-
You are designing a strategy to allow users to gain VPN access to the internal network. What should you do?()
A . Allow all inbound VPN traffic to pass through the internal firewall and the perimeter firewall.
B . Allow all inbound VPN traffic to pass through the perimeter firewall only.
C . Allow all VPN traffic from the source IP address of 131.107.1.14 to pass through the internal firewall.
D . Allow all VPN traffic from the source IP address of 191.168.1.0/24 to pass through the perimeter firewall.
-
You are designing a strategy to allow users to gain VPN access to the internal network. What should you do?()
A . Allow all inbound VPN traffic to pass through the internal firewall and the perimeter firewall.
B . Allow all inbound VPN traffic to pass through the perimeter firewall only.
C . Allow all VPN traffic from the source IP address of 131.107.1.14 to pass through the internal firewall.
D . Allow all VPN traffic from the source IP address of 191.168.1.0/24 to pass through the perimeter firewall.
-
You need to create a view EMP_VU. The view should allow the users to manipulate the records of only the employees that are working for departments 10 or 20. Which SQL statement would you use to create the view EMP_VU? ()
A . CREATE VIEW emp_vu AS SELECT * FROM employees WHERE department _ id IN (10,20);
B . CREATE VIEW emp_vu AS SELECT * FROM employees WHERE department_id IN (10,20) WITH READ ONLY;
C . CREATE VIEW emp_vu AS SELECT * FROM employees WHERE department_id IN (10,20) WITH CHECK OPTION;
D . CREATE FORCE VIEW emp_vu AS SELECT * FROM employees WITH department_id IN (10,20);
E . CREATE FORCE VIEW emp_vu AS SELECT * FROM employees WHERE department_id IN (10,20) NO UPDATE
-
You manage 40 computers that run Microsoft Windows Vista. You use Microsoft Windows Calendar to publish a calendar to a shared network location. You need to allow users to automatically view the most recent calendar updates. What should you do? ()
A . Instruct all users to configure a calendar subscription that has an update interval of 15 minutes.
B . Instruct all users to perform calendar synchronization for all shared calendar subscriptions.
C . Instruct all users to map a network drive to the folder that holds the shared calendar. Import the .ics file for the shared calendar.
D . Use e-mail messages to deploy the .ics file for the shared calendar to each user. Instruct each user to import the .ics file that is attached to the e-mail message.
-
You are designing a strategy to allow users to have remote access to internal resources. Which service or services should you allow on the public interface of the NAT Server?()
A . HTTP
B . LDAP
C . POP3
D . SMTP
E . VPN Gateway
-
You install the FTP role service on a server that runs Windows Server 2008. Users receive an errormessage when they attempt to upload files to the FTP site. You need to allow authenticated users to upload files to the FTP site. What should you do?()
A . Run the ftp Ca 192.168.1.200 command on the server that runs Windows Server 2008.
B . Run the appcmd unlock config command on the server that runs Windows Server 2008.
C . Configure Write permissions on the FTP site. Configure the NTFS permissions on the FTP destination folder for the Authenticated Users group to Allow - Modify.
D . Configure Write permissions on the FTP site. Configure the NTFS permissions on the FTP destination folder for the Authenticated Users group to Allow C Write attributes.
-
You need to create a view EMP_VU. The view should allow the users to manipulate the records of only the employees that are working for departments 10 or 20. Which SQL statement would you use to create the view EMP_VU?()
A . CREATE VIEW emp_vu AS SELECT * FROM employees WHERE department_id IN (10,20);
B . CREATE VIEW emp_vu AS SELECT * FROM employees WHERE department_id IN (10,20) WITH READ ONLY;
C . CREATE VIEW emp_vu AS SELECT * FROM employees WHERE department_id IN (10,20) WITH CHECK OPTION;
D . CREATE FORCE VIEW emp_vu AS SELECT * FROM employees WHERE department_id IN (10,20);
E . CREATE FORCE VIEW emp_vu AS SELECT * FROM employees WHERE department_id IN (10,20) NO UPDATE
-
You share your computer with two users who belong to the Users group. You need to ensure that all users are informed of new updates. What should you do?()
A . Enable the Turn on recommended updates via Automatic Updates option.
B . Enable the Allow non-administrators to receive update notifications option.
C . Enable the Enable client-side targeting option and specify the target group.
D . Disable the Do not display "Install Updates and Shut Down" option in Shut Down Windows Dialog box option.
-
A user named User1 uses a computer that runs Windows XP Professional. You need to enable User1 to create local user accounts. You must minimize the rights assigned to the User1 account. Which group should you add User1 to?()
A . Administrators
B . Power Users
C . Users
D . Network Configuration Operator
-
You need to prevent users from storing cookies that come from the www.contoso.com Web site. The solution must allow users to browse to the www.contoso.com Web site. What should you do?()
A . Add an entry to the Lmhosts file.
B . From the local area connection, add a DNS suffix.
C . From Internet Explorer, modify the Privacy settings.
D . From Internet Explorer, modify the Manage Add-ons settings.&e
-
You are the DBA for an academic database. You need to create a role that allows a group of users to modify existing rows in the STUDENT_GRADES table. Which set of statements accomplishes this? ()
A . CREATE ROLL registrar; GRANT MODIFY ON student_grant TO registrar; GRANT registrar to user 1, user2, user3
B . CREATE NEW ROLE registrar; GRANT ALL ON student_grant TO registrar; GRANT registrar to user 1, user2, user3
C . CREATE ROLL registrar; GRANT UPDATE ON student_grant TO registrar; GRANT ROLE to user1, user2, user3
D . CREATE ROLL registrar; GRANT UPDATE ON student_grant TO registrar; GRANT registrar to user 1, user2, user3;
E . CREATE registrar; GRANT CHANGE ON student_grant TO registrar; GRANT registrar
-
You deploy your companys Internet Web site. You need to deny anonymous access to the Web site, allowing only authenticated users. Which code segment should you use?()
A . <authorization> <allow users="?"/> </authorization>
B . <authorization> <deny users="?"/> </authorization>
C . <authorization> <deny users="*"/></authorization>
D . <authorization> <allow users="*"/> </authorization>
-
Remote users are unable to connect to a shared folder on your computer. You need to allow access to the shared folder.
What are the two possible ways to achieve this goal?()
https://assets.asklib.com/images/image2/201807311511466131.jpg
A . A
B . B
C . C
D . D
-
You need to recommend changes to the environment that meet the company’s user requirements. What should you include in the recommendation?()
A . a BranchCache in Distributed Cache mode
B . a BranchCache in Hosted Cache mode
C . Distributed File System (DFS) namespaces
D . Distributed File System (DFS) Replicatio
-
Remote users are unable to connect to a shared folder on your computer. You need to allow access to the shared folder. What are the two possible ways to achieve this goal?()
A . Restore the Microsoft Windows Firewall defaults.
B . Validate the permissions on the shared folder by using Microsoft Windows Explorer.
C . Enable the File and Printer Sharing exception in Windows Firewall.
D . Enable the Internet Connection Sharing exception in Windows Firewall.
-
You create a Password Settings object (PSO). You need to apply the PSO to a domain user named User1. What should you do()
A . Modify the properties of the PSO.
B . Modify the account options of the User1 account.
C . Modify the security settings of the User1 account.
D . Modify the password policy of the Default Domain Policy Group Policy object (GPO).
-
You need to design a remote access authentication strategy that will allow users in the IT department to remotely connect to the network. Your solution must meet security requirements. What should you do?()
A . Install Internet Authentication Services (IAS) on a server in the den.corp.woodgrovebank.com domain. Configure the VPN servers as RADIUS clients
B . Install Internet Authentication Services (IAS) on a stand-alone server in the Denver extranet. Create local user accounts for the IT personnel on the IAS server. Configure the VPN servers as RADIUS clients
C . Create a remote access policy on each of the VPN servers. Configure the policy to use the den.corp.woodgrovebank.com to authenticate remote access users. Configure the policy to require L2TP to establish a connection
D . Create a remote access policy on each of the VPN servers. Create local user accounts for the IT personnel on the VPN servers. Configure the policy to use the VPN servers’ local accounts database to authenticate users. Configure the policy to require L2TP to establish a connectio
-
You install the FTP role service on a server that runs Windows Server 2008. Users receive an errormessage when they attempt to upload files to the FTP site. You need to allow authenticated users toupload files to the FTP site. What should you do?()
A . Run the ftp Ca 192.168.1.200 command on the server that runs Windows Server 2008.
B . Run the appcmd unlock config command on the server that runs Windows Server 2008.
C . Configure Write permissions on the FTP site. Configure the NTFS permissions on the FTP destinationfolder for the Authenticated Users group to Allow - Modify.
D . Configure Write permissions on the FTP site. Configure the NTFS permissions on the FTP destinationfolder for the Authenticated Users group to Allow C Write attributes.
-
You deploy your companys Internet Web site. You need to deny anonymous access to the Web site, allowing only authenticated users. Which code segment should you use?()
A .https://assets.asklib.com/images/image2/2018072715022379718.jpg
B .https://assets.asklib.com/images/image2/2018072715022848525.jpg
C .https://assets.asklib.com/images/image2/2018072715023295714.jpg
D .https://assets.asklib.com/images/image2/2018072715023680640.jpg
-
You create a Password Settings object (PSO). You need to apply the PSO to a domain user named User1. What should you do()
A . Modify the properties of the PSO.
B . Modify the account options of the User1 account.
C . Modify the security settings of the User1 account.
D . Modify the password policy of the Default Domain Policy Group Policy object (GPO).
-
You use Microsoft .NET Framework 4 to create a Windows Forms application. You need to allow the user interface to use the currently configured culture settings in the Control Panel. Which code segment should you use?()
A . Thread.CurrentThread.CurrentUICulture = Thread.CurrentThread.CurrentCulture;
B . Thread.CurrentThread.CurrentCulture = Thread.CurrentThread.CurrentUICulture;
C . Thread.CurrentThread.CurrentUICulture = CultureInfo.InstalledUICulture;
D . Thread.CurrentThread.CurrentCulture = CultureInfo.InstalledUICulture
-
You need to recommend changes to the network that address the user problems statement. What should you recommend?()
A . Deploy DirectAccess.
B . Configure folder redirection.
C . Create a volume mount point.
D . Implement additional DFS targets.
-
You create a Web Form that allows users to create a new account. You add a CreateUserWizard control by using the following code segment.You need to ensure that the wizard automatically sends an e-mail message to users when they finish creating their accounts. You add a valid element to the Web.config file.Which code segment should you add to the Page_Load event?()
A.Wizard1.RequireEmail = True
B.Wizard1.Email = "user@address.com"
C.Wizard1.MailDefinition.From = "registration@mysite.com"
D.SmtpMail.SmtpServer = "mail.contoso.com"
-
You are creating a custom user control. The custom user control will be used on 10 Web Forms for an ASP.NET Web site that allows users to register and log on to a personalized experience.The custom user control uses two TextBox controls and two Button controls.You need to ensure that the controls are visible only when users are not logged on to the Web site. You also need to minimize the amount of effort in development and maintenance for the Web site.Which two actions should you perform?()
A. Add the OnClick event handler for the Login button to the code used in the custom user control.
B. Add the OnClick event handler for the Login button to the code used in the Web Form where the control is added.
C. In the Page_Load method of the Web Form, add a code segment to set the visibility of the TextBox and Button controls where the control is added.
D. In the Page_Load method of the custom user control, add a code segment to set the visibility of the TextBox and Button controls.