Answering the following questions will reinforce key information presented in this chapter. If you’re unable to answer a question, review the appropriate lesson and then try the question again. Answers to the questions can be found in the appendix.
- You’re the network administrator for Trey Research. You’re deploying a Web application that incorporates ActiveX controls, client-side scripting, ASP, server-side scripting, COM+ components, and stored procedures. Much of the content for the site will be stored in a SQL Server database. The COM+ components will be in a COM+ application cluster separate from the Web cluster. How should you deploy the application?
- You’re managing a SQL Server database that supports several applications on your Web servers. You decide to partition several of the tables in the database to improve performance. What two methods can you use to access the partitioned data?
- After you partition the data in your SQL Server database, you decide to implement a fault-tolerant solution to ensure the data’s availability. What two high-availability solutions can you use in conjunction with partitioning?
- You’re configuring your Web site to support Outlook Web Access so that users can access their e-mail accounts through a browser. You’re trying to determine how to set up the Exchange 2000 Server environment to support your users. You want the environment to support a unified namespace, and you want to isolate the data store from attacks. Which Exchange configur-ation model should you use?
- You’re setting up Outlook Web Access for your company’s employees so that they can access their e-mail accounts through a browser. You plan to use a multiserver configuration and Windows clustering technologies to create a front-end NLB cluster and a back-end Cluster service cluster. You want to provide the highest level of security and operability between clients and servers by encrypting the entire communication session. Which protocol should you use?