网友您好, 请在下方输入框内输入要搜索的题目:
题目内容
(请给出正确答案)
Which the basic authentication type is optional for a J2EE 1.4 compliant web container?()
- A、 HTTP Basic Authentication
- B、 Form Based Authentication
- C、 HTTP Digest Authentication
- D、 HTTPS Client Authentication
参考答案
更多 “Which the basic authentication type is optional for a J2EE 1.4 compliant web container?()A、 HTTP Basic AuthenticationB、 Form Based AuthenticationC、 HTTP Digest AuthenticationD、 HTTPS Client Authentication” 相关考题
考题
Which element is NOT part of a microkemel?A.basic I/OB.a file systemC.IPC mechanismsD.memory management
考题
A ___is the basic form. of a word which cannot be further analyzed without total loss of identity.
考题
Whenaddingaelementtoawebapplicationdeploymentdescriptor,theinclusionofwhichsub-elementrequiresthedefinitionofanerrorpage()?
A.realm-nameB.auth-metodC.auth-constraintD.form-login-configE.user-data-constaint
考题
You notice that during peak hours, some firewall enforcers contain a high number of auth table entries. As you investigate the issue, you discover that all users are getting auth table mappings to all firewalls, which is not acceptable.What should you do on the Junos Pulse Access Control Service to resolve this problem?()A. Delete the default auth table mapping policyB. Create auth table mapping policies that route users to specific resourcesC. Create Resource Access policies that permit access to specific resourcesD. Create Source Interface policies that route users to specific resources
考题
You have created a Host Checker policy that contains multiple rules. You want to inform end users which rule specifically has failed.In the admin GUI, which configuration setting would you enable?()
A. Enable Custom InstructionsB. Pre-auth notificationC. Remediation messageD. Send reason strings
考题
Which of the following devices is used to connect a WAN to a LAN?()
A.Basic routerB.Basic switchC.BridgeD.Repeater
考题
Which element of a web application deployment descriptor element is required()?A、 realm-name B、 auth-method C、 security-role D、 transport-guarantee E、 web-resource-collection
考题
You need to determine the correct wireless LAN topology for use in the Company network. Which three statements are true about the various WLAN topologies?()A、 In ad hoc mode, the Independent Basic Service Set (IBSS) is a framework in which mobile clients connect directly without an intermediate access point.B、 In Infrastructure mode, the Basic Service Set (BSS) is a framework in which mobile clients use a single access point for connecting to each other or to wired network resources.C、 In Infrastructure mode, the Extended Services Set (ESS) is a framework in which two or more Basic Service Sets are connected by a common distribution system (DS).D、 In Infrastructure mode, the Independent Basic Service Setet (IBSS) is a framework in which mobile clients connect directly without an intermediate access point.E、 In ad hoc mode, the Basic Service Set (BSS) is a framework in which mobile clients use a single AP for connecting to each other or to wired network resources.F、 In ad hoc mode, the Extended Services Set (ESS) is a framework in which two or more Basic Service Sets are connected by a common distribution system (DS)
考题
Which of the following devices is used to connect a WAN to a LAN?()A、Basic routerB、Basic switchC、BridgeD、Repeater
考题
Given the two security constraints in a deployment descriptor: 101. 102. 103.SALES 104.SALES 105. 106. 107. 108. 109. 110. If the two security constraints have the same url-pattern and http-method which two inserted independentlyat line 109,will allow users with role names of either SALES or MARKETING to access this resource?()A、auth-constraint/B、auth-constraintrole-name*/role-name/auth-constraintC、auth-constraintrole-nameANY/role-name/auth-constraintD、auth-constraintrole-nameMARKETING/role-name/auth-constraint
考题
When adding a element to a web application deployment descriptor, the inclusion of which sub-element requires the definition of an error page()?A、 realm-name B、 auth-metod C、 auth-constraint D、 form-login-config E、 user-data-constaint
考题
Which parameter do you use to enable Junos Pulse Access Control Service enforcement on a policy on a ScreenOS platform?()A、uac-policyB、ic-policyC、inyranet-authD、uac-auth
考题
You navigate to "UAC" "Infranet Enforcer" "Auth Table Mapping" in the admin GUI. You see one policy, which is the unmodified, original default policy.Which statement is true?()A、Dynamic auth table mapping is not enabled.B、A successful authentication attempt will result in a new authentication table entry, which will be delivered only to the Junos enforcer protecting the network from which the user has authenticated.C、To create a static auth table mapping, you must delete the default policy.D、The default policy applies only to the factory-default role User.
考题
如果/etc/syslog.conf中,包含以下设置:“auth.warning/var/adm/auth.log”,则以下说法正确的是:()。A、/var/adm/auth.log将仅仅记录auth的warning级别的日志B、/var/adm/auth.log将记录auth的emerg、alert、crit、err、warning级别的日志C、/var/adm/auth.log将记录auth的warning、notice、info、debug级别的日志D、/var/adm/auth.log将记录auth的所有级别的日志
考题
单选题With time going on, _____.A
a luxury may change into a need which most people want to getB
the basic needs are getting smaller and smallerC
a luxury and the basic needs can be exchangedD
the basic needs can be changed into a luxury
考题
单选题You have created a Host Checker policy that contains multiple rules. You want to inform end users which rule specifically has failed.In the admin GUI, which configuration setting would you enable?()A
Enable Custom InstructionsB
Pre-auth notificationC
Remediation messageD
Send reason strings
考题
单选题如果/etc/syslog.conf中,包含以下设置:“auth.warning/var/adm/auth.log”,则以下说法正确的是:()。A
/var/adm/auth.log将仅仅记录auth的warning级别的日志B
/var/adm/auth.log将记录auth的emerg、alert、crit、err、warning级别的日志C
/var/adm/auth.log将记录auth的warning、notice、info、debug级别的日志D
/var/adm/auth.log将记录auth的所有级别的日志
考题
单选题Which Cisco IOS command globally enables port-based authentication on a switch? ()A
aaa port-auth enableB
radius port-control enableC
dot1x system-auth-controlD
switchport aaa-control enable
考题
多选题Given the two security constraints in a deployment descriptor: 101. 102. 103.SALES 104.SALES 105. 106. 107. 108. 109. 110. If the two security constraints have the same url-pattern and http-method which two inserted independentlyat line 109,will allow users with role names of either SALES or MARKETING to access this resource?()Aauth-constraint/Bauth-constraintrole-name*/role-name/auth-constraintCauth-constraintrole-nameANY/role-name/auth-constraintDauth-constraintrole-nameMARKETING/role-name/auth-constraint
考题
单选题When adding a element to a web application deployment descriptor, the inclusion of which sub-element requires the definition of an error page()?A
realm-name B
auth-metod C
auth-constraint D
form-login-config E
user-data-constaint
考题
多选题You need to determine the correct wireless LAN topology for use in the Company network. Which three statements are true about the various WLAN topologies?()AIn ad hoc mode, the Independent Basic Service Set (IBSS) is a framework in which mobile clients connect directly without an intermediate access point.BIn Infrastructure mode, the Basic Service Set (BSS) is a framework in which mobile clients use a single access point for connecting to each other or to wired network resources.CIn Infrastructure mode, the Extended Services Set (ESS) is a framework in which two or more Basic Service Sets are connected by a common distribution system (DS).DIn Infrastructure mode, the Independent Basic Service Setet (IBSS) is a framework in which mobile clients connect directly without an intermediate access point.EIn ad hoc mode, the Basic Service Set (BSS) is a framework in which mobile clients use a single AP for connecting to each other or to wired network resources.FIn ad hoc mode, the Extended Services Set (ESS) is a framework in which two or more Basic Service Sets are connected by a common distribution system (DS)
考题
单选题Which configuration command allows the router to utilize a RADIUS server to auth enticate in coming Telnet users?()A
aaa new-modelB
aaa telnet loginC
telnet authentication loginD
authentication telnet login
考题
单选题You notice that during peak hours, some firewall enforcers contain a high number of auth table entries. As you investigate the issue, you discover that all users are getting auth table mappings to all firewalls, which is not acceptable. What should you do on the Junos Pulse Access Control Service to resolve this problem?()A
Delete the default auth table mapping policyB
Create auth table mapping policies that route users to specific resourcesC
Create Resource Access policies that permit access to specific resourcesD
Create Source Interface policies that route users to specific resources
考题
单选题You navigate to "UAC" "Infranet Enforcer" "Auth Table Mapping" in the admin GUI. You see one policy, which is the unmodified, original default policy.Which statement is true?()A
Dynamic auth table mapping is not enabled.B
A successful authentication attempt will result in a new authentication table entry, which will be delivered only to the Junos enforcer protecting the network from which the user has authenticated.C
To create a static auth table mapping, you must delete the default policy.D
The default policy applies only to the factory-default role User.
考题
单选题Which parameter do you use to enable Junos Pulse Access Control Service enforcement on a policy on a ScreenOS platform?()A
uac-policyB
ic-policyC
inyranet-authD
uac-auth
考题
单选题Which element of a web application deployment descriptor element is required()?A
realm-name B
auth-method C
security-role D
transport-guarantee E
web-resource-collection
考题
单选题Which the basic authentication type is optional for a J2EE 1.4 compliant web container?()A
HTTP Basic AuthenticationB
Form Based AuthenticationC
HTTP Digest AuthenticationD
HTTPS Client Authentication
热门标签
最新试卷