urlhash
url persistency
cookie persistency
default persistency
第1题:
A company is migrating their current JAX-WS Web service running on IBM WebSphere Application Server V6.1 with the Feature Pack for Web Services to V7.0. The company wants to continue to support V6.1 service consumers. If the Web service has WS-AtomicTransaction enabled, what settings should be configured to support the widest range of clients? ()
第2题:
Your network contains a Web-based application that runs on Windows Server 2003. You plan to migrate the Web-based application to Windows Server 2008 R2. You need to recommend a server configuration to support the Web-based application. The server configuration must meet the following requirements: èEnsure that the application is available to all users if a single server?fails èSupport the installation of .NET applications èMinimize software costs What should you recommend?()
第3题:
Your company has an internal Web application that uses a self-signed SSL certificate. The company has an internal certification authority (CA) with autoenrollment.When users attempt to start the Web application, Internet Explorer displays an error message that recommends closing the Web page rather than continuing to the application. You need to ensure that Internet Explorer does not display the error message. What should you do?()
第4题:
You work as the IT professional in an international company which is named Wiikigo. You are experiencedin implementing and administering a network operating system. You are specialized in deploying servers,configuring Windows Server 2008 Terminal services and network application services, and configuring aweb services infrastructure. You manage a server that runs Windows Server 2008. The server hasTerminal Service Web Access (TS Web Access) installed. Several line-of-business applications areavailable on the server by using TS Web Access. You have a new application installed on the server. Youhave to make the application available through TS Web Access. In order to achieve this,What action should you perform?()
第5题:
You work as the IT professional in an international company which is named Wiikigo. You are experiencedin implementing and administering a network operating system. You are specialized in deploying servers,configuring Windows Server 2008 Terminal services and network application services, and configuring aweb services infrastructure. You work in a company named Wiikigo, Ltd. and there is a two-node Network Load Balancing cluster. Onlythe intranet Web site will be provided with the high availability and load balancing by the cluster. Thecompany names the cluster as web.wiikigo.com. You find a problem that the Network Load Balancingcluster can be seen in the network neighborhood by the Wiikigo users. And the users can utilize the web.wiikigo.com name to get access to various services. The web.wiikigo.com Network Load Balancing clusteris set with only one port rule. Since you are the technical support, you are required have the web.wiikigo.com Network Load Balancing cluster configured to receive only HTTP traffic. Which two actions should be performed to achieve the goal?()
第6题:
You are a network adminstrator for your company. You install an intranet application on three Windows Server 2003 computers. You configure the servers as a Network Load Balancing cluster. You configure each server with two network adapters. One network adapter provides client computers access to the servers. The second network adapter is for cluster communications. Cluster communications is on a separate network segment. The network team wants to reduce the cluster’s vulnerability to attack. These servers need to be highly available. The network team decides that the Network Load Balancing cluster needs to filter IP ports. The team wants the cluster to allow only the ports that are required for the intranet application. You need to implement filtering so that only the intranet application ports are available on the cluster. You need to achieve this goal by using the minimum amount of administrative effort. What should you do? ()
第7题:
ACE sticky license is not installed
ACE stickiness is not supported in a non-admin context
ACE stickiness resources are not defined in an admin context
Stickiness is configured properly in the CCIE virtual context
第8题:
Place all user mailboxes on back-end servers. Deploy Outlook Web Access on three front-end servers that are members of the Network Load Balancing cluster
Place all user mailboxes on back-end servers that are members of a Network Load Balancing cluster. Deploy Outlook Web Access on the back-end servers
Place mailboxes for remote users on one back-end server and place all mailboxes for main office users on another back-end server. Deploy Outlook Web Access on the back-end server that contains the mailboxes for remote users
Place all user mailboxes on two back-end servers that are members of a Network Load Balancing cluster. Place mailboxes for remote users and mailboxes for main office users into separate storage groups. Deploy Outlook Web Access on three front-end servers. Configure the front-end servers to access only the back-end Network Load Balancing cluster
第9题:
Publish the application as a RemoteApp.
Publish the application by using Remote Desktop Web Access (RD Web Access).
Assign the application to the Remote Desktop Services server by using a Group Policy object (GPO).
Assign the application to all client computers by using a Group Policy object (GPO).
第10题:
A
CNAME
MX
SRV
第11题:
Use Network Load Balancing Manager to configure port rules. Allow only the intranet application ports on the cluster IP address.
Use TCP/IP filtering on each server. Configure only the intranet application ports on the network adapter that provides client computers access to the servers.
Use TCP/IP filtering on each server. Configure only the intranet application ports on both of the network adapters.
Configure Routing and Remote Access on each server. Use Routing and Remote Access input filters to allow only the intranet application ports on the network adapter that provides client computers access to the servers.
第12题:
details related to application user ID requirements
policy requirements related to the number of applications that a user can access
policy requirements for application and user initiated password resets and password complexity
do nothing as password policy requirements are best addressed within the application space rather than in an Enterprise Single Sign-On project
第13题:
Company.com has a database application and a Web server application running on the same p5-570 server in a single partition. Recently there have been a number of instances where the increased load on the database server has impacted the performance of the Web server. What can the technical specialist recommend to keep the database application from impacting the performance of the Web server?()
第14题:
You are the network administrator for your company. The network consists of a single Active Directory domain. All computers on the network are members of the domain. You administer a Network Load Balancing cluster that consists of three nodes. Each node runs Windows Server 2003 and contains a single network adapter. The Network Load Balancing cluster can run only in unicast mode. The Network Load Balancing cluster has converged successfully. To increase the utilization of the cluster, you decide to move a particular application to each node of the cluster. For this application to run, you must add a Network Load Balancing port rule to the nodes of the cluster. You start Network Load Balancing Manager on the second node of the cluster. However, Network Load Balancing Manager displays a message that it cannot communicate with the other two nodes of the cluster. You want to add the port rule to the nodes of the cluster. What should you do? ()
第15题:
You need to design a configuration for the Microsoft Outlook Web Access servers. What should you do?()
第16题:
You are designing a Windows Azure web application. The application will be accessible at a standard cloudapp.net URL. You need to recommend a DNS resource record type that will allow you to configure access to the application through a custom domain name. Which type should you recommend?()
第17题:
Your network contains an Active Directory domain. You have a server that runs Windows Server 2008 R2 and has the Remote Desktop Services server role enabled. All client computers run Windows 7. You need to plan the deployment of a new line-of-business application to all client computers. The deployment must meet the following requirements: èUsers must access the application from an icon on their desktops. èUsers must have access to the application when they are not connected to the network. What should you do?()
第18题:
Create a VLAN between the web server and database server.
Purchase APV and install the VIOS.
Increase the priority of the Web server.
Create separate LPARs for Web and database workloads.
第19题:
Use Network Load Balancing Manager on the Network Load Balancing default host to add the port rule.
Change the host priority of the second node to be the highest in the cluster, and then use Network Load Balancing Manager to add the port rule.
Run the nlb.exe drain command on each node, and then use Network Load Balancing Manager to add the port rule.
Add the port rule through Network Connections Properties on each node.
第20题:
Issue a certificate from the internal CA and install it on the application server
Install the Web application’s certificate into the computer store on each client computer
Install the Web application’s certificate into the personal store on each client computer. Add the application’s URL to the Trusted Sites zone in Internet Explorer
Purchase a commercial certificate and install it on the internal CA
第21题:
In order to make the application available through TS Web Access, the data source for TS Web Accessshould be specified from the TS Web Access Web site.
In order to make the application available through TS Web Access, the application should be added to the RemoteApp Programs list from TS RemoteApp Manager.
In order to make the application available through TS Web Access, the users should be added to the TS Web Access Computers group from the Local Users and Groups snap-in.
In order to make the application available through TS Web Access, the mstsc.exe command should be run and specify the /v parameter should be specified from the command prompt.
第22题:
Create a Network Load Balancing cluster that contains the Outlook Web Access servers
Create a Microsoft Cluster Server cluster that contains the Outlook Web Access servers
Create public DNS host (A) resource records for each Outlook Web Access server. Instruct each user to connect to the server that contains his or her mailbox
Install Microsoft Application Center 2000 on the Outlook Web Access servers. Create a Web cluster that contains all of the Outlook Web Access servers
第23题:
Install the Server Core installation of Windows Server 2008 R2 Standard on two servers. Configure the servers in a Network Load Balancing cluster.
Install the full installation of Windows Server 2008 R2 Web on two servers. Configure the servers in a Network Load Balancing cluster.
Install the full installation of Windows Server 2008 R2 Enterprise on two servers. Configure the servers in a failover cluster.
Install the full installation of Windows Server 2008 R2 Datacenter on two servers. Configure the servers in a failover cluster.