Design a custom IPSec policy to implement Encapsulating Security Payload (ESP) for all IP traffic Design the IPSec policy to use certificate-based authentication between the two departments’ computers
Design a customer IPSec policy to implement Authentication Header (AH) for all IP traffic. Desing the IPSec policy to use preshared key authentication between the two departments’ computers
Design a customer IPSec policy to implement Encapsulating Payload (ESP) for all IP traffic. Desing the IPSec policy to use preshared key authentication between the two departments’ computers
Design a customer IPSec policy to implement Authentication Header (AH) for all IP traffic. Desing the IPSec policy to use certificate-based authentication between the two departments’ computers
第1题:
A. when HSRP is not supported by the design
B. when multiple vendor devices need to be supported
C. when preempt tuning of the default gateway is needed
D. when a robust method of backing up the default gateway is needed
E. when the design implements Layer 2 between the access switch and the distribution switch
F. when the design implements Layer 3 between the access switch and the distribution switch
第2题:
You need to implement a high availability design in the Company routed network. Which protocol allows for the automatic selection and simultaneous use of multiple available gateways as well as automatic failover between those gateways?()
第3题:
You are creating a Windows Communication Foundation (WCF) service that implements operations in a RESTful manner. You need to add a delete operation. You implement the delete method as follows:void DeleteItems(string id);You need to configure WCF to call this method when the client calls the service with the HTTP DELETE operation. What should you do?()
A. Add the WebInvoke(UriTemplate="/Items/{id}", Method="DELETE") attribute to the operation
B. Add the HttpDelete atribute to the operation
C. Replace the string parameter with a RemovedActivityAction parameter
D. Replace the return type with RemovedActivityAction.
第4题:
When is a first-hop redundancy protocol needed in the distribution layer?()
第5题:
Your company has a single Active Directory Domain Services (AD DS) domain and 1,000 Windows Vista computers. You are planning to deploy Windows 7 and a custom application. You have the following requirements: The application must be available to only a specific group of users. You must be able to monitor application usage. You need to design a deployment method for the custom application that meets the requirements. Which deployment method should you use in your design?()
第6题:
How do you understand the difference between approach, method, and technique?
When we use the word approach we mean that an idea or theory is being applied: that whatever the teacher does, certain theoretical principles are always borne in mind. A method is a set of procedures or a collection of techniques used in a systematic way which it is hoped will result in efficient learning. When we talk about a technique, we mean a procedure used in the classroom.A technique then is the narrowest term, meaning one single procedure. A method will consist of a number of techniques, probably arranged in a specific order. The word approach is much more general and has the implication that whatever method or techniques the teacher uses, he does not feel bound by these, but only by the theory in which he believes. If he can find new and better methods or techniques which will fit in with his approach, then he will adopt these.
略
第7题:
A ( )is a software that provides a method of communication between two electronic devices over the World Wide Web.
第8题:
A( )is a software that provides a method of communication between two electronic devices over the world wide web
A.router
B.cober
C.J2EE
D.web service
第9题:
You are creating a Windows Communication Foundation (WCF) service that implements the following service contract.[ServiceContract]public interface IOrderProcessing { [OperationContract] void ApproveOrder(int id);}You need to ensure that only users with the Manager role can call the ApproveOrder method. What should you do?()
第10题:
When is a first-hop redundancy protocol needed in the distribution layer?()