网友您好, 请在下方输入框内输入要搜索的题目:

题目内容 (请给出正确答案)

Which basic authentication type is optional for a J2EE 1.4 compliant web container?()

  • A、HTTP Basic Authentication
  • B、Form Based Authentication
  • C、HTTP Digest Authentication
  • D、HTTPS Client Authentication

参考答案

更多 “Which basic authentication type is optional for a J2EE 1.4 compliant web container?()A、HTTP Basic AuthenticationB、Form Based AuthenticationC、HTTP Digest AuthenticationD、HTTPS Client Authentication” 相关考题
考题 A user wants to establish an HTTP session to a server behind an SRX device but is being pointed to Web page on the SRX device for additional authentication.Which type of user authentication is configured?()A. pass-through with Web redirectB. WebAuth with HTTP redirectC. WebAuthD. pass-through

考题 Which two methods of authentication are used by the Infranet Controller for IPSec enforcement?() A. dial-up VPNB. IKE authenticationC. XAuth authenticationD. shared IKE authentication

考题 You are an administrator of a network that uses PPP for CHAP authentication over ever WAN link. What command would you enter to display the CHAP authentication as it occurs in real time?() A. show ppp authenticationB. debug PAP authenticationC. debug PPP authenticationD. show interface serial0E. show CHAP authentication

考题 属于IEEE802.11的用户认证机制有:()。 A.Open authenticationB.Pre-Shared Key authenticationC.Shared Key authenticationD.MAC authentication

考题 A user wants to establish an HTTP session to a server behind an SRX device but is being pointed to Web page on the SRX device for additional authentication.Which type of user authentication is configured?()A、pass-through with Web redirectB、WebAuth with HTTP redirectC、WebAuthD、pass-through

考题 Which two are true about authentication?()A、Form-based logins should NOT be used with HTTPS.B、When using Basic Authentication the target server is NOT authenticated.C、J2EE compliant web containers are NOT required to support the HTTPS protocol.D、Web containers are required to support unauthenticated access to unprotected web resources.

考题 You develop a Windows Communication Foundation (WCF) service that uses basic authentication for client credentials. This service is currently configured to use message security. The service is hosted on a server in workgroup mode.Users report that their passwords are stolen when they use public computers.You need to ensure that messages are secure and users are authenticated.You prevent the service from being called over HTTP through Microsoft Internet Information Services (IIS) configuration. What should you do next?()A、Use the transport security mode and specify None for transport client credential type.B、Use the transportWithMessageCredential security mode and specify Basic for the transport client credential type.C、Use the message security mode and specify Basic for the transport client credential type.D、Use the transportWithMessageCredential security mode and specify None for the transport client credential type.

考题 属于IEEE802.11的用户认证机制有:()。A、Open authenticationB、Pre-Shared Key authenticationC、Shared Key authenticationD、MAC authentication

考题 You are an administrator of a network that uses PPP for CHAP authentication over ever WAN link. What command would you enter to display the CHAP authentication as it occurs in real time?()A、show ppp authenticationB、debug PAP authenticationC、debug PPP authenticationD、show interface serial0E、show CHAP authentication

考题 In the wireless Advanced Feature Set using lightweight access points, a virtual interface is used when supporting which of the following features?()A、PSK authenticationB、EAP authenticationC、WPA authenticationD、Web authentication

考题 If a certificate authority trustpoint is not configured when enabling HTTPS and the remote HTTPS server requires client authentication, connections to the secure HTTP client will fail. Which command must be enabled for correct operation?()A、ip http client secure-ciphersuite 3des-ede-cbc-shaB、ip https max-connections 10C、ip http timeout-policy idle 30 life 120 requests 100D、ip http client secure-trustpoint trustpoint-name

考题 Which two statements about the open and shared key wireless-authentication methods are true?()A、shared key authentication is considered more secure than open authenticationB、shared key authentication is considered less secure than open authenticationC、if the WEP keys do not match using the open authentication method, the client will not authenticate, associate, and transfer dataD、if the WEP keys do not match using the open authentication method, the client will still be able to authenticate and associate, but will not transfer dataE、if the WEP keys do not match using the open authentication method, the client will still be able to authenticate, associate, and transfer data

考题 Which command displays the CHAP authentication process as it occurs between two routers?()A、debug authenticationB、debug chap pppC、debug chap authenticationD、debug ppp authentication

考题 Which two authentication mechanisms provide weaker protection than other mechanisms?()A、 HTTP Basic AuthenticationB、 Form Based AuthenticationC、 HTTP Digest AuthenticationD、 HTTPS Client Authentication

考题 Which activity supports the data integrity requirements of an application?()A、Using HTTPS as a protocolB、Using an LDAP security realmC、Using HTTP Basic authenticationD、Using forms-based authentication

考题 Which mechanism requires the client to provide its public key certificate?()A、HTTP Basic AuthenticationB、Form Based AuthenticationC、HTTP Digest AuthenticationD、HTTPS Client Authentication

考题 Which two methods of authentication are used by the Infranet Controller for IPSec enforcement?()A、dial-up VPNB、IKE authenticationC、XAuth authenticationD、shared IKE authentication

考题 You need to recommend a strategy to ensure that the administration of AD LDS is encrypted.  What should you include in the recommendation?()A、a server authentication certificateB、client authentication certificatesC、Digest authenticationD、Windows Integrated authentication

考题 You need to implement an authentication method on SQL4. The TravelOnline database will be accessed through a Web services application. You need to make the authentication method as secure as possible.What should you do?()A、Create an HTTP endpoint with NTLM authentication, and create a service principal name (SPN).B、Create an HTTP endpoint with digest authentication, and create a service principal name (SPN).C、Create an HTTP endpoint with integrated authentication, and create a service principal name (SPN).D、Create an HTTP endpoint with Kerberos authentication.

考题 You need to recommend a security strategy for WebApp2 that meets the company’s applicaton  requirements.What should you include in the recommendation?()A、Basic authentication and connection security rulesB、Basic authentication and SSLC、Digest authentication and connection security rulesD、Digest authentication and SSL

考题 You manage a server that runs Windows Server 2008. The server has the Web Server (IIS) role installed. The server hosts an Internet-accessible Web site that has a virtual directory named /orders/. A Web server certificate is installed and an SSL listener has been configured for the Web site. The /orders/ virtual directory must meet the following company policy requirements: Be accessible to authenticated users only. Allow authentication types to support all browsers. Encrypt all authentication traffic by using HTTPS.  All other directories of the Web site must be accessible to anonymous users and be available withoutSSL.  You need to configure the /orders/ virtual directory to meet the company policy requirements.  Which two actions should you perform?()A、Configure the Web site to the Require SSL setting.B、Configure the /orders/ virtual directory to the Require SSL setting.C、Configure the Digest Authentication setting to Enabled for the /orders/ virtual directory.D、Configure the Basic Authentication setting to Enabled and the Anonymous Authentication setting to Disabled for the Web site.E、Configure the Basic Authentication setting to Enabled and the Anonymous Authentication setting to Disabled for the /orders/ virtual directory.

考题 多选题Which two are true about authentication?()AForm-based logins should NOT be used with HTTPS.BWhen using Basic Authentication the target server is NOT authenticated.CJ2EE compliant web containers are NOT required to support the HTTPS protocol.DWeb containers are required to support unauthenticated access to unprotected web resources.

考题 多选题Which two authentication mechanisms provide weaker protection than other mechanisms?()AHTTP Basic AuthenticationBForm Based AuthenticationCHTTP Digest AuthenticationDHTTPS Client Authentication

考题 单选题Which basic authentication type is optional for a J2EE 1.4 compliant web container?()A HTTP Basic AuthenticationB Form Based AuthenticationC HTTP Digest AuthenticationD HTTPS Client Authentication

考题 单选题Which mechanism requires the client to provide its public key certificate?()A HTTP Basic AuthenticationB Form Based AuthenticationC HTTP Digest AuthenticationD HTTPS Client Authentication

考题 单选题Which the basic authentication type is optional for a J2EE 1.4 compliant web container?()A  HTTP Basic AuthenticationB  Form Based AuthenticationC  HTTP Digest AuthenticationD  HTTPS Client Authentication

考题 单选题Which activity supports the data integrity requirements of an application?()A Using HTTPS as a protocolB Using an LDAP security realmC Using HTTP Basic authenticationD Using forms-based authentication