Your company named Contoso, Ltd. has a two-node Network Load Balancing cluster. The cluster isintended to provide high availability and load balancing for only the intranet Web site. The nameof the cluster is web.contoso.com. You discover that Contoso users can see the Network Load Balancingcluster in the network neighborhood and can connect to various services by using the web.contoso.comname. The web.contoso.com Network Load Balancing cluster is configured with only one port rule. Youneed to configure the web.contoso.com Network Load Balancing cluster to accept only HTTP traffic. Whichtwo actions should you perform?()
A: Log on to one of the cluster nodes and run the wlbs disable all command.
B: Open the Network Load Balancing Clusters console and delete the default port rules.
C: Open the Network Load Balancing Clusters console and create a new Allow rule for TCP port 80.
D: Open the Network Load Balancing Clusters console and change the default port rule to a disabled portrange rule.
A: Log on to one of the cluster nodes and run the wlbs disable all command.
B: Open the Network Load Balancing Clusters console and delete the default port rules.
C: Open the Network Load Balancing Clusters console and create a new Allow rule for TCP port 80.
D: Open the Network Load Balancing Clusters console and change the default port rule to a disabled portrange rule.
举一反三
- You need to recommend changes to the intranet site that meet the company’s technical requirements. What should you include in the recommendation?() A: additional application pools B: additional worker processes C: Failover Clustering D: Network Load Balancing (NLB)
- You need to recommend a solution for the file servers that meets the company's technical requirements. What should you include in the recommendation?() A: Storage Manager for SANs B: Network Load Balancing (NLB) C: TCP/IP offload services D: the Multipath I/O feature
- All of the following are supervised learning ( ) . A: Neural network, Gaussian process regression, decision tree B: Decision tree, Gaussian process regression, collaborative training C: Decision tree, support vector machine, cluster analysis D: Decision tree, neural network, cluster analysis
- You work as the IT professional in an international company which is named Wiikigo. You are experiencedin implementing and administering a network operating system. You are specialized in deploying servers,configuring Windows Server 2008 Terminal services and network application services, and configuring aweb services infrastructure. You have the Web Server (IIS) server role installed on a new server that runsWindows Server 2008. You perform the installation of a Microsoft .NET Framework application on a Web site on the Web server.The application launches a process that presents a real-time graphical report to the Web browser andcreates a text report file on the hard disk drive. According to the requirement of the company securitypolicy, the application must not write to the event log, access Open Database Connectivity (ODBC) datasources or make network or Web service calls. The Web site needs to be configured so that the application can be executed. You must make sure that theapplication meets the outlined security requirements. So what action should you perform to make sure ofthis?() A: In order to make sure of this, the .NET Framework trust level should be set to Medium for the Web site. B: In order to make sure of this, the .NET Framework trust level should be set to Full for the Web site. C: In order to make sure of this, the .NET Framework trust level should be set to Low for the Web site. D: In order to make sure of this, the .NET Framework trust level should be set to High for the Web site.
- You have a computer that runs Windows 7. The network contains a monitoring server named Server1. Thecomputer runs a monitoring service named Service1. Service1 uses Remote Procedure Calls (RPCs). Youneed to ensure that Service1 can receive requests from Server1. What should you do?() A: From Windows Firewall with Advanced Security, create a predefined rule. B: From Windows Firewall with Advanced Security, create a custom rule. C: From Network and Sharing Center, modify the network location settings. D: From Network and Sharing Center, modify the advanced sharing settings.