网友您好, 请在下方输入框内输入要搜索的题目:

题目内容 (请给出正确答案)
单选题
Which activity supports the data integrity requirements of an application?()
A

Using HTTPS as a protocol

B

Using an LDAP security realm

C

Using HTTP Basic authentication

D

Using forms-based authentication


参考答案

参考解析
解析: 暂无解析
更多 “单选题Which activity supports the data integrity requirements of an application?()A Using HTTPS as a protocolB Using an LDAP security realmC Using HTTP Basic authenticationD Using forms-based authentication” 相关考题
考题 In your database, the LDAP_DIRECTORY_SYSAUTH initialization parameter has been set to YES and the users who need to access the database as DBAs have been granted SYSDBA enterprise role in Oracle Internet Directory (OID). SSL and the password file have been configured. A user SCOTT with the SYSDBA privilege tries to connect to the database instance from a remote machine using the command:Which authentication method would be used first?()A. authentication by password fileB. authentication by using certificates over SSLC. authentication by using the Oracle Internet DirectoryD. authentication by using the local OS of the database server

考题 When implementing WLAN security, what are three benefits of using the Temporal Key Integrity Protocol (TKIP) instead of WEP? ()A、 TKIP uses an advanced encryption scheme based on AESB、 TKIP provides authentication and integrity checking using Cipher Block Chaining Message Authentication Code (CBC-MAC)C、 TKIP provides per-packet keyingand a rekeying mechanismD、 TKIP provides message integrity checkE、 TKIP reduces WEP’s vulnerabilities byusing different hardware encryption chipsetF、 TKIP uses a 48 bit InitializationVector

考题 Which two statements about the open and shared key wireless-authentication methods are true? ()A、 Shared key authentication is considered more secure than open authentication.B、 Shared key authentication is considered less secure than open authentication.C、 If the WEP keys do not match using the open authentication method, the client will not authenticate, associate, and transfer data.D、 If the WEP keys do not match using the open authentication method, the client will still be able to authenticate and associate, but will not transfer data.E、 If the WEP keys do not match using the open authentication method, the client will still be able to authenticate, associate, and transfer data.

考题 When you are designing a Web application, which options define how rich text displays in a browser?()A、"Using HTML"B、"Using Java Applet"C、"Using AJAX Control"D、"Using Best Fit for OS"

考题 Which of the following options would best help to reduce packet fragmentation for a TCP application transferring large amounts of data between servers across a path of multiple networks?()A、 Adjust Path MTU attributes, using the no command.B、 Adjust the status queue size on the adapters, using the chdev command.C、 Adjust ipforwarding to enabled, using the no command.D、 Adjust tcp_maxburst to enabled, using the no command.

考题 Company.com network consists of a single Active Directory domain named  Company.com.Company.com has an Exchange Server 2010 organization.The Company.com employees use Microsoft Office Outlook 2007 to connect to their mailboxes.RPC over HTTP and Auto discover are configured on Microsoft Office Outlook 2007. A new Company.com security policy requires that the employees connected to the domain does not need authentication when using Outlook Anywhere.However, those not connected t the domain needs to be authentication when using Outlook Anywhere.The employees need to comply with the new Company.com security policy.  What should you do?()A、You should consider using Basic authentication on Outlook Anywhere and set up only Basic authentication on the RPC virtual directory.B、You should consider using NTLM authentication on Outlook Anywhere and set up Basic authentication and NTLM authentication on the RPC virtual directory.C、You should consider using NTLM authentication on Outlook Anywhere and set up only Basic authentication on the RPC virtual directory.D、You should consider using Basic authentication on Outlook Anywhere and set up Basic authentication and NTLM authentication on the RPC virtual directory.

考题 What is the objective of the aaa authentication login console-in local command?()A、It specifies the login authentication method list named console-in using the local user database on the routerB、It specifies the login authorization method list named console-in using the local RADIUS username-password data baseC、It specifies the login authentication list named console-in using the local username- password data base on the routerD、It specifies the login authorization method list named console-in using the local username- password data base on the router

考题 Which two are true about authentication?()A、Form-based logins should NOT be used with HTTPS.B、When using Basic Authentication the target server is NOT authenticated.C、J2EE compliant web containers are NOT required to support the HTTPS protocol.D、Web containers are required to support unauthenticated access to unprotected web resources.

考题 In the wireless Advanced Feature Set using lightweight access points, a virtual interface is used when supporting which of the following features?()A、PSK authenticationB、EAP authenticationC、WPA authenticationD、Web authentication

考题 When determining a customer’s security requirements using the security site survey from the steps for success methodology, which three of theses should be included in the customer’s security policy and procedures?()A、Third-party due diligence policy reviewB、Remote Access PolicyC、Encryption PolicyD、Application change control policyE、Security Personnel policy

考题 Which two authentication mechanisms provide weaker protection than other mechanisms?()A、 HTTP Basic AuthenticationB、 Form Based AuthenticationC、 HTTP Digest AuthenticationD、 HTTPS Client Authentication

考题 Which activity supports the data integrity requirements of an application?()A、Using HTTPS as a protocolB、Using an LDAP security realmC、Using HTTP Basic authenticationD、Using forms-based authentication

考题 Which basic authentication type is optional for a J2EE 1.4 compliant web container?()A、HTTP Basic AuthenticationB、Form Based AuthenticationC、HTTP Digest AuthenticationD、HTTPS Client Authentication

考题 Which mechanism requires the client to provide its public key certificate?()A、HTTP Basic AuthenticationB、Form Based AuthenticationC、HTTP Digest AuthenticationD、HTTPS Client Authentication

考题 Which statement is true when logging in using the WebUI? ()A、Port 80 for HTTP is enabled by default.B、Port 443 for HTTPS is enabled by default.C、Port 8090 for HTTP is enabled by default.D、Both HTTP and HTTPS are enabled using their standard port values.

考题 In your database,the LDAP_DIRECTORY_SYSAUTH initialization parameter has been set to YES and the users who need to access the database as DBAs have been granted SYSDBA enterprise role in Oracle Internet Directory (OID). SSL and the password file have been configured. A user SCOTT with the SYSDBA privilege tries to connect to the database instance from a remote machine using the command:$ SQLPLUS scott/tiger@DB01 AS SYSDBA   where DB01 is the net service name.   Which authentication method would be used first?()  A、 authentication by password fileB、 authentication by using certificates over SSLC、 authentication by using the Oracle Internet DirectoryD、 authentication by using the local OS of the database server

考题 You are the network administrator for your company. The network consists of a single Active Directory domain. All servers run Windows Server 2003. The network contains a Web server that runs IIS 6.0 and hosts a secure intranet site. All users are required to connect to the intranet site by authenticating and using HTTPS. However, because an automated Web application must connect to the Web site by using HTTP, you cannot configure the intranet site to require HTTPS.  You need to collect information about which users are connecting to the Web site by using HTTPS.   What should you do?()A、Check the application log on the Web server.B、Use Network Monitor to capture network traffic on the Web server.C、Review the log files created by IIS on the Web server.D、Configure a performance log to capture all Web service counters. Review the performance log data.

考题 多选题Which two are true about authentication?()AForm-based logins should NOT be used with HTTPS.BWhen using Basic Authentication the target server is NOT authenticated.CJ2EE compliant web containers are NOT required to support the HTTPS protocol.DWeb containers are required to support unauthenticated access to unprotected web resources.

考题 单选题WebSphere Application Server supports performance data collection using the Performance Monitoring Infrastructure (PMI).  Which tool supports PMI and would be best to analyze the WebSphere Commerce runtime EJB, JVM and thread pool stats?()A WebSphere Commerce AnalyzerB Tivoli Performance Viewer.C Tivoli Web Site Analyzer.D DB2 Intelligent Miner for Data.

考题 单选题In your database,the LDAP_DIRECTORY_SYSAUTH initialization parameter has been set to YES and the users who need to access the database as DBAs have been granted SYSDBA enterprise role in Oracle Internet Directory (OID). SSL and the password file have been configured. A user SCOTT with the SYSDBA privilege tries to connect to the database instance from a remote machine using the command:$ SQLPLUS scott/tiger@DB01 AS SYSDBA   where DB01 is the net service name.   Which authentication method would be used first?()A  authentication by password fileB  authentication by using certificates over SSLC  authentication by using the Oracle Internet DirectoryD  authentication by using the local OS of the database server

考题 单选题What is the objective of the aaa authentication login console-in local command?()A It specifies the login authentication method list named console-in using the local user database on the routerB It specifies the login authorization method list named console-in using the local RADIUS username-password data baseC It specifies the login authentication list named console-in using the local username- password data base on the routerD It specifies the login authorization method list named console-in using the local username- password data base on the router

考题 单选题You are the network administrator for The network consists of a single Active Directory domain named All servers run Windows Server 2003. The network contains a Web server that runs IIS 6.0 and hosts a secure intranet site. All users are required to connect to the intranet site by authenticating and using HTTPS. However, because an automated Web application must connect to the Web site by using HTTP, you cannot configure the intranet site to require HTTPS. You need to collect information about which users are connecting to the Web site by using HTTPS. What should you do?()A Check the application log on the Web server.B Use Network Monitor to capture network traffic on the Web server.C Review the log files created by IIS on the Web server.D Configure a performance log to capture all Web service counters. Review the performance log data.

考题 单选题Which of the following options would best help to reduce packet fragmentation for a TCP application transferring large amounts of data between servers across a path of multiple networks?()A  Adjust Path MTU attributes, using the no command.B  Adjust the status queue size on the adapters, using the chdev command.C  Adjust ipforwarding to enabled, using the no command.D  Adjust tcp_maxburst to enabled, using the no command.

考题 多选题Which two statements about the open and shared key wireless-authentication methods are true? ()AShared key authentication is considered more secure than open authentication.BShared key authentication is considered less secure than open authentication.CIf the WEP keys do not match using the open authentication method, the client will not authenticate, associate, and transfer data.DIf the WEP keys do not match using the open authentication method, the client will still be able to authenticate and associate, but will not transfer data.EIf the WEP keys do not match using the open authentication method, the client will still be able to authenticate, associate, and transfer data.

考题 单选题Which statement is true when logging in using the WebUI? ()A Port 80 for HTTP is enabled by default.B Port 443 for HTTPS is enabled by default.C Port 8090 for HTTP is enabled by default.D Both HTTP and HTTPS are enabled using their standard port values.

考题 单选题Which the basic authentication type is optional for a J2EE 1.4 compliant web container?()A  HTTP Basic AuthenticationB  Form Based AuthenticationC  HTTP Digest AuthenticationD  HTTPS Client Authentication

考题 单选题Which activity supports the data integrity requirements of an application?()A Using HTTPS as a protocolB Using an LDAP security realmC Using HTTP Basic authenticationD Using forms-based authentication

考题 单选题Company.com network consists of a single Active Directory domain named  Company.com.Company.com has an Exchange Server 2010 organization.The Company.com employees use Microsoft Office Outlook 2007 to connect to their mailboxes.RPC over HTTP and Auto discover are configured on Microsoft Office Outlook 2007. A new Company.com security policy requires that the employees connected to the domain does not need authentication when using Outlook Anywhere.However, those not connected t the domain needs to be authentication when using Outlook Anywhere.The employees need to comply with the new Company.com security policy.  What should you do?()A You should consider using Basic authentication on Outlook Anywhere and set up only Basic authentication on the RPC virtual directory.B You should consider using NTLM authentication on Outlook Anywhere and set up Basic authentication and NTLM authentication on the RPC virtual directory.C You should consider using NTLM authentication on Outlook Anywhere and set up only Basic authentication on the RPC virtual directory.D You should consider using Basic authentication on Outlook Anywhere and set up Basic authentication and NTLM authentication on the RPC virtual directory.