87 For effective communication, the message should be oriented to the _____.
A. Initiator
B. Receiver
C. Media
D. Management style.
E. Corporate culture
第1题:
●Communication protocols are (66) connection-oriented or connectionless, (67) whether the sender of a message needs to contact and maintain a dialog with the recipient or (68) send a message without any prior connect and with the hope that the recipient receives everything (69) .These methods
(70) the two ways that communication is implemented on networks.
(66) A.not
B.neither
C.either
D.all
(67) A.fulled
B.flooded
C.depending on
D.defined by
(68) A.immediately
B.simply
C.accordingly
D.properly
(69) A.in order
B.in array
C.in series
D.in queueing
(70) A.make known
B.disclose
C.reveal
D.discover
第2题:
You are developing a Windows Communication Foundation (WCF) service. One of the parameters used with the service operations is a security token. The security token is not sensitive. The monitoring software tracks security tokens and can read tokens in clear text only.The company security policy requires that you validate all clear text data passed over the corporate network.You need to ensure that the service verifies that the security token is not changed during transit.What should you do?()
A. For all the security-sensitive members, set the ProtectionLevel parameter of the MessageBodyMember or MessageHeader attribute to EncryptAndSign.
B. Implement IEndpointldentityProvider in the message contract class.
C. Implement ISecureConversationSession in the message contract class.
D. For all the security-sensitive members, set the ProtectionLevel parameter of the MessageBodyMember or MessageHeader attribute to Sign.
第3题:
A Windows Communication Foundation (WCF) service is responsible for transmitting XML documents between systems.The service has the following requirements:It must minimize the transmission size by attaching the XML document as is without using escape characters or base64 encoding.It must interoperate with systems that use SOAP but are not built on the .NET plafform.You need to configure the service to support these requirements. Which message encoding should you use?()
A. Binary message encoding
B. MTOM (Message Transmission Optimization Mechanism) message encoding
C. Text message encoding with message version set to none
D. Text message encoding with message version set to SOAP 1.2
第4题:
A. Set the authorization Manager Type attribute of the service Authorization behavior to Message.
B. Set the include Exception Detailsln Faults attribute of the service Debug behavior to true.
C. Set the Mode attribute of the security configuration element to Message.
D. Set the message Authentication AuditLevel attribute of the service Security Audit behavior to Failure.
第5题:
Communication protocols are(66)connection-oriented or connectionless,(67)whether the sender of a message needs to contact and maintain a dialog with the recipient or(68)send a message without any, prior connect and with the hope that the recipient receives everything.(69).These methods(70)the two ways that communication is implemented on networks.
A.not
B.neither
C.either
D.all
第6题:
The communication management plan determines the information and communications needs of the stakeholders. In the following statements related to communication management plan. ( ) is false.
第7题:
What is the primary use of a remote access VPN?()
第8题:
2010 Server has Message Tracking enabled.You need to modify storage location of message tracking logs.What should you do?()
第9题:
You need to recommend a management solution for the corporate Web sites that meets the museum’s security policy What should you include in the recommendation?()
第10题:
overtakes
nourishes
surpasses
enforces
第11题:
calls attention to the living conditions of older Americans
believes that value of older people is gaining increasing recognition
attempts to justify the youth-oriented, throw-away culture of the United States
argues people should not retire at the age of 65 or 70
第12题:
when two stations communicate with each other
in any radio system and at any time
when one ship sends a message to another station
for communication among some stations
第13题:
A. The communication management plan is contained in or is a subsidiary plan of, the project management plan.
B. The communication management plan can be formal or informal, highly detailed or broadly framed, and based on the needs of the project.
C. The communication manamgement plan organize and summarize the information gathered,and present the results of any analysis as comparedthe performance measurement baseline.
D. The communication management plan can include guidelines project status meetings,project team meetings,e-meetines,and e-mail
第14题:
You are developing a Windows Communication Foundation (WCF) service. The service operation takes a customer number as the only argument and returns information about the customer. The service requires a security token in the header of the message. You need to create a message contract for the service.Which code segment should you use?()
A.
B.
C.
D.
第15题:
Your Windows Communication Foundation (WCF) client application uses HTTP to communicate with the service.You need to enable message logging and include all security information such as tokens and nonces in logged messages.What should you do?()
A.
B.
C.
D.
第16题:
The communication management plandetermines the information and communications needs of the stakeholders. In thefollowing statements related to communication management plan, (73) is false.
A.The communication management plan is contained in, or is a subsidiary plan of, the project management plan
B.The communication management plan can be formal or informal, highly detailed or broadly framed, and based on the needs of the project
C.The communication management plan organize and summarize the information gathered, and present the results of any analysis as compared to the performance measurement baseline
D.The communication management plan can include guidelines for project status meetings, project team meetings, e-meetings, and e-mails
第17题:
第18题:
You are developing a Windows Communication Foundation (WCF) service. One of the parameters used with the service operations is a security token. The security token is not sensitive. The monitoring software tracks security tokens and can read tokens in clear text only.The company security policy requires that you validate all clear text data passed over the corporate network.You need to ensure that the service verifies that the security token is not changed during transit. What should you do?()
第19题:
A Windows Communication Foundation (WCF) service is responsible for transmitting XML documents between systems. The service has the following requirements: It must minimize the transmission size by attaching the XML document as is without using escape characters or base64 encoding. It must interoperate with systems that use SOAP but are not built on the .NET plafform. You need to configure the service to support these requirements. Which message encoding should you use?()
第20题:
You are the Exchange administrator of the Xxx Corporation’s Exchange 2010 organization.You need to retrieve all messages from Ann’s mailbox that have the word "classified" in the message body and the subject of "New Project." The message may be either in the Calendar or Inbox folders. What should you do?()
第21题:
The communication management plan is contained in or is a subsidiary plan of, the project management plan.
The communication management plan can be formal or informal, highly detailed or broadly framed, and based on the needs of the project.
The communication manamgement plan organize and summarize the information gathered,and present the results of any analysis as comparedthe performance measurement baseline.
The communication management plan can include guidelines project status meetings,project team meetings,e-meetines,and e-mail
第22题:
第23题:
to secure communication between two remote PCs
to secure communication between two remote offices
to secure communication betweenan remote PC and the corporate intranet
to secure communication between a corporate intranet and the public internet