选题
    Your company has a single Active Directory directory service domain. All servers in your environment run Windows Server 2003. Client computers run Windows XP or Windows Vista. You plan to create a security update scan procedure for client computers. You need to choose a security tool that supports all the client computers.  Which tool should you choose? ()
    A

     UrlScan Security Tool

    B

     Enterprise Scan Tool (EST)

    C

     Malicious Removal Tool (MRT)

    D

     Microsoft Baseline Security Analyzer (MBSA)


    正确答案: B
    解析: 暂无解析

  • 第22题:

    多选题
    Your company has an Active Directory domain. A server named Server2 runs Windows Server 2008. All client computers run Windows Vista.  You install the Terminal Services role,Terminal Services Web Access role service,and Terminal Services Gateway role service on Server2.  You need to ensure that all client computers have compliant firewall, antivirus software,and antispyware. Which two actions should you perform?()
    A

    Configure Network Access Protection (NAP) on a server in the domain.

    B

    Add the Terminal Services servers to the Windows Authorization Access domain local security group.

    C

    Add the Terminal Services client computers to the Windows Authorization Access domain local security group.

    D

    Enable the Request clients to send a statement of health option in the Terminal Services client access policy.


    正确答案: D,C
    解析: 暂无解析

  • 第23题:

    多选题
    You have been contracted to create a web site for a free dating service. One feature is the ability for oneclient to send a message to another client, which is displayed in the latter client’s private page. Your contract explicitly states that security is a high priority. Therefore, you need to prevent cross-site hacking inwhich one user inserts JavaScript code that is then rendered and invoked when another user views thatcontent. Which two JSTL code snippets will prevent cross site hacking in the scenario above? ()
    A

    <c:out>${message}</c:out>

    B

    <c:out value=’${message}’ />

    C

    <c:out value=’${message}’ escapeXml=’true’ />

    D

    <c:out eliminateXml=’true’>${message}</c:out>

    E

    <c:out value=’${message}’ eliminateXml=’true’ />


    正确答案: B,A
    解析: 暂无解析

  • 第24题:

    多选题
    You are building a dating web site. The client’s date of birth is collected along with lots of other information.The Person class has a derived method, getAge():int, which returns the person’s age calculated from thedate of birth and today’s date. In one of your JSPs you need to print a special message to clients within theage group of 25 through 35. Which two EL code snippets will return true for this condition? ()
    A

    ${client.age in [25,35]}

    B

    ${client.age between [25,35]}

    C

    ${client.age between 25 and 35}

    D

    ${client.age <= 35 && client.age >= 25}

    E

    ${client.age le 35 and client.age ge 25}


    正确答案: B,D
    解析: 暂无解析