单选题What is the LEAST appropriate scenario for Web services?()ATo integrate legacy systemsBTo propagate security contextCTo expose fine grained operationsDTo use with process choreographyEFor B2B (business to business) applications

题目
单选题
What is the LEAST appropriate scenario for Web services?()
A

 To integrate legacy systems

B

 To propagate security context

C

 To expose fine grained operations

D

 To use with process choreography

E

 For B2B (business to business) applications


相似考题
参考答案和解析
正确答案: B
解析: 暂无解析
更多“单选题What is the LEAST appropriate scenario for Web services?()A  To integrate legacy systemsB  To propagate security contextC  To expose fine grained operationsD  To use with process choreographyE  For B2B (business to business) applications”相关问题
  • 第1题:

    When a business suffers a security breach, there are be serious ramifications. What is one of the immediate impacts that the business can suffer because of a security breach?()

    • A、 loss of retail sales
    • B、 loss of customer faith
    • C、 disruption of business operations
    • D、 inability to deliver products or services

    正确答案:C

  • 第2题:

    The integrated services routing architecture provides the performance, availability, and reliabilityneeded to scale mission-critical business applications in the most demanding environments.Which statement best describes the benefits of Cisco Integrated Services Routers?()

    • A、 ISRs provide threat defense against attacks from hackers and viruses that can occur in thenetwork.
    • B、 ISRs provide the framework to integrate and extend wired and wireless networks
    • C、 ISRs provide concurrent security, voice, data, wireless, and application optimization services.
    • D、 ISRS provide the common fabric, functionality, and CLI across the network.

    正确答案:C

  • 第3题:

    Which of the following business scenarios is the LEAST appropriate for Web services?()

    • A、 Expanding the reach of your company information.
    • B、 Providing transactional services such as credit card payment processing.
    • C、 Making existing services available to a business process to orchestrate services.
    • D、 Enabling interoperability between heterogeneous services to create time-critical solutions.

    正确答案:D

  • 第4题:

    What is BPR? ()

    • A、Business production elation
    • B、Business promotion relation
    • C、Business process re-engineering
    • D、Business placement ratio

    正确答案:C

  • 第5题:

    What is the LEAST appropriate scenario for Web services?()

    • A、 To integrate legacy systems
    • B、 To propagate security context
    • C、 To expose fine grained operations
    • D、 To use with process choreography
    • E、 For B2B (business to business) applications

    正确答案:C

  • 第6题:

    You need to design a method to update the content on the Web server. Your solution must meet business and security requirements. What are two possible ways to achieve this goal?()

    • A、Use SSH to encrypt content as it is transferred to the Web server on the perimeter network
    • B、Install the Microsoft FrontPage Server Extensions, and use FrontPage to update content
    • C、Use Web Distributed Authoring and Versioning (WebDAV) over and SSL connection to the Web server to update content
    • D、Use FTP over an IPSec connection to transfer content to the Web server
    • E、Use Telnet to connect to the Web server, and then perform content changes directly on the server

    正确答案:C,D

  • 第7题:

    单选题
    Which of the following is MOST likely to improve the performance of SOAP-based Web services?()
    A

     Use message level security

    B

     Use fine-grained Web services

    C

     Use document/literal instead of RPC/encoded

    D

     Avoid stale data in the UDDI registry by turning off caching


    正确答案: B
    解析: 暂无解析

  • 第8题:

    单选题
    What is the LEAST appropriate scenario for Web services?()
    A

     To integrate legacy systems

    B

     To propagate security context

    C

     To expose fine grained operations

    D

     To use with process choreography

    E

     For B2B (business to business) applications


    正确答案: C
    解析: 暂无解析

  • 第9题:

    单选题
    As customers deploy converged services across their business infrastructures, access routers must integrate security services and IP communications. Which router series is designed to achieve this level of integration?()
    A

     Cisco 7000 Series WAN edge routers

    B

     Cisco 800 Series routers

    C

     Cisco Integrated Services Routers

    D

     Cisco Small Business Series routers


    正确答案: B
    解析: 暂无解析

  • 第10题:

    单选题
    You are designing a Windows Azure web application.   The application must integrate with on-premise business services.   The business services are running on an on-premise server and cannot be rewritten. The business services are not exposed externally.   You need to recommend an approach for accessing the business services.  What should you recommend?()
    A

     Move business service functionality to Windows Azure.

    B

     Connect to the on-premise server from a custom service in Windows Azure.

    C

     Create a VPN connection between the application and the on-premise server.

    D

     Expose the business services to the Windows Azure AppFabricService Bus by using a custom service that configures relay binding.


    正确答案: D
    解析: 暂无解析

  • 第11题:

    单选题
    When a business suffers a security breach, there can be serious ramifications. What is one of the immediate impacts that the business can suffer because of a security breach?()
    A

     loss of retail sales

    B

     loss of customer faith

    C

     disruption of business operations

    D

     inability to deliver products or services


    正确答案: D
    解析: 暂无解析

  • 第12题:

    单选题
    The integrated services routing architecture provides the performance, availability, and reliabilityneeded to scale mission-critical business applications in the most demanding environments.Which statement best describes the benefits of Cisco Integrated Services Routers?()
    A

     ISRs provide threat defense against attacks from hackers and viruses that can occur in thenetwork.

    B

     ISRs provide the framework to integrate and extend wired and wireless networks

    C

     ISRs provide concurrent security, voice, data, wireless, and application optimization services.

    D

     ISRS provide the common fabric, functionality, and CLI across the network.


    正确答案: B
    解析: 暂无解析

  • 第13题:

    Which two are characteristics of the cost-containment business challenge?()

    • A、reducing security breaches
    • B、using the Internet more
    • C、reducing upgrade charges
    • D、adopting new applications and services

    正确答案:C,D

  • 第14题:

    When a business suffers a security breach, there can be serious ramifications. What is one of the immediate impacts that the business can suffer because of a security breach?()

    • A、 loss of retail sales
    • B、 loss of customer faith
    • C、 disruption of business operations
    • D、 inability to deliver products or services

    正确答案:C

  • 第15题:

    What is BPR?()

    • A、Business production relation          
    • B、Business promotion relation
    • C、Business process reengineering
    • D、Business placement ratio

    正确答案:C

  • 第16题:

    As customers deploy converged services across the business infrastructure, access routers must integrate security services and IP communications. Which router series extends intelligent networking to remote branches and offices?()

    • A、 Cisco 700 Series ISDN Access Routers
    • B、 Cisco Integrated Services Routers
    • C、 Cisco 3700 Series Multiservice Access Routers
    • D、 Cisco 1700 Series Modular Access Routers

    正确答案:B

  • 第17题:

    Which of the following is MOST likely to improve the performance of SOAP-based Web services?()

    • A、 Use message level security
    • B、 Use fine-grained Web services
    • C、 Use document/literal instead of RPC/encoded
    • D、 Avoid stale data in the UDDI registry by turning off caching

    正确答案:C

  • 第18题:

    You are designing a Windows Azure web application.   The application must integrate with on-premise business services.   The business services are running on an on-premise server and cannot be rewritten. The business services are not exposed externally.   You need to recommend an approach for accessing the business services.  What should you recommend?()  

    • A、 Move business service functionality to Windows Azure.
    • B、 Connect to the on-premise server from a custom service in Windows Azure.
    • C、 Create a VPN connection between the application and the on-premise server.
    • D、 Expose the business services to the Windows Azure AppFabricService Bus by using a custom service that configures relay binding.

    正确答案:D

  • 第19题:

    单选题
    Which of the following business scenarios is the LEAST appropriate for Web services?()
    A

     Expanding the reach of your company information.

    B

     Providing transactional services such as credit card payment processing.

    C

     Making existing services available to a business process to orchestrate services.

    D

     Enabling interoperability between heterogeneous services to create time-critical solutions.


    正确答案: B
    解析: 暂无解析

  • 第20题:

    单选题
    Network integration helps to build a powerful business foundation. Which approach does Ciscouse to integrate applications and services across the network infrastructure?()
    A

     application-level

    B

     systems-level

    C

     policy-level

    D

     advanced services


    正确答案: B
    解析: 暂无解析

  • 第21题:

    单选题
    As customers deploy converged services across the business infrastructure, access routers must integrate security services and IP communications. Which router series extends intelligent networking to remote branches and offices?()
    A

     Cisco 700 Series ISDN Access Routers

    B

     Cisco Integrated Services Routers

    C

     Cisco 3700 Series Multiservice Access Routers

    D

     Cisco 1700 Series Modular Access Routers


    正确答案: B
    解析: 暂无解析

  • 第22题:

    单选题
    Cisco Clean Access ensures that computers connecting to your network have which of the following?()
    A

     No vulnerable applications or operating systems

    B

     No viruses or worms

    C

     Appropriate security applications and patch levels

    D

     Current IPS signatures

    E

     Cisco Security Agent


    正确答案: C
    解析: 暂无解析

  • 第23题:

    单选题
    When a business suffers a security breach, there are be serious ramifications. What is one of the immediate impacts that the business can suffer because of a security breach?()
    A

     loss of retail sales

    B

     loss of customer faith

    C

     disruption of business operations

    D

     inability to deliver products or services


    正确答案: A
    解析: 暂无解析

  • 第24题:

    单选题
    You are the network administrator for your company. The network consists of a single Active Directory domain. All domain controllers run Windows Server 2003. All client computers run Windows XP Professional.   The company has legacy applications that run on UNIX servers. The legacy applications use the LDAP protocol to query Active Directory for employee information.  The domain controllers are currently configured with the default security settings. You need to configure enhanced security for the domain controllers. In particular, you want to configure stronger password settings, audit settings, and lockout settings. You want to minimize interference with the proper functioning of the legacy applications.   You decide to use the predefined security templates. You need to choose the appropriate predefined security template to apply to the domain controllers.  What should you do?()
    A

     Apply the Setup security.inf template to the domain controllers.

    B

     Apply the DC security.inf template to the domain controllers.

    C

     Apply the Securedc.inf template to the domain controllers.

    D

     Apply the Rootsec.inf template to the domain controllers.


    正确答案: A
    解析: 暂无解析