You need to design a method of communication between the IT 

题目
单选题
You need to design a method of communication between the IT and HR departments. Your solution must meet business requirements. What should you do?()
A

Design a custom IPSec policy to implement Encapsulating Security Payload (ESP) for all IP traffic Design the IPSec policy to use certificate-based authentication between the two departments’ computers

B

Design a customer IPSec policy to implement Authentication Header (AH) for all IP traffic. Desing the IPSec policy to use preshared key authentication between the two departments’ computers

C

Design a customer IPSec policy to implement Encapsulating Payload (ESP) for all IP traffic. Desing the IPSec policy to use preshared key authentication between the two departments’ computers

D

Design a customer IPSec policy to implement Authentication Header (AH) for all IP traffic. Desing the IPSec policy to use certificate-based authentication between the two departments’ computers

如果没有搜索结果或未解决您的问题,请直接 联系老师 获取答案。
相似问题和答案

第1题:

When is a first-hop redundancy protocol needed in the distribution layer?()

A. when HSRP is not supported by the design

B. when multiple vendor devices need to be supported

C. when preempt tuning of the default gateway is needed

D. when a robust method of backing up the default gateway is needed

E. when the design implements Layer 2 between the access switch and the distribution switch

F. when the design implements Layer 3 between the access switch and the distribution switch


参考答案:F

第2题:

You need to implement a high availability design in the Company routed network.  Which protocol  allows for the automatic selection and simultaneous use of multiple available gateways as well as  automatic failover between those gateways?()

  • A、 VRRP
  • B、 GLBP
  • C、 IRDP
  • D、 HSRP
  • E、 None of the other alternatives apply

正确答案:B

第3题:

You are creating a Windows Communication Foundation (WCF) service that implements operations in a RESTful manner. You need to add a delete operation. You implement the delete method as follows:void DeleteItems(string id);You need to configure WCF to call this method when the client calls the service with the HTTP DELETE operation. What should you do?()

A. Add the WebInvoke(UriTemplate="/Items/{id}", Method="DELETE") attribute to the operation

B. Add the HttpDelete atribute to the operation

C. Replace the string parameter with a RemovedActivityAction parameter

D. Replace the return type with RemovedActivityAction.


参考答案:A

第4题:

When is a first-hop redundancy protocol needed in the distribution layer?()

  • A、when HSRP is not supported by the design
  • B、when multiple vendor devices need to be supported
  • C、when preempt tuning of the default gateway is needed
  • D、when a robust method of backing up the default gateway is needed
  • E、when the design implements Layer 2 between the access switch and the distribution switch
  • F、when the design implements Layer 3 between the access switch and the distribution switch

正确答案:F

第5题:

Your company has a single Active Directory Domain Services (AD DS) domain and 1,000 Windows Vista computers.  You are planning to deploy Windows 7 and a custom application.   You have the following requirements:   The application must be available to only a specific group of users. You must be able to monitor application usage.   You need to design a deployment method for the custom application that meets the requirements.  Which deployment method should you use in your design?()

  • A、software installation in Group Policy
  • B、startup scripts in Group Policy
  • C、Microsoft Application Virtualization (App-V)
  • D、baseline Windows 7 image that includes the custom application

正确答案:C

第6题:

How do you understand the difference between approach, method, and technique?
When we use the word approach we mean that an idea or theory is being applied: that whatever the teacher does, certain theoretical principles are always borne in mind. A method is a set of procedures or a collection of techniques used in a systematic way which it is hoped will result in efficient learning. When we talk about a technique, we mean a procedure used in the classroom.A technique then is the narrowest term, meaning one single procedure. A method will consist of a number of techniques, probably arranged in a specific order. The word approach is much more general and has the implication that whatever method or techniques the teacher uses, he does not feel bound by these, but only by the theory in which he believes. If he can find new and better methods or techniques which will fit in with his approach, then he will adopt these.

第7题:

A ( )is a software that provides a method of communication between two electronic devices over the World Wide Web.

  • A、router
  • B、cober
  • C、J2EE
  • D、web service

正确答案:D

第8题:

A( )is a software that provides a method of communication between two electronic devices over the world wide web

A.router

B.cober

C.J2EE

D.web service


正确答案:D
根据W3C的定义,Web服务(Webservice)应当是一个软件系统,用以支持网络间不同机器的互动操作。网络服务通常是许多应用程序接口(API)所组成的,它们透过网络,例如国际互联网(Internet)的远程服务器端,执行客户所提交服务的请求。

第9题:

You are creating a Windows Communication Foundation (WCF) service that implements the following service contract.[ServiceContract]public interface IOrderProcessing { [OperationContract] void ApproveOrder(int id);}You need to ensure that only users with the Manager role can call the ApproveOrder method. What should you do?()

  • A、In the method body, check the Rights PosessesProperty property to see if it contains Manager
  • B、Add a PrincipalPermission attribute to the method and set the Roles property to Manager
  • C、Add a SecurityPermission attribute to the method and set the SecurityAction to Demand
  • D、In the method body, create a new instance of WindowsClaimSet. Use the FindClaims method to locate a claimType named Role with a right named Manager

正确答案:B

第10题:

When is a first-hop redundancy protocol needed in the distribution layer?()

  • A、 when the design implements Layer 2 between the access arid distribution blocks
  • B、 when multiple vendor devices need to be supported
  • C、 when preempt tuning of the default gateway is needed
  • D、 when a robust method of backing up the default gateway is needed
  • E、 when the design implements Layer 2 between the access switch and the distribution blocks
  • F、 when the design implements Layer 2 between the access and distribution blocks

正确答案:F

更多相关问题