题目详情
当前位置:首页 > 职业培训考试
题目详情:
发布时间:2023-10-21 09:53:59

[多项选择] You create Web sites for your company. You apply a consistent design to the pages and controls of the Web sites. You need to make style changes to all of the Web sites on the Web server. You want to achieve this goal without having to edit the individual pages on each Web site. Which two actions should you perform?()
A. Place a theme in the App_Themes directory under the application root directory.
B. Place a theme under an ASP.NETClientFiles folder under the ASP.NET installation directory.
C. Assign a theme by setting the <%@ Page Theme="..." %> directive to the name of the application theme.
D. Assign a theme by specifying the <pages theme="..."/> section in the Web.config file.

更多"You create Web sites for your compa"的相关试题:

[多项选择]You create Web sites for your company. You apply a consistent design to the pages and controls of the Web sites. You need to make style changes to all of the Web sites on the Web server. You want to achieve this goal without having to edit the individual pages on each Web site. Which two actions should you perform?()
A. Place a theme in the App_Themes directory under the application root directory.
B. Place a theme under an ASP.NETClientFiles folder under the ASP.NET installation directory.
C. Assign a theme by setting the <%@ Page Theme="..." %> directive to the name of the application theme.
D. Assign a theme by specifying the section in the Web.config file.
[单项选择]You deploy your companys Internet Web site. You need to deny anonymous access to the Web site, allowing only authenticated users. Which code segment should you use? ()
A.
B.
C.
D.
[单项选择] On your newly installed router, you apply the access list illustrated below to interface Ethernet 0 on a Cisco router. The interface is connected to the 192.168.1.8/29 LAN. access-list 123 deny tcp 192.168.166.18 0.0.0.7 eq 20 any access-list 123 deny tcp 192.168.166.18 0.0.0.7 eq 21 any How will the above access lists affect traffic?()
A. All traffic will be allowed to exit E0 except FTP traffic.
B. FTP traffic from 192.168.166.19 to any host will be denied.
C. FTP traffic from 192.168.166.22 to any host will be denied.
D. All traffic exiting E0 will be denied.
E. All FTP traffic to network 192.168.166.18/29 from any host will be denied.
[单项选择]You develop a Web application. Your application contains two settings in the Web.config file. You deploy your application to production. You need to modify the application settings in the production environment without manually editing the XML markup in the Web.config file. What should you do? ()
A. Modify the application settings by using the Web Site Administration Tool.
B. Modify the application settings by using the Visual Studio property page editor for the project.
C. Modify the application settings by using the resource editor.
D. Modify the application settings by using the Visual Studio start options editor.
[单项选择] You are developing a Web application. Your code restricts access to some pages based on the users credentials. You need to configure IIS to supply the user's Windows credentials to your Web application. These credentials must be encrypted. What should you do? ()
A. Enable Anonymous access. Enable Integrated Windows authentication.
B. Enable Anonymous access. Enable Basic authentication.
C. Disable Anonymous access. Enable Integrated Windows authentication.
D. Disable Anonymous access. Enable Basic authentication.
[单项选择] In your web application,you need to execute a block of code whenever the session object is first created. Which design will accomplish this goal?()
A. Create an HttpSessionListener class and implement the sessionInitialized method with that block ofcode.
B. Create an HttpSessionActivationListener class and implement the sessionCreated method with thatblock of code.
C. Create a Filter class, call the getSession(false) method, and if the result was null, then execute that block of code.
D. Create an HttpSessionListener class and implement the sessionCreated method with that block of code.
[单项选择]Your network contains two Web servers named Web1 and Web2. Web1 hosts the companys corporate Web site. Web2 is a test server that contains a copy of the Web site.Users connect to Web1 by using the URL http://www.contoso.com.A Web developer named User1 plans to test updates to the Web site on Web2.You need to ensure that User1 connects to Web2 by using the URL http://www.contoso.com. The solution must ensure that all other computers connect to Web1.What should you do?()
A. From User1s computer, create a record in the Hosts file.
B. From User1s computer, create a record in the Lmhosts file.
C. From a DNS server, create a new Host (A) resource record.
D. From a DNS server, create a new Alias (CNAME) resource record.
[多项选择]You create a Web Form that contains connected Web Parts. You write the following declaration in your Web Form.You need to ensure that your Web Part connection is valid. Which two actions should you perform? ()
A. Include a data source identified as "WebPartConnection1" on the Web Form.
B. Include a Web Part identified as "customerPart" on the Web Form.
C. Include a Web Part identified as "ordersPart" on the Web Form.
D. Ensure that you declare an interface named "IOrdersPart".
E. Ensure that you declare an interface named "ICustomerPart".
F. Ensure that each Web Part declares either a GetInterface or ProvideInterface method.
[单项选择]You create a Web application. The Web application enables users to change fields in their personal profiles. Some of the changes are not persisting in the database. You need to raise a custom event to track each change that is made to a user profile so that you can locate the error. Which event should you use? ()
A. WebAuditEvent
B. WebEventManager
C. WebBaseEvent
D. WebRequestEvent
[单项选择]How do you apply UTM enforcement to security policies on the branch SRX series?()
A. UTM profiles are applied on a security policy by policy basis.
B. UTM profiles are applied at the global policy level.
C. Individual UTM features like anti-spam or anti-virus are applied directly on a security policy by policy basis.
D. Individual UTM features like anti-spam or anti-virus are applied directly at the global policy level.
[单项选择]You develop a Web control. The Web control consists of labels and associated text boxes. You need to ensure that the Web control has both toolbox and visual designer support. What should you do? ()
A. Add a Web Control Library project to your solution. Define a class that inherits from CompositeControl.
B. Add a Windows Control Library project to your solution. Define a class that inherits from UserControl.
C. Add a Web User Control to your project. Define a class that inherits from UserControl.
D. Add a Mobile Web User Control to your project. Define a class that inherits from MobileUserControl.

我来回答:

购买搜题卡查看答案
[会员特权] 开通VIP, 查看 全部题目答案
[会员特权] 享免全部广告特权
推荐91天
¥36.8
¥80元
31天
¥20.8
¥40元
365天
¥88.8
¥188元
请选择支付方式
  • 微信支付
  • 支付宝支付
点击支付即表示同意并接受了《购买须知》
立即支付 系统将自动为您注册账号
请使用微信扫码支付

订单号:

请不要关闭本页面,支付完成后请点击【支付完成】按钮
恭喜您,购买搜题卡成功
重要提示:请拍照或截图保存账号密码!
我要搜题网官网:https://www.woyaosouti.com
我已记住账号密码