-
You need to reduce the level of access that a malicious Web site might have to your computer. What should you do? ()
A . Start a Windows Defender scan.
B . Enable Microsoft Windows Internet Explorer Phishing Filter.
C . Enable Microsoft Windows Internet Explorer Pop-up Blocker.
D . Confirm that Microsoft Windows Internet Explorer Protected Mode is enabled on the Internet security zone.
-
Which utility allows you to pre-compile and publish your Web site to a new location?()
A . Publish Web Site
B . Web-based installation
C . Web site project mode
D . Web services directory
-
You create a Web site. You add an EditorZone control to the home page on the Web site. You need to enable users to customize the size and location of the Web Parts on their home pages. Which two controls should you add to the EditorZone control?()
A . BehaviorEditorPart
B . AppearanceEditorPart
C . PropertyGridEditorPart
D . LayoutEditorPart
-
You have a server named Server1 that runs Windows Sever 2003 Service Pack 2 (SP2). You create a FTP site on Server1.You need identify how many users are connected to the FTP site. What should you do?()
A . From Task Manger, view the Networking tab.
B . From the command prompt, run Net view \\server1.
C . From the properties of the FTP site, view Current Sessions.
D . From the properties of the FTP site, enable Open Database Connectivity (ODBC) logging.
-
You are designing a DNS name resolution strategy to allow all users access to internal and external web sites. What should you do?()
A . Allow zone transfers to any DNS server.
B . Create a new stub zone for the DNS zone on the DNS server.
C . Configure the DNS server to forward all unanswered queries to a DNS server located at the ISP.
D . Add the DNS server located at the ISP to the list of name servers for the fourthcoffee.com DNS zone.
-
Your company has a server that runs Windows Server 2008. The server has the Web Server (IIS) role installed. You need to activate SSL for the default Web site. Which two actions should you perform?()
A . Obtain and import a server certificate by using the IIS Manager console.
B . Select the Generate Key option in the Machine Key dialog box for the default Web site.
C . Add bindings for the HTTPS protocol to the default Web site by using the IIS Manager console.
D . Install the Digest Authentication component for the Web server role by using the Server Manager console.
-
You create a Web site that stores users' active themes in user profile objects. You need to apply users' preferred themes when they log on to the Web site. What should you do? ()
A . In the InitComplete event handler, set the Theme property of the Page object based on the user profile.
B . In the PreLoad event handler, set the Theme property of the Page object based on the user profile.
C . In the OnLoad event handler, set the Theme property of the Page object based on the user profile.
D . In the PreInit event handler, set the Theme property of the Page object based on the user profile.
-
You need to recommend a management solution for the corporate Web sites that meets the museum’s security policy What should you include in the recommendation?()
A . Internet Information Services (IIS) Manager
B . Remote Desktop Services (RDS)
C . Remote Server Administration Tools (RSAT)
D . Windows PowerShell 2.0
-
You are implementing a Web page that displays text that was typed by a user. You need to display the user input in the Web page so that a cross-site scripting attack will be prevented. What should you do?()
A . Call document.write.
B . Call Response.Write.
C . Call HttpUtility.UrlEncode.
D . Call HttpUtility.HtmlEncode.
-
You create a control named ContosoUI for a Web application. You need to add the control to the toolbox of Microsoft Visual Studio .NET. Which two actions should you perform?()
A . Create the ContosoUI control as a Web Control Library.
B . Create the ContosoUI control as a Web user control.
C . Within the Visual Studio .NET toolbox, browse to and select ContosoUI.ascx.
D . Within the Visual Studio .NET toolbox, browse to and select ContosoUI.dll.
-
You create a Web page that contains the span shown in the following line of code. TextYou need replace the contents of the span with HTML that you download from a URL specified by a global variable named localURL. Which code segment should you use?()
A . $.ajax({ type: "GET", url: localURL, dataType: "jsonp", success: function(htmlText { $("#span1").text(htmlText); } });
B . $.ajax( localURL, {}, function(htmlText) { $("#span1").html(htmlText); },"html" );
C . $.ajax({ type: "GET", url: localURL, dataType: "html",success: function(htmlText) { $("#span1").innerHTML = htmlText; }});
D . $.ajax({ type: "GET", url: localURL, success: function(htmlText) { $("#span1").html(htmlText); } })
-
You are deploying a Web site to a server managed by a hosting company. The only access you have to the server is through FTP. You need to precompile and deploy the Web site without its source files. What should you do? ()
A . Use the Copy Web tool.
B . Use the Publish Web tool.
C . Use XCOPY.
D . Use the Web Setup project Installer.
-
You create a Web Form that contains connected Web Parts. You write the following declaration in your Web Form.You need to ensure that your Web Part connection is valid. Which two actions should you perform? ()
A . Include a data source identified as "WebPartConnection1" on the Web Form.
B . Include a Web Part identified as "customerPart" on the Web Form.
C . Include a Web Part identified as "ordersPart" on the Web Form.
D . Ensure that you declare an interface named "IOrdersPart".
E . Ensure that you declare an interface named "ICustomerPart".
F . Ensure that each Web Part declares either a GetInterface or ProvideInterface method.
-
You need to design a method to allow the new-ideas-testking.com Web site to function in accordance with security and business requirements. What should you do?()
A . Require a PPTP VPN for all connections to the Web server
B . Require that traffic between Web browsers and the Web server uses an L2TP/IPSec tunnel
C . Require that traffic between Web browsers and the Web server uses SSL
D . Require certificate mappings between the Web server and Active Directory
-
You are designing a DNS name resolution strategy to allow all users access to internal and external web sites. What should you do?()
A . Allow zone transfers to any DNS server.
B . Create a new stub zone for the DNS zone on the DNS server.
C . Configure the DNS server to forward all unanswered queries to a DNS server located at the ISP
D . Add the DNS server located at the ISP to the list of name servers for the fourthcoffee.com DNS zone
-
You are creating a templated Web control for use in your Web application. You need to add the Web control to your Web application pages without compiling your control into a .dll file. What should you do?()
A . Ensure that the Web control inherits from the WebControl class.
B . Ensure that the Web control inherits from the Control class.
C . Ensure that the Web control inherits from the CompositeControl class.
D . Ensure that the Web control inherits from the UserControl class.
-
You create a Web site. The Web site has many predefined roles and associated users that will be used for security purposes. You need to manage these roles and user accounts. Which tool should you use? ()
A . the Microsoft .NET Framework Configuration tool
B . the Code Access Security Policy tool
C . the ASP.NET IIS Registration tool
D . the Web Site Administration Tool
-
A customer has a web application with HTTP Sessions that need to be replicated to a backup site that is more than 100 miles away from the primary site, connected over the Internet. Which type of session replication in WebLogic is recommended?()
A . MAN Replication
B . WAN Replication
C . Synchronous Replication
D . Asynchronous Replication
E . Database Replicatio
-
You have a Web server named Server1 that runs Windows Server 2003 Service Pack 2 (SP2). Server1 hosts 100 Web sites. Each Web site uses a different application pool. You need to limit the network bandwidth for one of the Web sites. What should you do? ()
A . From Internet Information Services (IIS) Manager, modify the properties of the Web site.
B . From the Properties of the Local Area Connection, install QoS Packet Scheduler. From the Local Security Policy, configure the QoS Packet Scheduler settings.
C . From the Local Security Policy, enable auditing for Object Access. From the System Properties, modify the Performance settings.
D . From the Properties of the Local Area Connection, enable and configure Network Load Balancing.
-
You are creating an ASP.NET web application that hosts several Windows Communication Foundation (WCF) services.The services have ASP.NET Compatibility Mode enabled. Users authenticate with the Web application by using a cookie-based ASP.NET Forms Authentication model.You add a service file named Authentication.svc that contains the following code segment:<%@ ServiceHost Service="System.Web.ApplicationServices.AuthenticationService"Factory="System.Web.ApplicationServices.ApplicationServicesHostFactory" %>You need to ensure that users can access the WCF services without having to re-authenticate.Which two configuration settings should you add? (Each is part of a complete solution. Choose two.)()
A. In the system web. Extensions scripting/webServices/authenticationService element, set the enabled attribute to true.
B. In the system web. Extensions scripting/webServices/profileService element, set the enabled attribute to true.
C. Add a service endpoint with basicHttpBinding for the contract System.Web.ApplicationServices.AuthenticationService.
D. Add a custom service behavior named AuthenticationService Type Behaviors with a service AuthenticationManager element that has service AuthenticationManagerType set to System.Web.Security.SQL Membership Provider
-
You are creating a templated Web control for use in your Web application. You need to add the Web control to your Web application pages without compiling your control into a .dll file.What should you do?()
A. Ensure that the Web control inherits from the WebControl class.
B. Ensure that the Web control inherits from the Control class.
C. Ensure that the Web control inherits from the CompositeControl class.
D. Ensure that the Web control inherits from the UserControl class.
-
You are the network administrator for The network consists of a single Active Directory domain named All servers run Windows Server 2003.The network contains a Web server that runs IIS 6.0 and hosts a secure intranet site. All users are required to connect to the intranet site by authenticating and using HTTPS. However, because an automated Web application must connect to the Web site by using HTTP, you cannot configure the intranet site to require HTTPS.You need to collect information about which users are connecting to the Web site by using HTTPS.What should you do?()
A. Check the application log on the Web server.
B. Use Network Monitor to capture network traffic on the Web server.
C. Review the log files created by IIS on the Web server.
D. Configure a performance log to capture all Web service counters. Review the performance log data.
-
You create a Web Form that allows users to create a new account. You add a CreateUserWizard control by using the following code segment.You need to ensure that the wizard automatically sends an e-mail message to users when they finish creating their accounts. You add a valid element to the Web.config file.Which code segment should you add to the Page_Load event?()
A.Wizard1.RequireEmail = True
B.Wizard1.Email = "user@address.com"
C.Wizard1.MailDefinition.From = "registration@mysite.com"
D.SmtpMail.SmtpServer = "mail.contoso.com"
-
You are creating a custom user control. The custom user control will be used on 10 Web Forms for an ASP.NET Web site that allows users to register and log on to a personalized experience.The custom user control uses two TextBox controls and two Button controls.You need to ensure that the controls are visible only when users are not logged on to the Web site. You also need to minimize the amount of effort in development and maintenance for the Web site.Which two actions should you perform?()
A. Add the OnClick event handler for the Login button to the code used in the custom user control.
B. Add the OnClick event handler for the Login button to the code used in the Web Form where the control is added.
C. In the Page_Load method of the Web Form, add a code segment to set the visibility of the TextBox and Button controls where the control is added.
D. In the Page_Load method of the custom user control, add a code segment to set the visibility of the TextBox and Button controls.