网友您好, 请在下方输入框内输入要搜索的题目:
题目内容
(请给出正确答案)
单选题
Which security mechanism can be directed through the element in a web deployment descriptor()?
A
authorization
B
data integrity
C
confidentiality
D
authentication
参考答案
参考解析
解析:
暂无解析
更多 “单选题Which security mechanism can be directed through the element in a web deployment descriptor()?A authorizationB data integrityC confidentialityD authentication” 相关考题
考题
Which statement describes a security zone?()
A. A security zone can contain one or more interfaces.B. A security zone can contain interfaces in multiple routing instances.C. A security zone must contain two or more interfaces.D. A security zone must contain bridge groups.
考题
Which of the following security threats are MOST likely prevented through user training?()
A. Network IntrusionB. Adware PopupsC. Social EngineeringD. Spam Messages
考题
assuming the default switch configuration which vlan range can be added modified and removed on a cisco switch?()
A.2 through 1001B.1 through 1001C.1 through 1002D.2 through 1005
考题
Which of the following is NOT true of security attacks?[A] Employees will keep up with security polices and awareness if they are highly-trained.[B] The rate of security attacks appears faster than the growth of the Internet.[C] One's computer system will never be secure.[D] Vulnerabilities can go through phones, wireless devices, and network appliances
考题
Which Cisco security tool can best determine it a Cisco ISR router is properly secured? ()A、 Cisco SDM Security AuditB、 Cisco Security MARSC、 Cisco Security Agent MCD、 Cisco Security IntelliShieldE、 CAN
考题
Which two statements about the Wired Equivalent Privacy (WEP) encryption mechanism are true? ()A、the two methods of authentication using the WEP encryption are open and shared keyB、the 802.11 standard defines WEP security using 128-bit keysC、WEP can provide stronger authentication through the use of LEAP, PEAP, or EAP-FASTD、WEP is a scalable encryption solution that uses static keys for authenticationE、WEP security provides only one-way authenticationF、WEPv2 offers improved encryption by replacing the RC4 encryption mechanism with the AES (symmetric block cipher) mechanism
考题
Which security mechanism is employed only on the server-side to limit access to resources or components?()A、 authorizationB、 data integrityC、 confidentialityD、 authentication
考题
assuming the default switch configuration which vlan range can be added modified and removed on a cisco switch?()A、2 through 1001B、1 through 1001C、1 through 1002D、2 through 1005
考题
Which two protocols can have their headers compressed through MQC?()A、RTPB、RTSPC、HTTPD、TCPE、UDP
考题
Which QoS mechanism can help classify different kinds of Citrix traffic print job versus real-time terminalcontrol?()A、qos-groupB、DSCPC、LFID、NBAR
考题
assuming the default switch configuration which vlan range can be added modified and removed on a ciscoswitch?()A、2 through 1001B、1 through 1001C、1 through 1002D、2 through 1005
考题
Which of the following printer failure symptoms can be described as a condition where the internal feed mechanism has stopped working temporarily?()A、Power cycleB、Paper jamC、No connectivityD、Corrupt printer driver
考题
Which of the following security threats are MOST likely prevented through user training?()A、Network IntrusionB、Adware PopupsC、Social EngineeringD、Spam Messages
考题
Which of the following is a storage system that can be connected to multiple servers through an iSCSI connection?()A、JBODB、DASC、NASD、SAN
考题
Which security mechanism can be directed through the element in a web deployment descriptor()?A、 authorizationB、 data integrityC、 confidentialityD、 authentication
考题
Which two security mechanisms can be directed through a sub-element of the element in a web application deployment descriptor?()A、AuthorizationB、Data integrityC、ConfidentialityD、Authentication
考题
Regarding zone types, which statement is true?()A、You cannot assign an interface to a functional zone.B、You can specifiy a functional zone in a security policy.C、Security zones must have a scheduler applied.D、You can use a security zone for traffic destined for the device itself.
考题
单选题Which the security mechanism uses the concept of a realm?()A
authorizationB
data integrityC
confidentialityD
authentication
考题
单选题Which statement describes a security zone?()A
A security zone can contain one or more interfaces.B
A security zone can contain interfaces in multiple routing instances.C
A security zone must contain two or more interfaces.D
A security zone must contain bridge groups.
考题
多选题The Cisco ASA Security Appliance can offer benefit of integrating which three security services into one device?()AIPSBVPN ConcentratorCACS serverDPIX firewallECSA MCFDDoS Anomaly Guard and Detector
考题
单选题Which statement about firefighting foam is TRUE?()A
Foam conducts electricityB
To be most effective,foam should be directed at the base of the fireC
Foam is most effective on burning liquids which are flowingD
Foam can ONLY be used to extinguish class A fires
考题
单选题Which security mechanism is employed only on the server-side to limit access to resources or components?()A
authorizationB
data integrityC
confidentialityD
authentication
考题
单选题Which security mechanism uses the concept of a realm?()A
AuthorizationB
Data integrityC
ConfidentialityD
Authentication
考题
多选题Which two protocols can have their headers compressed through MQC?()ARTPBRTSPCHTTPDTCPEUDP
考题
多选题Which two network attack statements are true?()AAccess attacks can consist of password attacks,trust exploitation,port redirection,and man-in-the-middle attacks.BAccess attacks can consist of UDP and TCP SYN flooding,ICMP echo-request floods,and ICMP directed broadcasts.CDoS attacks can be reduced through the use of access control configuration,encryption,and RFC 2827 filtering.DDoS attacks can consist of IP spoofing and DDoS attacks.EIP spoofing can be reduced through the use of policy-based routing.FIP spoofing exploits known vulnerabilities in authentication services, FTP services,and web services to gain entry to web accounts,confidential databases,and other sensitive information.
考题
多选题Which two commands can be used to monitor firewall user authentication?()Ashow access firewall-authenticationBshow security firewall-authentication usersCshow security audit logDshow security firewall-authentication history
考题
单选题Which Cisco security tool can best determine it a Cisco ISR router is properly secured? ()A
Cisco SDM Security AuditB
Cisco Security MARSC
Cisco Security Agent MCD
Cisco Security IntelliShieldE
CAN
热门标签
最新试卷