You work as an application developer at Certkiller .com. You have been asked to profile a business application that can be accessible using the Event Log API. You have started by adding the following code to create a custom event log: if (EventLog.SourceExists ("Application1")) EventLog.DeleteEventSource ("Application1"); //Create new event log EventLog.CreateEventSource ("Application1", "Profile"); You need to write an event to the Application1 event log. What code must you use?()
查看答案
You have a server that runs Windows Server 2008 You need to configure the server as a VPN server. What should you install on the server()
A. Windows Deployment Services role and Deployment Server role service
B. Windows Deployment Services role and Deployment transport role service
C. Network Policy and Access services role and routing and remote access services role service
D. Network Policy and access services and host credential authorization protocol role service
Study the following graphic carefully Host1 and Host2, which belong to different VLANs, are in thesame subnet. According to the information displayed, which description is correct when trying toping from host to host?()
A trunk port should be configured on the link between CK-SW1 and CK-SW2 to pingsuccessfully
B. The two hosts should be in the same VLAN in order to ping successfully
C. A Layer 3 device is a must in order for the ping command to be successful
D. The ping command will be successful without any further configuration changes
You work as an application developer at Certkiller .com. The Certkiller .com network contains an application server named Certkiller -SR07. You have been asked to profile a business application that can be accessible using the Event Log API. You want to achieve this by creating a custom event log on Certkiller -SR07. What should you do?()
A
B
C
D
You deploy a Windows Server 2008 VPN server behind a firewall. Remote users connect to the VPN by using portable computers taht run Windows Vista with the latest service pack. the firewall is configured to allow only secured Web communications. you need to enable remote users to connect as securely as possible. You must achieve this goal without opening any additional ports on the firewall. What should you do? ()
A. Create an IPsec tunnel
B. Create an SSTP VPN connection
Create a PPTP VPN connection
D. Create a L2TP VPN connection