Which statement is correct about HTTP trickling?()
第1题:
Originally introduced by Netscape Communications,(21)are a general mechanism which HTTP Server side applications, such as CGI(22), can use to both store and retrieve information on the HTTP(23)side of the connection. Basically, Cookies can be used to compensate for the(24)nature of HTTP. The addition of a simple, persistent, client-side state significantly extends the capabilities of WWW-based(25).
A.Browsers
B.Cookies
C.Connections
D.Scripts
第2题:
A. sessions
B. sa-validate
C. split-horizon
D. duplicate-protection
第3题:
第4题:
第5题:
Your network has a main office and a branch office. The branch office has five client computers that runWindows 7 and a server that runs Windows Server 2008 R2. The branch office server is enabled for branchCache. You need to configure Windows Firewall on each client computer so that cached content canbe retrieved from the branch office server. Which firewall rule should you enable on the client computers?()
第6题:
If a certificate authority trustpoint is not configured when enabling HTTPS and the remote HTTPS server requires client authentication, connections to the secure HTTP client will fail. Which command must be enabled for correct operation?()
第7题:
A web server is running correctly but sending a RST packet to any client trying to connect using HTTP on TCP port 80. Which of the following tools should be used to determine the listening port of the web server?()
第8题:
Which mechanism requires the client to provide its public key certificate?()
第9题:
The direct handoff connection method to an Oracle9i Shared Server involves fewer messages than in previous releases of the multithreaded architecture. Which type of message has been eliminated?()
第10题:
Your network contains a Windows Server Update Services (WSUS) server. A Group Policy object (GPO) configures all WSUS client computers to detect updates hourly and install updates weekly.You download a critical update.You need to ensure that the WSUS client computers install the critical update during the next detection interval. What should you do?()
第11题:
sessions
sa-validate
split-horizon
duplicate-protection
第12题:
the DVS engine can useWebroot and McAfee scanning in parallel
the DVS engine generates the WBRS
the DVS engine never inspects the client HTTP request
the DVS engine is only used for Layer 4 traffic monitoring
第13题:
A. It prevents the HTTP client or server from timing-out during an antivirus update
B. It prevents the HTTP client or server from timing-out during antivirus scanning.
C. It is an attack.
D. It is used to bypass antivirus scanners.
第14题:
Originally-introduced by Netscape Communications,(31)are a general mechanism which HTTP Server side applications, such as CGI(32), can use to both store and retrieve information on the HTTP(33)side of the connection. Basically, Cookies can be used to compensate for the(34)nature of HTTP. The addition ora simple, persistent, client-side state significantly extends the capabilities of WWW-based(35).
A.Browsers
B.Cookies
C.Connections
D.Scripts
第15题:
第16题:
Which statement is correct regarding the operation of DHCP?()
第17题:
Which two statistical data types are available on the statistics page of the WebUI? ()(Choose two.)
第18题:
Which statement about the DVS engine is true?()
第19题:
Which the HTTP method represents a request for information about the supported methods on an HTTP server?()
第20题:
Which configuration command prevents a client from establishing multiple PPPoE connections from a single workstation?()
第21题:
You have an Exchange Server 2010 organization. You need to recommend a client access solution that meets the following requirements: .Reduces the time required for users to reconnect to user mailboxes if a single Client Access server fails .Prevents users from being prompted for authentication if a single Client Access server fails What should you recommend?()
第22题:
It prevents the HTTP client or server from timing-out during an antivirus update
It prevents the HTTP client or server from timing-out during antivirus scanning.
It is an attack.
It is used to bypass antivirus scanners.
第23题:
GET
INFO
HEAD
TRACE
OPTIONS