Your network contains two Web servers named Web1 and Web2. Web1 hosts the companys corporate Web site. Web2 is a test server that contains a copy of the Web site.Users connect to Web1 by using the URL http://www.contoso.com.A Web developer named User1 plans to test updates to the Web site on Web2.You need to ensure that User1 connects to Web2 by using the URL http://www.contoso.com. The solution must ensure that all other computers connect to Web1.What should you do?()
第1题:
Cisco IDS sensors form the eyes and ears of your Cisco network intrusion detection system.Placing sensors correctly throughout your network is crucial to successfully implementing your Cisco intrusion detection system . Where can an IPS sensor be placed in an enterprise network?()
A. core layer
B. bridging two VLANs on one switch
C. between two Layer 2 devices withtrunking
D. between two Layer 2 devices withouttrunking
第2题:
Cisco IDS sensors form the eyes and ears of your Cisco network intrusion detection system. Placing sensors correctly throughout your network is crucial to successfully implementing your Cisco intrusion detection system . Where can an IPS sensor be placed in an enterprise network?()
第3题:
You create a Web Form that contains connected Web Parts. You write the following declaration in your Web Form.You need to ensure that your Web Part connection is valid. Which two actions should you perform? ()
A. Include a data source identified as "WebPartConnection1" on the Web Form.
B. Include a Web Part identified as "customerPart" on the Web Form.
C. Include a Web Part identified as "ordersPart" on the Web Form.
D. Ensure that you declare an interface named "IOrdersPart".
E. Ensure that you declare an interface named "ICustomerPart".
F. Ensure that each Web Part declares either a GetInterface or ProvideInterface method.
第4题:
Your network contains an internal network and a perimeter network. The internal network contains a single Active Directory site. The perimeter network contains two Exchange Server 2010 Edge Transport servers. You plan to deploy an Exchange Server 2010 organization on the internal network. You need to plan the deployment of Hub Transport server roles to meet the following requirements:.If a single Hub Transport server fails, e-mail messages from the Internet must be delivered to the Mailboxservers. .If a single Hub Transport server fails, users must be able to send e-mail messages to other users thathave mailboxes on the same Mailbox server. What should you include in the plan?()
第5题:
Your network contains an Active Directory domain that has two sites. You need to identify whether logon scripts are replicated to all domain controllers. Which folder should you verify()
第6题:
Your company has two data centers. Each data center contains a perimeter network. Your network contains an Exchange Server 2010 organization. You plan to deploy Exchange Server 2010 Edge Transport servers in the perimeter networks. You need to recommend a solution for the Edge Transport servers that meets the following requirements:.Distribute inbound e-mail messages across all Edge Transport servers .Ensure that users receive inbound e-mail messages if an Edge Transport server fails .Ensure that users receive inbound e-mail messages if a single data center network becomes unavailable .Minimize costs What should you recommend?()
第7题:
Your network contains a Web-based application that runs on Windows Server 2003. You plan to migrate the Web-based application to Windows Server 2008 R2. You need to recommend a server configuration to support the Web-based application. The server configuration must meet the following requirements: èEnsure that the application is available to all users if a single server?fails èSupport the installation of .NET applications èMinimize software costs What should you recommend?()
第8题:
A.A
B.B
C.C
D.D
E.E
第9题:
You create a Web Form that contains connected Web Parts. You write the following declaration in your Web Form. You need to ensure that your Web Part connection is valid. Which two actions should you perform? ()
第10题:
Your company named Contoso, Ltd. has a two-node Network Load Balancing cluster. The cluster is intended to provide high availability and load balancing for only the intranet Web site. The name of the cluster is web.contoso.com. You discover that Contoso users can see the Network Load Balancing cluster in the network neighborhood and can connect to various services by using the web.contoso.com name. The web.contoso.com Network Load Balancing cluster is configured with only one port rule. You need to configure the web.contoso.com Network Load Balancing cluster to accept only HTTP traffic. Which two actions should you perform?()