单项选择题
You are the network administrator for The network consists of a single Active Directory domain named All network servers run Windows Server 2003.
A member server named TK1 runs IIS. You install a Web-enabled application on TK1. The application includes a security feature that detects unauthorized attemptsto access the server. Whenever an authorized attempt is detected, the application automatically modifies the IIS configuration file to restrict the unauthorized user's access.
To test the security feature, you try to gain unauthorized access to TK1. Twenty seconds after your first attempt, you try again. However, TK1 does not restrict your access on the second attempt.
You wait five minutes, and then you examine the IIS configuration file. You verify that it was correctly modified by the application to restrict your access.
You need to configure IIS to ensure that changes in the IIS configuration file will result in immediate changes in the behaviour of IIS.
What should you do?()
A. Select the Enable Direct Metabase Edit option.
B. Specify the service account for the Application Pool as the IIS service account.
C. Select the Enable Rapid-Fail protection option.
D. Specify the status of the Internet Data Connector Web service extension as Allow.
相关考题
-
单项选择题
You are the network administrator for The network consists of a single Active Directory domain named testking.com. All domain controllers run Windows Server 2003. A member server named TestKing3 has IIS installed. TestKing3 hosts all content for company web sites. The server is backed up on magnetic tape once each month. To replace the web functionality of TestKing3, the company acquires a new computer. You configure the computer as a member server named TestKing4 and install IIS. You transfer all content from TestKing3 to TestKing4 and start the IIS service on TestKing4. You discover that TestKing4 is not configured with the IIS settings that were defined on TestKing3. You need to ensure that TestKing4 has the same IIS settings that were defined on TestKing3. What should you do?()
A. Use the most recent backup tape of TestKing3 to restore the System State data on TestKing4.
B. Use the most recent backup tape of TestKing3 to restore C:\windows\system32\inetsrv\History on TestKing4.
C. Use IIS manager on TestKing3 to select the Save Configuration to Disk option. Edit the files to replace system-specific information. Use the edited files to restore the IIS metabase on TestKing4.
D. Use IIS manager on TestKing3 to select the Backup/Restore Configuration option. Edit the files to replace system-specific information. Use the edited files to restore the IIS metabase on TestKing4. -
单项选择题
You are the network administrator for The network consists of a single Active Directory domain named Site License Logging is enabled in the domain. Administrators report that they cannot manage Client Access Licenses. When they attempt to open Licensing, they receive the following error: "RPC Server too busy." You suspect there is a problem on the domain controller that functions as the site license server. You do not know which domain controller is the site license server. You need to locate the site license server. What should you do?()
A. Open Licensing, click the Server Browser tab, and expand your domain. Inspect the properties of each server.
B. Open Active Directory Sites and Services, open the properties for the site name. Inspect the contents of the Location tab.
C. Open the Active Directory Users and Computers, click your domain name, click Action, and select Operations Masters. Inspect the contents of the Infrastructure tab.
D. Open Active Directory Sites and Services, and click your site name. Inspect the properties of the Licensing Site Settings. -
单项选择题
You are the network administrator for TestKing. All servers run Windows Server 2003. Twenty TestKing employees connect to a terminal server named Testking2 to run applications and to gain access to the Internet. The 20 employees report that they receive security messages while browsing Internet Web sites. The employees report that they cannot modify the Internet Explorer security settings on their client computers while connected to Testking2. You need to allow these 20 employees to modify the Internet Explorer security settings in their client computers while connected to Testking2. What should you do?()
A. Log on to Testking2 as Administrator and add http:// to the list of trusted sites in Internet Explorer.
B. Instruct the 20 employees to add http:// to the list of trusted sites in Internet Explorer on their client computers.
C. Instruct the 20 employees to change the Internet Explorer privacy settings on their client computers to Low.
D. Uninstall Internet Explorer Enhanced Security Configuration on Testking2.
