网友您好, 请在下方输入框内输入要搜索的题目:

题目内容 (请给出正确答案)
单选题
When a client using the SERVER_ENCRYPT authentication type connects to a server using the SERVER authentication type, what happens?()
A

An error will occur.

B

Data passed between the client and the server is encrypted.

C

User IDs and passwords are passed to the server unencrypted.

D

User IDs and passwords are encrypted before they are passed to the server.


参考答案

参考解析
解析: 暂无解析
更多 “单选题When a client using the SERVER_ENCRYPT authentication type connects to a server using the SERVER authentication type, what happens?()A An error will occur.B Data passed between the client and the server is encrypted.C User IDs and passwords are passed to the server unencrypted.D User IDs and passwords are encrypted before they are passed to the server.” 相关考题
考题 You develop a Windows Communication Foundation (WCF) service that uses basic authentication for client credentials. This service is currently configured to use message security. The service is hosted on a server in workgroup mode.Users report that their passwords are stolen when they use public computers.You need to ensure that messages are secure and users are authenticated.You prevent the service from being called over HTTP through Microsoft Internet Information Services (IIS) configuration.What should you do next?()A. Use the transport security mode and specify None for transport client credential type.B. Use the transportWithMessageCredential security mode and specify Basic for the transport client credential type.C. Use the message security mode and specify Basic for the transport client credential type.D. Use the transportWithMessageCredential security mode and specify None for the transport client credential type.

考题 Which three statements about the Cisco Easy VPN feature are true?()A、If the VPN server is configured for Xauth, the VPN client waits for a username / password challenge.B、The Cisco Easy VPN feature only supports transform sets that provide authentication and encryption.C、The VPN client initiates aggressive mode (AM) if a pre-shared key is used for authentication during the IKE phase 1 process.D、The VPN client verifies a server username/password challenge by using a AAA authentication server that supports TACACS+ or RADIUS.E、The VPN server can only be enabled on Cisco PIX Firewalls and Cisco VPN 3000 series concentrators.F、When connecting with a VPN client,the VPN server must be configured for ISAKMP group 1,2 or 5.

考题 Clients using cisco-leap and eap-fast authentication are having no problems logging on to The wireless network, but clients using peap are failing to log on. Which situation would result in this type of problem?()A、posture validation has not been enabled.B、the aaa server is set to accept both ms-chap v2 and gtc for peap authentication.C、clients and server are not using certificates.D、clients have been set to validate the server identity.

考题 Which two statements about the open and shared key wireless-authentication methods are true? ()A、 Shared key authentication is considered more secure than open authentication.B、 Shared key authentication is considered less secure than open authentication.C、 If the WEP keys do not match using the open authentication method, the client will not authenticate, associate, and transfer data.D、 If the WEP keys do not match using the open authentication method, the client will still be able to authenticate and associate, but will not transfer data.E、 If the WEP keys do not match using the open authentication method, the client will still be able to authenticate, associate, and transfer data.

考题 In a Junos Pulse Access Control Service active/active clustered environment, which statement is true about VIPs?()A、VIP is not required when using only agentless access for all endpoint platforms.B、VIP is not required when using Junos Pulse or Odyssey Access Client for all endpoint platforms.C、VIP is not required when using Junos Pulse and agentless access for all endpoint platforms.D、VIP is not required when using Odyssey Access Client and agentless access for all endpoint platforms.

考题 When a client using the SERVER_ENCRYPT authentication type connects to a server using the SERVER authentication type, what happens?()A、An error will occur.B、Data passed between the client and the server is encrypted.C、User IDs and passwords are passed to the server unencrypted.D、User IDs and passwords are encrypted before they are passed to the server.

考题 Which the basic authentication type is optional for a J2EE 1.4 compliant web container?()A、 HTTP Basic AuthenticationB、 Form Based AuthenticationC、 HTTP Digest AuthenticationD、 HTTPS Client Authentication

考题 Company.com network consists of a single Active Directory domain named  Company.com.Company.com has an Exchange Server 2010 organization.The Company.com employees use Microsoft Office Outlook 2007 to connect to their mailboxes.RPC over HTTP and Auto discover are configured on Microsoft Office Outlook 2007. A new Company.com security policy requires that the employees connected to the domain does not need authentication when using Outlook Anywhere.However, those not connected t the domain needs to be authentication when using Outlook Anywhere.The employees need to comply with the new Company.com security policy.  What should you do?()A、You should consider using Basic authentication on Outlook Anywhere and set up only Basic authentication on the RPC virtual directory.B、You should consider using NTLM authentication on Outlook Anywhere and set up Basic authentication and NTLM authentication on the RPC virtual directory.C、You should consider using NTLM authentication on Outlook Anywhere and set up only Basic authentication on the RPC virtual directory.D、You should consider using Basic authentication on Outlook Anywhere and set up Basic authentication and NTLM authentication on the RPC virtual directory.

考题 You develop a Windows Communication Foundation (WCF) service that uses basic authentication for client credentials. This service is currently configured to use message security. The service is hosted on a server in workgroup mode.Users report that their passwords are stolen when they use public computers.You need to ensure that messages are secure and users are authenticated.You prevent the service from being called over HTTP through Microsoft Internet Information Services (IIS) configuration. What should you do next?()A、Use the transport security mode and specify None for transport client credential type.B、Use the transportWithMessageCredential security mode and specify Basic for the transport client credential type.C、Use the message security mode and specify Basic for the transport client credential type.D、Use the transportWithMessageCredential security mode and specify None for the transport client credential type.

考题 To implement the optional phase zero when using EAP-FAST for authentication, which of the following parameters must be set on the Cisco Secure ACS?()A、EAP-FAST master serverB、Allow automatic PAC provisioningC、client initial messageD、authority ID info

考题 Which of the following commands configures the cisco 3845 integrated services router to allow eap-fast authentication using wds?()A、router (config)# wlccp authentication-server infrastructure eap group_1B、router (config)# wlccp authentication-server infrastructure eap-fast group_1C、router (config)# wlccp authentication-server client eap-fast group_1D、router (config)# wlccp authentication-server client eap group_1

考题 Which two statements about the open and shared key wireless-authentication methods are true?()A、shared key authentication is considered more secure than open authenticationB、shared key authentication is considered less secure than open authenticationC、if the WEP keys do not match using the open authentication method, the client will not authenticate, associate, and transfer dataD、if the WEP keys do not match using the open authentication method, the client will still be able to authenticate and associate, but will not transfer dataE、if the WEP keys do not match using the open authentication method, the client will still be able to authenticate, associate, and transfer data

考题 On a standalone access point, client association using EAP-Cisco Wireless (Cisco-LEAP) isfailing, but association using EAP-PEAP is functioning. What needs to be enabled on the standalone accesspoint to correct this issue?()A、network EAPB、open authentication plus MACC、open authentication plus EAPD、a shared key

考题 Which additional configuration must be completed when setting up role restrictions using certificates? ()A、Set up a certificate authentication server.B、Configure the authentication realm to remember certificate information.C、Configure the authentication realm to use a certificate server for authentication.D、Configure a role mapping rule requiring certification information to map user to role.

考题 Your network contains two Active Directory sites named Site1 and Site2. Only Site1 can be accessed from the Internet. You have an Exchange Server 2010 organization.  You deploy a Client Access server in Site1 and enable Windows Integrated Authentication for OutlookWeb App (OWA).  In Site2, you deploy a Mailbox server and a Client Access server.  You need to configure the Exchange organization to meet the following requirements: .Allow users to access their mailboxes from the Internet by using OWA  .Prevent authentication prompts from displaying when users connect to OWA by using domain- joinedcomputers that are connected to the internal network  What should you do?()A、Modify the Exchange virtual directory on the Client Access server in Site1.B、Modify the Exchange virtual directory on the Client Access server in Site2.C、Modify the OWA virtual directory on the Client Access server in Site1.D、Modify the OWA virtual directory on the Client Access server in Site2.

考题 Your network contains two Active Directory sites named Site1 and Site2. Only Site1 can be accessed from the Internet. You have an Exchange Server 2010 organization.  You deploy a Client Access server in Site1 and enable Windows Integrated Authentication for OutlookWeb App (OWA).  In Site2, you deploy a Mailbox server and a Client Access server.  You need to configure the Exchange organization to meet the following requirements: .Allow users to access their mailboxes from the Internet by using OWA  .Prevent authentication prompts from displaying when users connect to OWA by using domain- joined computers that are connected to the internal network  What should you do?()A、Modify the Exchange virtual directory on the Client Access server in Site1.B、Modify the Exchange virtual directory on the Client Access server in Site2.C、Modify the OWA virtual directory on the Client Access server in Site1.D、Modify the OWA virtual directory on the Client Access server in Site2.

考题 单选题When a client using the SERVER_ENCRYPT authentication type connects to a server using the SERVER authentication type, what happens?()A An error will occur.B Data passed between the client and the server is encrypted.C User IDs and passwords are passed to the server unencrypted.D User IDs and passwords are encrypted before they are passed to the server.

考题 单选题Company.com network consists of a single Active Directory domain named  Company.com.Company.com has an Exchange Server 2010 organization.The Company.com employees use Microsoft Office Outlook 2007 to connect to their mailboxes.RPC over HTTP and Auto discover are configured on Microsoft Office Outlook 2007. A new Company.com security policy requires that the employees connected to the domain does not need authentication when using Outlook Anywhere.However, those not connected t the domain needs to be authentication when using Outlook Anywhere.The employees need to comply with the new Company.com security policy.  What should you do?()A You should consider using Basic authentication on Outlook Anywhere and set up only Basic authentication on the RPC virtual directory.B You should consider using NTLM authentication on Outlook Anywhere and set up Basic authentication and NTLM authentication on the RPC virtual directory.C You should consider using NTLM authentication on Outlook Anywhere and set up only Basic authentication on the RPC virtual directory.D You should consider using Basic authentication on Outlook Anywhere and set up Basic authentication and NTLM authentication on the RPC virtual directory.

考题 单选题Clients using Cisco-LEAP and EAP-FAST authentication are having no problems logging on to the wirelessnetwork, but clients using PEAP are failing to log on. Which situation would result in this type of problem?()A The AAA server is set to accept both MS-CHAP v2 and GTC for PEAP authentication.B Clients have been set to validate the server identity.C Posture validation has not been enabled.D Clients and server are not using certificates.

考题 单选题Your network contains two Active Directory sites named Site1 and Site2. Only Site1 can be accessed from the Internet. You have an Exchange Server 2010 organization.  You deploy a Client Access server in Site1 and enable Windows Integrated Authentication for OutlookWeb App (OWA).  In Site2, you deploy a Mailbox server and a Client Access server.  You need to configure the Exchange organization to meet the following requirements:.Allow users to access their mailboxes from the Internet by using OWA  .Prevent authentication prompts from displaying when users connect to OWA by using domain- joinedcomputers that are connected to the internal network  What should you do?()A Modify the Exchange virtual directory on the Client Access server in Site1.B Modify the Exchange virtual directory on the Client Access server in Site2.C Modify the OWA virtual directory on the Client Access server in Site1.D Modify the OWA virtual directory on the Client Access server in Site2.

考题 单选题pany has implemented 802.1X authentication as a security enhancement.  Which statement is  true about 802.1x port-based authentication?()A  TACACS+ is the only supported authentication server type.B  If a host initiates the authentication process and does not receive a response, it assumes it is  not authorized.C  RADIUS is the only supported authentication server type.D  Before transmitting data, an 802.1x host must determine the authorization state of the switch.E  Hosts are required to havea 802.1x authentication client or utilize PPPoE.F  None of the other alternatives apply.

考题 单选题On a standalone access point, client association using EAP-Cisco Wireless (Cisco-LEAP) is failing, butassociation using EAP-PEAP is functioning. What needs to be enabled on the standalone access point tocorrect this issue?()A a shared keyB network EAPC open authentication plus EAPD open authentication plus MAC

考题 单选题You develop a Windows Communication Foundation (WCF) service that uses basic authentication for client credentials. This service is currently configured to use message security. The service is hosted on a server in workgroup mode.Users report that their passwords are stolen when they use public computers.You need to ensure that messages are secure and users are authenticated.You prevent the service from being called over HTTP through Microsoft Internet Information Services (IIS) configuration. What should you do next?()A Use the transport security mode and specify None for transport client credential type.B Use the transportWithMessageCredential security mode and specify Basic for the transport client credential type.C Use the message security mode and specify Basic for the transport client credential type.D Use the transportWithMessageCredential security mode and specify None for the transport client credential type.

考题 单选题Which of the following commands configures the cisco 3845 integrated services router to allow eap-fast authentication using wds?()A router (config)# wlccp authentication-server infrastructure eap group_1B router (config)# wlccp authentication-server infrastructure eap-fast group_1C router (config)# wlccp authentication-server client eap-fast group_1D router (config)# wlccp authentication-server client eap group_1

考题 多选题Which two statements about the open and shared key wireless-authentication methods are true? ()AShared key authentication is considered more secure than open authentication.BShared key authentication is considered less secure than open authentication.CIf the WEP keys do not match using the open authentication method, the client will not authenticate, associate, and transfer data.DIf the WEP keys do not match using the open authentication method, the client will still be able to authenticate and associate, but will not transfer data.EIf the WEP keys do not match using the open authentication method, the client will still be able to authenticate, associate, and transfer data.

考题 单选题In a Junos Pulse Access Control Service active/active clustered environment, which statement is true about VIPs?()A VIP is not required when using only agentless access for all endpoint platforms.B VIP is not required when using Junos Pulse or Odyssey Access Client for all endpoint platforms.C VIP is not required when using Junos Pulse and agentless access for all endpoint platforms.D VIP is not required when using Odyssey Access Client and agentless access for all endpoint platforms.

考题 单选题Your network contains two Active Directory sites named Site1 and Site2. Only Site1 can be accessed from the Internet. You have an Exchange Server 2010 organization.  You deploy a Client Access server in Site1 and enable Windows Integrated Authentication for OutlookWeb App (OWA).  In Site2, you deploy a Mailbox server and a Client Access server.  You need to configure the Exchange organization to meet the following requirements: .Allow users to access their mailboxes from the Internet by using OWA  .Prevent authentication prompts from displaying when users connect to OWA by using domain- joined computers that are connected to the internal network  What should you do?()A Modify the Exchange virtual directory on the Client Access server in Site1.B Modify the Exchange virtual directory on the Client Access server in Site2.C Modify the OWA virtual directory on the Client Access server in Site1.D Modify the OWA virtual directory on the Client Access server in Site2.

考题 单选题Which the basic authentication type is optional for a J2EE 1.4 compliant web container?()A  HTTP Basic AuthenticationB  Form Based AuthenticationC  HTTP Digest AuthenticationD  HTTPS Client Authentication