网友您好, 请在下方输入框内输入要搜索的题目:
题目内容
(请给出正确答案)
单选题
When using a form-based authentication, which action must be used in the login form?()
A
j_login
B
j_get_user
C
j_login_check
D
j_get_security
E
j_security_check
参考答案
参考解析
解析:
暂无解析
更多 “单选题When using a form-based authentication, which action must be used in the login form?()A j_loginB j_get_userC j_login_checkD j_get_securityE j_security_check” 相关考题
考题
Which additional configuration must be completed when setting up role restrictions using certificates? ()
A. Set up a certificate authentication server.B. Configure the authentication realm to remember certificate information.C. Configure the authentication realm to use a certificate server for authentication.D. Configure a role mapping rule requiring certification information to map user to role.
考题
Which two statements are correct about the aaa authentication login default grouptacacs+ localglobal configuration command? ()A、 this login authenticationmethod list is automaticallyapplied to all lines except those that have a named method list explicitly definedB、 If the user fails the TACACS+ authentication then the local database on the router will be used to authenticatethe userC、 if the tacacs+ server fails to respond then the local database on the router will be used to authenticate the user D、 "login" is the name of the method list being configuredE、 if the tacacs+ server is unavailable, authentication will succeed automaticallyby default
考题
If you want to use the Java EE platform’s built-in type of authentication that uses a custom HTML page for authentication. Which two statements are true?()A、Your deployment descriptor will need to contain this tag: CUSTOM.B、The related custom HTML login page must be named loginPage.html.C、When you use this type of authentication, SSL is turned on automatically.D、You must have a tag in your deployment descriptor that allows you to point to both a login HTML pageand an HTML page for handling any login errors.E、In the HTML related to authentication for this application, you must use predefined variable names fort he variables that store the user and password values.
考题
What is the objective of the aaa authentication login console-in local command?()A、It specifies the login authentication method list named console-in using the local user database on the routerB、It specifies the login authorization method list named console-in using the local RADIUS username-password data baseC、It specifies the login authentication list named console-in using the local username- password data base on the routerD、It specifies the login authorization method list named console-in using the local username- password data base on the router
考题
Which two are true about authentication?()A、Form-based logins should NOT be used with HTTPS.B、When using Basic Authentication the target server is NOT authenticated.C、J2EE compliant web containers are NOT required to support the HTTPS protocol.D、Web containers are required to support unauthenticated access to unprotected web resources.
考题
To implement the optional phase zero when using EAP-FAST for authentication, which of the following parameters must be set on the Cisco Secure ACS?()A、EAP-FAST master serverB、Allow automatic PAC provisioningC、client initial messageD、authority ID info
考题
In the wireless Advanced Feature Set using lightweight access points, a virtual interface is used when supporting which of the following features?()A、PSK authenticationB、EAP authenticationC、WPA authenticationD、Web authentication
考题
which one of the following types of actions can be used on unopened doc?()A、 form action B、 view action C、 hotspot action D、 db action
考题
norma has a form action that will allow users to create comments to the existing doc. When Norma views the form in her web browser, she sees the action. but when she opens the form in her notes client she cannot see the action . which one of the following should she do to correct the problom? ()A、delete old action and create a new one on the formB、Make sure the comments form is available for notes clients useC、Make the action a shared action and disable the hide-when setting for “web borwsers”D、Check the actions hide-when setting to make sure the action is available for “notes 4.6 later”
考题
In form-based authentication, what must be included in the HTML returned from the URL specified by the element?()A、 a base-64 encoded user name and passwordB、 a form that POSTs to the j_security_check URLC、 an applet that requests the user name and password from the userD、 a hidden field that supplies the login-constraint used by the application
考题
When using a form-based authentication, which action must be used in the login form?()A、 j_loginB、 j_get_userC、 j_login_checkD、 j_get_securityE、 j_security_check
考题
When using Form Based Authentication, which pair of fields must be used in the login form?() A、 j_user and j_idB、 j_id and j_passwordC、 j_users and j_passwordD、 j_user and j_passwordE、 j_login and j_passwordF、 j_username and j_password
考题
Which additional configuration must be completed when setting up role restrictions using certificates? ()A、Set up a certificate authentication server.B、Configure the authentication realm to remember certificate information.C、Configure the authentication realm to use a certificate server for authentication.D、Configure a role mapping rule requiring certification information to map user to role.
考题
You use—login-path to access a MySQL server on a Linux installation. Which statement is true about the – login-path option that is created by using mysql_config_editor?()A、All system users have access to the MySQL server via—login path localB、login-path can be used only for MySQL servers running on a local machineC、login-path allows you to provide login credentials without passing clear text passwords on the command lineD、When using – login-path to connect to a remote MySQL server, the remote server version must be 5.6 or later
考题
You work in a company which uses SQL Server 2008. You are the administrator of the company database. Now you are in charge of a SQL Server 2008 instance which uses mixed authentication mode. The instance runs on a computer which has Windows Server 2003 installed. You must make sure that the SQL Server 2008 authenticated logins follow the same password complexity rules that are enforced by Windows Server 2003. Besides this, you must make sure that the password complexity rules continue to be enforced. So what action should you perform to achieve this goal?() A、You should create an SQL Server Agent job. If a rule violation is detected, the job runs periodically to raise an alert B、You should modify all logins by using the ALTER LOGIN ... HASHED statement. C、You should modify all logins by using the ALTER LOGIN ... CHECK_POLICY = ON statement to. D、You should modify all logins by using the ALTER LOGIN ... CHECK_EXPIRATION = ON statement. E、You should create a policy by using Policy-Based Management. The policy prevents any violation of these rules
考题
单选题Which action is optional when adding an authentication realm for use on an Infranet Controller? ()A
Modify sign-in policy.B
Configure role mapping.C
Assign authentication server.D
Configure authentication policy.
考题
单选题What is the objective of the aaa authentication login console-in local command?()A
It specifies the login authentication method list named console-in using the local user database on the routerB
It specifies the login authorization method list named console-in using the local RADIUS username-password data baseC
It specifies the login authentication list named console-in using the local username- password data base on the routerD
It specifies the login authorization method list named console-in using the local username- password data base on the router
考题
单选题In the wireless advanced feature set using lightweight access points, a virtual interface is used when supporting which of the following features?()A
psk authenticationB
eap authenticationC
wpa authenticationD
web authentication
考题
单选题You use—login-path to access a MySQL server on a Linux installation. Which statement is true about the – login-path option that is created by using mysql_config_editor?()A
All system users have access to the MySQL server via—login path localB
login-path can be used only for MySQL servers running on a local machineC
login-path allows you to provide login credentials without passing clear text passwords on the command lineD
When using – login-path to connect to a remote MySQL server, the remote server version must be 5.6 or later
考题
单选题When using Form Based Authentication, which pair of fields must be used in the login form?()A
j_user and j_idB
j_id and j_passwordC
j_users and j_passwordD
j_user and j_passwordE
j_login and j_passwordF
j_username and j_password
考题
单选题In form-based authentication, what must be included in the HTML returned from the URL specified by the element?()A
a base-64 encoded user name and passwordB
a form that POSTs to the j_security_check URLC
an applet that requests the user name and password from the userD
a hidden field that supplies the login-constraint used by the application
考题
单选题To implement the optional phase zero when using eap-fast for authentication, which of the following parameters must be set on the cisco secure acs?()A
eap-fast master serverB
allow automatic pac provisioningC
client initial messageD
authority id info
考题
单选题Which additional configuration must be completed when setting up role restrictions using certificates? ()A
Set up a certificate authentication server.B
Configure the authentication realm to remember certificate information.C
Configure the authentication realm to use a certificate server for authentication.D
Configure a role mapping rule requiring certification information to map user to role.
考题
单选题which one of the following accurately describes field names?()A
they must be unique in a database B
they can only be used once in a view C
they can only used once on each form D
they can be used mulriple times on a form
考题
单选题which one of the following types of actions can be used on unopened doc?()A
form action B
view action C
hotspot action D
db action
考题
单选题Which method must be used to encode a URL passed as an argument to HttpServletResponse.sendRedirect when using URL rewriting for session tracking?()A
ServletResponse.encodeURLB
HttpServletResponse.encodeURLC
ServletResponse.encodeRedirectURLD
HttpServletResponse.encodeRedirectURL
考题
单选题When using a form-based authentication, which action must be used in the login form?()A
j_loginB
j_get_userC
j_login_checkD
j_get_securityE
j_security_check
考题
单选题norma has a form action that will allow users to create comments to the existing doc. When Norma views the form in her web browser, she sees the action. but when she opens the form in her notes client she cannot see the action . which one of the following should she do to correct the problom? ()A
delete old action and create a new one on the formB
Make sure the comments form is available for notes clients useC
Make the action a shared action and disable the hide-when setting for “web borwsers”D
Check the actions hide-when setting to make sure the action is available for “notes 4.6 later”
热门标签
最新试卷