网友您好, 请在下方输入框内输入要搜索的题目:
题目内容
(请给出正确答案)
Which security mechanism is employed only on the server-side to limit access to resources or components?()
- A、 authorization
- B、 data integrity
- C、 confidentiality
- D、 authentication
参考答案
更多 “Which security mechanism is employed only on the server-side to limit access to resources or components?()A、 authorizationB、 data integrityC、 confidentialityD、 authentication” 相关考题
考题
Whichthe securitymechanismusestheconceptofarealm?()
A.authorizationB.dataintegrityC.confidentialityD.authentication
考题
Whichsecuritymechanismcanbedirectedthroughtheelementinawebdeploymentdescriptor()?
A.authorizationB.dataintegrityC.confidentialityD.authentication
考题
Whichsecuritymechanismisemployedonlyontheserver-sidetolimitaccesstoresourcesorcomponents?()
A.authorizationB.dataintegrityC.confidentialityD.authentication
考题
An authentication realm consists of which three authentication resources?()
A. Authentication serverB. Session optionsC. Authentication policyD. End-point security policyE. Role-mapping rules
考题
Kerberos is a form of user authentication that:()
A. Provides users access to network resources.B. Performs router commands after user authentication.C. Provides users with remote access only capabilities.D. Does not require an authentication server
考题
In the fields of physical security and information security, access control is the selective restriction of access to a place or other resource. The act of accessing may mean consuming, entering, or using. Permission to access a resource is called authorization (授权).
An access control mechanism (71) between a user (or a process executing on behalf of a user) and system resources, such as applications, operating systems, firewalls, routers, files, and databases. The system must first authenticate(验证)a user seeking access. Typically the authentication function determines whether the user is (72) to access the system at all. Then the access control function determines if the specific requested access by this user is permitted. A security administrator maintains an authorization database that specifies what type of access to which resources is allowed for this user. The access control function consults this database to determine whether to(73)access. An auditing function monitors and keeps a record of user accesses to system resources.
In practice, a number of(74)may cooperatively share the access control function. All operating systems have at least a rudimentary(基本的), and in many cases a quite robust, access control component. Add-on security packages can add to the(75)access control capabilities of the OS. Particular applications or utilities, such as a database management system, also incorporate access control functions. External devices, such as firewalls, can also provide access control services.A.open
B.monitor
C.grant
D.seek
考题
In the fields of physical security and information security, access control is the selective restriction of access to a place or other resource. The act of accessing may mean consuming, entering, or using. Permission to access a resource is called authorization (授权).
An access control mechanism (71) between a user (or a process executing on behalf of a user) and system resources, such as applications, operating systems, firewalls, routers, files, and databases. The system must first authenticate(验证)a user seeking access. Typically the authentication function determines whether the user is (72) to access the system at all. Then the access control function determines if the specific requested access by this user is permitted. A security administrator maintains an authorization database that specifies what type of access to which resources is allowed for this user. The access control function consults this database to determine whether to(73)access. An auditing function monitors and keeps a record of user accesses to system resources.
In practice, a number of(74)may cooperatively share the access control function. All operating systems have at least a rudimentary(基本的), and in many cases a quite robust, access control component. Add-on security packages can add to the(75)access control capabilities of the OS. Particular applications or utilities, such as a database management system, also incorporate access control functions. External devices, such as firewalls, can also provide access control services.A.components
B.users
C.mechanisms
D.algorithms
考题
Network security consists of policies and practices to prevent and monitor( )access,misuse,modification, or denial of a computer network and network-accessible resources.Network security involves the authorization of access to data in a network,which is controlled by the network( ). Users choose or are assigned an ID and password or other authenticating information that allows them to access to information and programs within their authority.Network security secures the network,as well as protecting and overseeing operations being done. The most common and simple way of protecting a network resource is by assigning it a(请作答此空)name and a corresponding password. Network security starts with authentication.Once authenticated a ( ) enforces policies such as what services are allowed to be accessed by the network users. Though effective to prevent unauthorized access, this component may fail to check potentially harmful content such as computer( )or Trojans being transmitted over the networkA.complex
B.unique
C.catchy
D.long
考题
Which of the following is true about Outbound Malware Scanning?() A、 It has its own policy table.B、 It is configured as part of Access Policies.C、 It is configured as part ofIronPort data Security.D、 It only has global configuration.
考题
Which two components should be part of a security implementation plan?()A、detailed list of personnel assigned to each task within the planB、a Layer 2 spanning tree design topologyC、rollback guidelinesD、placing all unused access ports in VLAN 1 to proactively manage port securityE、enabling SNMP access to Cisco Discovery Protocol data for logging and forensic analysis
考题
Which two statements about the Wired Equivalent Privacy (WEP) encryption mechanism are true? ()A、the two methods of authentication using the WEP encryption are open and shared keyB、the 802.11 standard defines WEP security using 128-bit keysC、WEP can provide stronger authentication through the use of LEAP, PEAP, or EAP-FASTD、WEP is a scalable encryption solution that uses static keys for authenticationE、WEP security provides only one-way authenticationF、WEPv2 offers improved encryption by replacing the RC4 encryption mechanism with the AES (symmetric block cipher) mechanism
考题
Which two pieces of information are needed when declaring the web resource collection in the deployment descriptor?()A、 the URL pattern that requires authorizationB、 the HTTP methods that require authorizationC、 the users allowed access to the web resourceD、 the J2EE roles allowed access to the web resourceE、 the authentication mechanism required by the web resource
考题
Which two commands can be used to monitor firewall user authentication?()A、show access firewall-authenticationB、show security firewall-authentication usersC、show security audit logD、show security firewall-authentication history
考题
Which two security mechanisms protect the response stream?()A、 authorizationB、 data integrityC、 confidentialityD、 authentication
考题
An authentication realm consists of which three authentication resources?()A、Authentication serverB、Session optionsC、Authentication policyD、End-point security policyE、Role-mapping rules
考题
Which component of VPN technology ensures that data can be read only by its intended recipient?()A、data integrityB、encryptionC、key exchangeD、authentication
考题
Kerberos is a form of user authentication that:()A、Provides users access to network resources.B、Performs router commands after user authentication.C、Provides users with remote access only capabilities.D、Does not require an authentication server
考题
Which security mechanism can be directed through the element in a web deployment descriptor()?A、 authorizationB、 data integrityC、 confidentialityD、 authentication
考题
Which security mechanism uses the concept of a realm?()A、AuthorizationB、Data integrityC、ConfidentialityD、Authentication
考题
Which two security mechanisms can be directed through a sub-element of the element in a web application deployment descriptor?()A、AuthorizationB、Data integrityC、ConfidentialityD、Authentication
考题
Under which configuration hierarchy is an access profile configured for firewall user authentication?()A、[edit access]B、[edit security access]C、[edit firewall access]D、[edit firewall-authentication]
考题
Which three security concerns can be addressed by a tunnel mode IPsec VPN secured by ESP?()A、data integrityB、data confidentialityC、data authenticationD、outer IP header confidentialityE、outer IP header authentication
考题
单选题Which security mechanism can be directed through the element in a web deployment descriptor()?A
authorizationB
data integrityC
confidentialityD
authentication
考题
单选题Which security mechanism is employed only on the server-side to limit access to resources or components?()A
authorizationB
data integrityC
confidentialityD
authentication
考题
多选题An authentication realm consists of which three authentication resources?()AAuthentication serverBSession optionsCAuthentication policyDEnd-point security policyERole-mapping rules
考题
单选题Under which configuration hierarchy is an access profile configured for firewall user authentication?()A
[edit access]B
[edit security access]C
[edit firewall access]D
[edit firewall-authentication]
考题
单选题Which the security mechanism uses the concept of a realm?()A
authorizationB
data integrityC
confidentialityD
authentication
热门标签
最新试卷