单项选择题
You are employed as a system administrator at Certkiller.com. You decide to create an ASP.NETWeb application on the companies’ network. You do this using Microsoft .NET Framework v3.5.
You are in the process opf planning the establishing authentication for the Web application. Youneed to make sure that the application is able to support clients from untrusted domains. However,unknown clients should not be able to access the application.
What should you do?()
A.A
B.B
C.C
D.D
相关考题
-
单项选择题
You work as a Web Developer at Certkiller.com. You are in the process of creating a Webapplication using Microsoft ASP.NET 3.5. The configuration below exists in the Web.config file: <authorization> <deny users="?"/> </authorization> <authentication mode="Forms"/> <identity impersonate="false"/> Certkiller.com hosts the Web application in Microsoft Internet Information Services (IIS) 6.0. TheIntegrated Windows Authentication is enabled in IIS and anonymous access disabled. The application pool is configured to run as the identity Certkiller\WebApp. The IIS anonymous accountis Certkiller\Anonymous. The following code exists in the code-behind file for a web form: stringname = WindowsIdentity.GetCurrent().Name; Response.Write(name); A Certkiller.com employee named RoryAllen has a domain user account named Certkiller\RAllen.He uses this account to access the page. However, Rory Allen logs in to the Web application withthe user name FormsUser. You need to determine the output of this code when Rory Allenaccesses the page. What will the output of this code be?()
A.The output will be FormsUser.
B.The output will be Certkiller\RAllen.
C.The output will be Certkiller\Anonymous.
D.The output will be Certkiller\WebApp -
单项选择题
You are the newly appointed system administrator at Certkiller.com. You make use of Microsoft.NET Framework v3.5 to create a Microsoft ASP.NET application. You are responsible for a local instance of Microsoft SQL Server 2005 named CERTKILLER-SR02. CERTKILLER-SR02 hosts the ASP.NET Web application. CERTKILLER-SR02 makes useof Windows Authentication. You are in the process of planning the configuration of the membership providers as well as the role management providers. It is important that you install thedatabase elements for both the providers on CERTKILLER-SR02 from the command line. What should you do?()
A.Your best option would be to run the aspnet_regsql.exe -E -S localhost -A mr command.
B.Your best option would be to run the sqlcmd.exe -S localhost E command.
C.Your best option would be to run the sqlmetal.exe /server:localhost command.
D.Your best option would be to run the aspnet_regiis.exe -s localhost command. -
单项选择题
You are employed as a network administrator at Certkiller.com. You receive an instruction frommanagement to create an ASP.NET application. You create the application using Microsoft .NET Framework v3.5. You decide to deploy the application to the test server. You need to make sure that the code-behind files for the web pagesis gathered during the first request to the application as well as optimizing the performance of theapplication. What should you do?()
A.A
B.B
C.C
D.D
