-
You need to reduce the level of access that a malicious Web site might have to your computer. What should you do? ()
A . Start a Windows Defender scan.
B . Enable Microsoft Windows Internet Explorer Phishing Filter.
C . Enable Microsoft Windows Internet Explorer Pop-up Blocker.
D . Confirm that Microsoft Windows Internet Explorer Protected Mode is enabled on the Internet security zone.
-
You create a Web site. You add an EditorZone control to the home page on the Web site. You need to enable users to customize the size and location of the Web Parts on their home pages. Which two controls should you add to the EditorZone control?()
A . BehaviorEditorPart
B . AppearanceEditorPart
C . PropertyGridEditorPart
D . LayoutEditorPart
-
You create a Web site with membership and personalization enabled. You must use an existing CRM database for storing the membership information. You need to implement the Membership Provider. What should you do?()
A . Modify the connection string in the Web.config file to connect to the CRM database.
B . Add new a SqlMembershipProvider to the Web.config file.
C . Create a custom Membership Provider inheriting from MembershipProvider.
D . Create a custom MembershipUser inheriting from MembershipUser.
-
You install WSUS on a server that runs Windows Server 2008. You need to ensure that the traffic between the WSUS administrative web site and the server administrators computer is encrypted What should you do()?
A . Configure SSL encryption on the WSUS server website
B . Run the netdom trust /SecurePasswordPrompt command on the WSUS server
C . Configure the NTFS permissions on the content directory to Deny Full control permission to the Everyone group
D . Configure the WSUS server to require integrated Windows authentication (IWA) hen users connect to the WSUS server.
-
You have a server named Server1 that runs Windows Sever 2003 Service Pack 2 (SP2). You create a FTP site on Server1.You need identify how many users are connected to the FTP site. What should you do?()
A . From Task Manger, view the Networking tab.
B . From the command prompt, run Net view \\server1.
C . From the properties of the FTP site, view Current Sessions.
D . From the properties of the FTP site, enable Open Database Connectivity (ODBC) logging.
-
Your company has a server that runs Windows Server 2008. The server has the Web Server (IIS) role installed. You need to activate SSL for the default Web site. Which two actions should you perform?()
A . Obtain and import a server certificate by using the IIS Manager console.
B . Select the Generate Key option in the Machine Key dialog box for the default Web site.
C . Add bindings for the HTTPS protocol to the default Web site by using the IIS Manager console.
D . Install the Digest Authentication component for the Web server role by using the Server Manager console.
-
You create a Web site that stores users' active themes in user profile objects. You need to apply users' preferred themes when they log on to the Web site. What should you do? ()
A . In the InitComplete event handler, set the Theme property of the Page object based on the user profile.
B . In the PreLoad event handler, set the Theme property of the Page object based on the user profile.
C . In the OnLoad event handler, set the Theme property of the Page object based on the user profile.
D . In the PreInit event handler, set the Theme property of the Page object based on the user profile.
-
You need to recommend a management solution for the corporate Web sites that meets the museum’s security policy What should you include in the recommendation?()
A . Internet Information Services (IIS) Manager
B . Remote Desktop Services (RDS)
C . Remote Server Administration Tools (RSAT)
D . Windows PowerShell 2.0
-
You are creating a shared Internet connection on your Windows 2000 Professional computer. You want to enable other computers on the LAN to be able to access only HTTP and FTP sites on the Internet. What should you do?()
A . Configure your shared Internet connection to disable LCP extensions.
B . Configure you shared Internet connection to disable on-demand dialing.
C . Create an Internet Connection Sharing application type for HTTP to use remote server port 25.
D . Create an Internet Connection Sharing application type for HTTP to use remote server port 80.
E . Create an Internet Connection Sharing application type for FTP to use remote server port 21.
F . Create an Internet Connection Sharing application type for FTP to use remote server port 72.
-
You are implementing a Web page that displays text that was typed by a user. You need to display the user input in the Web page so that a cross-site scripting attack will be prevented. What should you do?()
A . Call document.write.
B . Call Response.Write.
C . Call HttpUtility.UrlEncode.
D . Call HttpUtility.HtmlEncode.
-
You create a control named ContosoUI for a Web application. You need to add the control to the toolbox of Microsoft Visual Studio .NET. Which two actions should you perform?()
A . Create the ContosoUI control as a Web Control Library.
B . Create the ContosoUI control as a Web user control.
C . Within the Visual Studio .NET toolbox, browse to and select ContosoUI.ascx.
D . Within the Visual Studio .NET toolbox, browse to and select ContosoUI.dll.
-
You deploy your companys Internet Web site. You need to deny anonymous access to the Web site, allowing only authenticated users. Which code segment should you use?()
A . <authorization> <allow users="?"/> </authorization>
B . <authorization> <deny users="?"/> </authorization>
C . <authorization> <deny users="*"/></authorization>
D . <authorization> <allow users="*"/> </authorization>
-
You create a mobile Web application. You need to use a Command control to post user input from the UI elements back to the server. What are two possible ways to achieve this goal?()
A . Place the Command control within an instance of the System.Web.UI.MobileControls.SelectionList control.
B . Place the Command control within an instance of the System.Web.UI.MobileControls.ObjectList control.
C . Place the Command control within an instance of the System.Web.UI.MobileControls.Form control.
D . Place the Command control within an instance of the System.Web.UI.MobileControls.Panel control.
-
You are deploying a Web site to a server managed by a hosting company. The only access you have to the server is through FTP. You need to precompile and deploy the Web site without its source files. What should you do? ()
A . Use the Copy Web tool.
B . Use the Publish Web tool.
C . Use XCOPY.
D . Use the Web Setup project Installer.
-
You create a Web Form that contains connected Web Parts. You write the following declaration in your Web Form.You need to ensure that your Web Part connection is valid. Which two actions should you perform? ()
A . Include a data source identified as "WebPartConnection1" on the Web Form.
B . Include a Web Part identified as "customerPart" on the Web Form.
C . Include a Web Part identified as "ordersPart" on the Web Form.
D . Ensure that you declare an interface named "IOrdersPart".
E . Ensure that you declare an interface named "ICustomerPart".
F . Ensure that each Web Part declares either a GetInterface or ProvideInterface method.
-
You need to design a method to allow the new-ideas-testking.com Web site to function in accordance with security and business requirements. What should you do?()
A . Require a PPTP VPN for all connections to the Web server
B . Require that traffic between Web browsers and the Web server uses an L2TP/IPSec tunnel
C . Require that traffic between Web browsers and the Web server uses SSL
D . Require certificate mappings between the Web server and Active Directory
-
You need to design a security strategy for the Web folders and files created by the consultants and the internal Web developers. What are two possible ways to achieve this goal?()
A . Require the internal Web developers to use Telnet with Kerberos authentication. Require the consultants to use L2TP with IPSec
B . Require the internal Web developers to use Encrypting File System (EFS) over Web Distributed Authoring and Versioning (WebDAV). Require the consultants to use Microsoft.NET Passport authentication with Security Level 0
C . Require the internal Web developers to use Web Distributed Authoring and Versioning (WebDAV) over SSL.Require the consultants to use WebDAV over SSL
D . Require the internal Web developers to use L2TP with IPSec. Require the consultants to use Encrypting File System (EFS) over Web Distributed Authoring and Versioning (WebDAV)
E . Require the internal Web developers to use Web Distributed Authoring and Versioning (WebDAV) over SSL.Require the consultants to use L2TP with IPSec
-
You are creating a templated Web control for use in your Web application. You need to add the Web control to your Web application pages without compiling your control into a .dll file. What should you do?()
A . Ensure that the Web control inherits from the WebControl class.
B . Ensure that the Web control inherits from the Control class.
C . Ensure that the Web control inherits from the CompositeControl class.
D . Ensure that the Web control inherits from the UserControl class.
-
You deploy your companys Internet Web site. You need to deny anonymous access to the Web site, allowing only authenticated users. Which code segment should you use?()
A .https://assets.asklib.com/images/image2/2018072715022379718.jpg
B .https://assets.asklib.com/images/image2/2018072715022848525.jpg
C .https://assets.asklib.com/images/image2/2018072715023295714.jpg
D .https://assets.asklib.com/images/image2/2018072715023680640.jpg
-
You have a Web server named Server1 that runs Windows Server 2003 Service Pack 2 (SP2). Server1 hosts 100 Web sites. Each Web site uses a different application pool. You need to limit the network bandwidth for one of the Web sites. What should you do? ()
A . From Internet Information Services (IIS) Manager, modify the properties of the Web site.
B . From the Properties of the Local Area Connection, install QoS Packet Scheduler. From the Local Security Policy, configure the QoS Packet Scheduler settings.
C . From the Local Security Policy, enable auditing for Object Access. From the System Properties, modify the Performance settings.
D . From the Properties of the Local Area Connection, enable and configure Network Load Balancing.
-
You are creating a templated Web control for use in your Web application. You need to add the Web control to your Web application pages without compiling your control into a .dll file.What should you do?()
A. Ensure that the Web control inherits from the WebControl class.
B. Ensure that the Web control inherits from the Control class.
C. Ensure that the Web control inherits from the CompositeControl class.
D. Ensure that the Web control inherits from the UserControl class.
-
You are the network administrator for The network consists of a single Active Directory domain named All servers run Windows Server 2003.The network contains a Web server that runs IIS 6.0 and hosts a secure intranet site. All users are required to connect to the intranet site by authenticating and using HTTPS. However, because an automated Web application must connect to the Web site by using HTTP, you cannot configure the intranet site to require HTTPS.You need to collect information about which users are connecting to the Web site by using HTTPS.What should you do?()
A. Check the application log on the Web server.
B. Use Network Monitor to capture network traffic on the Web server.
C. Review the log files created by IIS on the Web server.
D. Configure a performance log to capture all Web service counters. Review the performance log data.
-
You create a Web Form that allows users to create a new account. You add a CreateUserWizard control by using the following code segment.You need to ensure that the wizard automatically sends an e-mail message to users when they finish creating their accounts. You add a valid element to the Web.config file.Which code segment should you add to the Page_Load event?()
A.Wizard1.RequireEmail = True
B.Wizard1.Email = "user@address.com"
C.Wizard1.MailDefinition.From = "registration@mysite.com"
D.SmtpMail.SmtpServer = "mail.contoso.com"
-
You are creating a custom user control. The custom user control will be used on 10 Web Forms for an ASP.NET Web site that allows users to register and log on to a personalized experience.The custom user control uses two TextBox controls and two Button controls.You need to ensure that the controls are visible only when users are not logged on to the Web site. You also need to minimize the amount of effort in development and maintenance for the Web site.Which two actions should you perform?()
A. Add the OnClick event handler for the Login button to the code used in the custom user control.
B. Add the OnClick event handler for the Login button to the code used in the Web Form where the control is added.
C. In the Page_Load method of the Web Form, add a code segment to set the visibility of the TextBox and Button controls where the control is added.
D. In the Page_Load method of the custom user control, add a code segment to set the visibility of the TextBox and Button controls.