<c:out>${message}</c:out>
<c:out value=’${message}’ />
<c:out value=’${message}’ escapeXml=’true’ />
<c:out eliminateXml=’true’>${message}</c:out>
<c:out value=’${message}’ eliminateXml=’true’ />
第1题:
Your company has a single Active Directory directory service domain. All servers in your environment run Windows Server 2003. Client computers run Windows XP or Windows Vista. You plan to create a security update scan procedure for client computers. You need to choose a security tool that supports all the client computers. Which tool should you choose? ()
第2题:
You are building a dating web site. The client’s date of birth is collected along with lots of other information.The Person class has a derived method, getAge():int, which returns the person’s age calculated from thedate of birth and today’s date. In one of your JSPs you need to print a special message to clients within theage group of 25 through 35. Which two EL code snippets will return true for this condition? ()
第3题:
You have a single Active Directory directory service domain. You use a Group Policy object (GPO) to apply security settings to your client computers. You configure the startup type for system services settings in a new GPO, and you link the GPO to an organizational unit (OU). You discover that the startup type for system services on one of the client computers has not been updated. You need to ensure that the Group Policy settings are applied to the client computer. What should you do?()
第4题:
You are the desktop administrator for your company. Your company’s software developers use Windows XP Professional and IIS on their client computers to develop Web-based applications. All client computers use Microsoft Internet Explorer 6. 0 or later as their Web browser. One of the developers reports that he can no longer access the Web-based application on his desktop by using his Web browser. When you attempt to access the application by using your Web browser, you receive the following error message: “Cannot find server or DNS Error.” You verify that the World Wide Web Publishing Service is started on the developer’s computer. You also verify that you are using the correct URL to access the developer’s computer by using your Web browser. You need to ensure that the developer can access the Web application by using his Web browser. How should you configure the developer’s computer?()
第5题:
All client computers in your network run Windows 7 with default firewall settings. You have a server-based application that requires an agent to be installed on all client computers. You need to use Group Policy to allow the application to initiate installation of the agent on all client computers. What should you do?()
第6题:
Your company has client computers that run Windows Vista and client computers that run Windows 7. The client computers connect directly to the Microsoft Update Web site once per week and automatically install all available security updates. Microsoft releases a security update for Windows 7. You have the following requirements: Create a report of all Windows 7 computers that are currently connected to the network and that do not have the security update installed. Use the least amount of administrative effort. You need to manage the software update process to meet the requirements. What should you do?()
第7题:
Your company has an internal Web site that requires HTTPS. The Web site s certificate is self-signed. Youhave a computer that runs Windows 7 and Windows Internet Explorer 8. You use HTTPS to browse to theWeb site and receive the following warning message: There is a problem with this website s security certificate. You need to prevent the warning message from appearing when you access the Web site. What should you do?()
第8题:
A Windows Communication Foundation (WCF) service has a callback contract. You are developing a client application that will call this service.You must ensure that the client application can interact with the WCF service. What should you do?()
第9题:
Require certificate-based authentication for all Internet-facing Client Access servers.
Require Windows Integrated Authentication for all Internet-facing Client Access servers.
Deploy an Edge Transport server, and then disable Windows Integrated Authentication.
Deploy a server that runs Microsoft Internet Security and Acceleration (ISA) Server, and then enableKerberos constrained delegation.
第10题:
${calcAge(client.birthDate) < 25}
${calcAge[client.birthDate] < 25}
${funct:age(client.birthDate) < 25}
${funct:age[client.birthDate] < 25}
${funct:calcAge(client.birthDate) < 25}
第11题:
Start the default Web site.
Start the IIS Admin Service.
Run the IPconfig /registerdns command.
In the default Web site properties,disable the host header setting.
第12题:
Deploy Microsoft Windows Server Update Services (WSUS). Approve the security update for installation,and forcea detection cycle on the client computers.
Deploy Microsoft Windows Server Update Services (WSUS). Approve the security update for detection, and force adetection cycle on the client computers.
Use the Microsoft Baseline Security Analyzer (MBSA) to scan the client computers.Configure MBSA to use the Microsoft Update site catalog.
Use the Microsoft Baseline Configuration Analyzer (MBCA) to scan the client computers.
第13题:
You are building a dating web site. The client’s date of birth is collected along with lots of other information.You have created an EL function with the signature: calcAge(java.util.Date):int and it is assigned to the name, age, in the namespace, funct. In one of your JSPsyou need to print a special message to clients who are younger than 25. Which EL code snippet will returntrue for this condition?()
第14题:
You have been contracted to create a web site for a free dating service. One feature is the ability for oneclient to send a message to another client, which is displayed in the latter client’s private page. Your contract explicitly states that security is a high priority. Therefore, you need to prevent cross-site hacking inwhich one user inserts JavaScript code that is then rendered and invoked when another user views thatcontent. Which two JSTL code snippets will prevent cross site hacking in the scenario above? ()
第15题:
You are building a client for a Windows Communication Foundation (WCF) service. You need to create a proxy to consume this service. Which class should you use?()
第16题:
Cer-tech .com has a Windows Server 2008 server named S1. You have installed Web Server (IIS) serverrole on S1. The server has an SMTP gateway that connects to the internet. You have an internal firewallinstalled on the network which prevents all client machines from establishing a connection to the internetexcept the SMTP gateway over TCP port 25.You configure the SMTP gateway to relay e-mail for S1. What should you do to configure a website on S1 to send email to internet users?()
第17题:
You have an Exchange Server 2010 organization. Your companys security policy states that users must not be able to encrypt e-mail messages by usingOutlook Web App (OWA). You need to recommend a client access solution that meets the requirements of the security policy. What should you include in the solution?()
第18题:
You are the network administrator for The network consists of a single Active directory domain named The domain contains 20 Windows Server 2003 computers and 5,000 Windows XP Professional computers. All client computer accounts are in the Clients organizational unit (OU). The client computers do not have any service packs installed. You install and configure Software Update Services (SUS) on a server named TestKing4. All client computers must download security updates from TestKing4. You need to prepare the client computers so they can connect to TestKing4 to download Windows security updates. What should you do?()
第19题:
You create a Windows Communication Foundation (WCF) service and deploy it with wsHttpBinding and message security enabled.You create an intermediate WCF service for logging messages sent to the primary service.The intermediate service is called via endpoint behaviour. The primary service is receiving malformed data from a client application.You need to enable inspection of the malformed data and prevent message tampering. What do you do?()
第20题:
ChannelFactory
ClientRuntime
CommunicationObject
第21题:
UrlScan Security Tool
Enterprise Scan Tool (EST)
Malicious Removal Tool (MRT)
Microsoft Baseline Security Analyzer (MBSA)
第22题:
Configure Network Access Protection (NAP) on a server in the domain.
Add the Terminal Services servers to the Windows Authorization Access domain local security group.
Add the Terminal Services client computers to the Windows Authorization Access domain local security group.
Enable the Request clients to send a statement of health option in the Terminal Services client access policy.
第23题:
<c:out>${message}</c:out>
<c:out value=’${message}’ />
<c:out value=’${message}’ escapeXml=’true’ />
<c:out eliminateXml=’true’>${message}</c:out>
<c:out value=’${message}’ eliminateXml=’true’ />
第24题:
${client.age in [25,35]}
${client.age between [25,35]}
${client.age between 25 and 35}
${client.age <= 35 && client.age >= 25}
${client.age le 35 and client.age ge 25}