网友您好, 请在下方输入框内输入要搜索的题目:

题目内容 (请给出正确答案)
单选题
Which the security mechanism uses the concept of a realm?()
A

 authorization

B

 data integrity

C

 confidentiality

D

 authentication


参考答案

参考解析
解析: 暂无解析
更多 “单选题Which the security mechanism uses the concept of a realm?()A  authorizationB  data integrityC  confidentialityD  authentication” 相关考题
考题 Whichelementofawebapplicationdeploymentdescriptorelementisrequired?() A.realm-nameB.auth-methodC.security-roleD.transport-guaranteeE.web-resource-collection

考题 An authentication realm consists of which three authentication resources?() A. Authentication serverB. Session optionsC. Authentication policyD. End-point security policyE. Role-mapping rules

考题 Which cisco security product line uses deep inspection to identify and prevent malicious attacks, resource misuse, and unauthorized access?() A.MARSB.NACC.VPND.IPS

考题 When creating a network security solution, which two pieces of information should you have previously obtained to assist in designing the solution? ()A、a list of existing network applications currently in use on the networkB、network audit results to uncover any potential security holesC、a planned Layer 2 design solutionD、a proof-of-concept planE、device configuration templates

考题 Which statement is true about the components of a queuing mechanism?()A、Each subinterface has its own hardware queue and can experience congestion just like its main interfaceB、Hardware queuing is only used if the software queues are experiencing congestion.C、Hardware queues and software queues are not used concurrently.D、The hardware queuing system always uses the FIFO queuing mechanism.

考题 Which two statements about the Wired Equivalent Privacy (WEP) encryption mechanism are true? ()A、the two methods of authentication using the WEP encryption are open and shared keyB、the 802.11 standard defines WEP security using 128-bit keysC、WEP can provide stronger authentication through the use of LEAP, PEAP, or EAP-FASTD、WEP is a scalable encryption solution that uses static keys for authenticationE、WEP security provides only one-way authenticationF、WEPv2 offers improved encryption by replacing the RC4 encryption mechanism with the AES (symmetric block cipher) mechanism

考题 Which security mechanism is employed only on the server-side to limit access to resources or components?()A、 authorizationB、 data integrityC、 confidentialityD、 authentication

考题 Which element of a web application deployment descriptor  element is required()?A、 realm-name B、 auth-method C、 security-role D、 transport-guarantee E、 web-resource-collection

考题 Which element of a web application deployment descriptor  element is required?()A、realm-nameB、auth-methodC、security-roleD、transport-guaranteeE、web-resource-collection

考题 An authentication realm consists of which three authentication resources?()A、Authentication serverB、Session optionsC、Authentication policyD、End-point security policyE、Role-mapping rules

考题 Which two statements about using the CHAP authentication mechanism in a PPP link are true?()A、CHAP uses a two-way handshakeB、CHAP authentication periodically occurs after link establishmentC、CHAP has no protection from playback attacksD、CHAP authentication is performed only upon link establishmentE、CHAP uses a three-way handshakeF、CHAP authentication passwords are sent in plaintext

考题 Which two wireless security statements are true?()A、A TACACS+ server is required to implement 802.1x.B、MIC protects against man-in-the-middle and replay attacks.C、The 802.1x standard provides encryption services for wireless clients.D、The AES (symmetric block cipher) is specified in the IEEE 802.11i specification.E、The IEEE 802.11i specification uses RC4 as its encryption mechanism.F、WPA requires TKIP and AES as encryption methods.

考题 What are three security problems with Wi-Fi Protected Access (WPA)?()A、WPA is based on the outdated IEEE 802.11i standard.B、WPA uses RSN,which uses the same base encryption algorithm as RC4.C、WPA requires a hardware upgrade that may not be supported by all vendors.D、WPA uses TKIP,which uses the same base encryption algorithm as WEP.E、WPA is susceptible to a DoS attack when it receives two packets in quick succession with bad MICs,forcing the AP to shut down the entire Basic Service Set (BSS) for one minute.F、WPA is susceptible to a security weakness when preshared keys are used.

考题 Which cisco security product line uses deep inspection to identify and prevent malicious attacks,resource misuse, and unauthorized access?()A、MARSB、NACC、VPND、IPS

考题 A technician installed a new wireless access point on an existing small office home office (SOHO) network with a selective security option enabled. All wireless computers connect to the new network except one computer that cannot connect to the wireless network. Which of the following is the cause?()A、The network uses MAC filteringB、The network uses WEPC、The network uses SSID broadcastD、The network uses WPA

考题 Which security mechanism can be directed through the  element in a web deployment descriptor()?A、 authorizationB、 data integrityC、 confidentialityD、 authentication

考题 多选题Which two statements about using the CHAP authentication mechanism in a PPP link are true?()ACHAP uses a two-way handshakeBCHAP authentication periodically occurs after link establishmentCCHAP has no protection from playback attacksDCHAP authentication is performed only upon link establishmentECHAP uses a three-way handshakeFCHAP authentication passwords are sent in plaintext

考题 单选题Which the security mechanism uses the concept of a realm?()A  authorizationB  data integrityC  confidentialityD  authentication

考题 单选题Which statement is true about the components of a queuing mechanism?()A Each subinterface has its own hardware queue and can experience congestion just like its main interfaceB Hardware queuing is only used if the software queues are experiencing congestion.C Hardware queues and software queues are not used concurrently.D The hardware queuing system always uses the FIFO queuing mechanism.

考题 单选题A technician installed a new wireless access point on an existing small office home office (SOHO) network with a selective security option enabled. All wireless computers connect to the new network except one computer that cannot connect to the wireless network. Which of the following is the cause?()A The network uses MAC filteringB The network uses WEPC The network uses SSID broadcastD The network uses WPA

考题 单选题Which security mechanism can be directed through the  element in a web deployment descriptor()?A  authorizationB  data integrityC  confidentialityD  authentication

考题 单选题Which security mechanism is employed only on the server-side to limit access to resources or components?()A  authorizationB  data integrityC  confidentialityD  authentication

考题 单选题Which security mechanism uses the concept of a realm?()A AuthorizationB Data integrityC ConfidentialityD Authentication

考题 多选题An authentication realm consists of which three authentication resources?()AAuthentication serverBSession optionsCAuthentication policyDEnd-point security policyERole-mapping rules

考题 单选题Which element of a web application deployment descriptor  element is required()?A  realm-name B  auth-method C  security-role D  transport-guarantee E  web-resource-collection

考题 多选题Identify the two optional WebLogic security providers in an Oracle WebLogic security realm()AAuthentication ProviderBAdjudication ProviderCAuthorization ProviderDAuditing Provider

考题 多选题What are three security problems with Wi-Fi Protected Access (WPA)?()AWPA is based on the outdated IEEE 802.11i standard.BWPA uses RSN,which uses the same base encryption algorithm as RC4.CWPA requires a hardware upgrade that may not be supported by all vendors.DWPA uses TKIP,which uses the same base encryption algorithm as WEP.EWPA is susceptible to a DoS attack when it receives two packets in quick succession with bad MICs,forcing the AP to shut down the entire Basic Service Set (BSS) for one minute.FWPA is susceptible to a security weakness when preshared keys are used.

考题 多选题When creating a network security solution, which two pieces of information should you have previously obtained to assist in designing the solution? ()Aa list of existing network applications currently in use on the networkBnetwork audit results to uncover any potential security holesCa planned Layer 2 design solutionDa proof-of-concept planEdevice configuration templates