网友您好, 请在下方输入框内输入要搜索的题目:
题目内容
(请给出正确答案)
多选题
Given the two security constraints in a deployment descriptor: 101. 102. 103.SALES 104.SALES 105. 106. 107. 108. 109. 110. If the two security constraints have the same url-pattern and http-method which two inserted independentlyat line 109,will allow users with role names of either SALES or MARKETING to access this resource?()
A
<auth-constraint/>
B
<auth-constraint><role-name>*</role-name></auth-constraint>
C
<auth-constraint><role-name>ANY</role-name></auth-constraint>
D
<auth-constraint><role-name>MARKETING</role-name></auth-constraint>
参考答案
参考解析
解析:
暂无解析
更多 “多选题Given the two security constraints in a deployment descriptor: 101. 102. 103.SALES 104.SALES 105. 106. 107. 108. 109. 110. If the two security constraints have the same url-pattern and http-method which two inserted independentlyat line 109,will allow users with role names of either SALES or MARKETING to access this resource?()Aauth-constraint/Bauth-constraintrole-name*/role-name/auth-constraintCauth-constraintrole-nameANY/role-name/auth-constraintDauth-constraintrole-nameMARKETING/role-name/auth-constraint” 相关考题
考题
At which two levels of the Junos CLI hierarchy is the host-inbound-traffic command configured? ()(Choose two.)
A. [edit security idp]B. [edit security zones security-zone trust interfaces ge-0/0/0.0]C. [edit security zones security-zone trust]D. [edit security screen]
考题
The PIX Security Appliance feature set is a subset of the ASA Security Appliance feature set. Which two of these features are only supported by an ASA Security Appliance? (Choose two.)()A、 security contextsB、- transparent firewallC、 WebVPND、 Active/Active failoverE、 low latency queuingF、 AIP-SSM intrusion prevention
考题
The Cisco Unified Wireless Network minimizes the TCO and maximizes woreless network uptime by optimizing which two deployment, management, and security features?()A、 unified wireless and wired infrastructure for a single point of control for all WLAN trafficB、 simplified management of central or remotely located access pointsC、 extension features to wired network services, such as denial of service prevention and ACLsD、 threat defense with a robust wired IDS
考题
Refer to the exhibit. A junior network administrator was given the task of configuring port security on SwitchA to allow only PC_A to access the switched network through port fa0/1. If any other device is detected, the port is to drop frames from this device. The administrator configured the interface and tested it with successful pings from PC_A to RouterA, and then observes the output from these two show commands.Which two of these changes are necessary for SwitchA to meet the requirements? ()A、Port security needs to be globally enabled.B、Port security needs to be enabled on the interface.C、Port security needs to be configured to shut down the interface in the event of a violation.D、Port security needs to be configured to allow only one learned MAC address.E、Port security interface counters need to be cleared before using the show command.F、The port security configuration needs to be saved to NVRAM before it can become active.
考题
Which security mechanism can be directed through the element in a web deployment descriptor()?A、 authorizationB、 data integrityC、 confidentialityD、 authentication
考题
Which two security mechanisms can be directed through a sub-element of the element in a web application deployment descriptor?()A、AuthorizationB、Data integrityC、ConfidentialityD、Authentication
考题
At which two levels of the Junos CLI hierarchy is the host-inbound-traffic command configured? ()(Choose two.)A、[edit security idp]B、[edit security zones security-zone trust interfaces ge-0/0/0.0]C、[edit security zones security-zone trust]D、[edit security screen]
考题
Which two statements are true about constraints? ()A、The UNIQUE constraint does not permit a null value for the column.B、A UNIQUE index gets created for columns with PRIMARY KEY and UNIQUE constraints.C、The PRIMARY KEY and FOREIGN KEY constraints create a UNIQUE index.D、The NOT NULL constraint ensures that null values are not permitted for the column.
考题
Which two statements about creating constraints are true?()A、Constraint names must start with SYS_CB、All constraints must be defines at the column level.C、Constraints can be created after the table is created.D、Constraints can be created at the same time the table is created.E、Information about constraints is found in the VIEW_CONSTRAINTS dictionary view.
考题
Which two statements about creating constraints are true?()A、Constraint names must start with SYS_CB、All constraints must be defines at the column levelC、Constraints can be created after the table is createdD、Constraints can be created at the same time the table is createdE、Information about constraints is found in the VIEW_CONSTRAINTS dictionary view
考题
Your company has an organizational unit named Production. The Production organizational unit has achild organizational unit named RD. You create a GPO named Software Deployment and link it to the Production organizational unit. You create a shadow group for the RD organizational unit. You need to deploy an application to users in the Production organizational unit. You also need to ensure that the application is not deployed to users in the RD organizational unit. What are two possible ways to achieve this goal()A、Configure the Enforce setting on the software deployment GPO.B、Configure the Block Inheritance setting on the RD organizational unit.C、Configure the Block Inheritance setting on the Production organizational unit.D、Configure security filtering on the Software Deployment GPO to Deny Apply group policy for the RD security group.
考题
多选题Which two statements are true about the security-related tags in a valid Java EE deployment descriptor?()AEvery tag must have at least one tag.BA tag can have many tags.CA given tag can apply to only one tag.DA given tag can contain from zero to many tags.EIt is possible to construct a valid tag such that,for a given resource,no user rolescan access that resource.
考题
多选题For which two constraints does the Oracle Server implicitly create a unique index? ()ANOT NULLBPRIMARY KEYCFOREIGN KEYDCHECKEUNIQUE
考题
多选题Which two of the following are the imposed restrictions to production redeployment in WebLogic Server ?()ACan’t cahnge application’s deployment targetsBCan’t cahnge application’s security modelCCan’t cahnge application’s node managerDCan’t cahnge application’s persistent store settings
考题
多选题Given the two security constraints in a deployment descriptor: 101. 102. 103.SALES 104.SALES 105. 106. 107. 108. 109. 110. If the two security constraints have the same url-pattern and http-method which two inserted independentlyat line 109,will allow users with role names of either SALES or MARKETING to access this resource?()Aauth-constraint/Bauth-constraintrole-name*/role-name/auth-constraintCauth-constraintrole-nameANY/role-name/auth-constraintDauth-constraintrole-nameMARKETING/role-name/auth-constraint
考题
单选题Which security mechanism can be directed through the element in a web deployment descriptor()?A
authorizationB
data integrityC
confidentialityD
authentication
考题
多选题Which two statements about creating constraints are true?()AConstraint names must start with SYS_CBAll constraints must be defines at the column levelCConstraints can be created after the table is createdDConstraints can be created at the same time the table is createdEInformation about constraints is found in the VIEW_CONSTRAINTS dictionary view
考题
多选题Which two statements are true about constraints? ()AThe UNIQUE constraint does not permit a null value for the column.BA UNIQUE index gets created for columns with PRIMARY KEY and UNIQUE constraints.CThe PRIMARY KEY and FOREIGN KEY constraints create a UNIQUE index.DThe NOT NULL constraint ensures that null values are not permitted for the column.
考题
多选题At which two levels of the Junos CLI hierarchy is the host-inbound-traffic command configured? ()(Choose two.)A[edit security idp]B[edit security zones security-zone trust interfaces ge-0/0/0.0]C[edit security zones security-zone trust]D[edit security screen]
考题
多选题Refer to the exhibit. A junior network administrator was given the task of configuring port security on SwitchA to allow only PC_A to access the switched network through port fa0/1. If any other device is detected, the port is to drop frames from this device. The administrator configured the interface and tested it with successful pings from PC_A to RouterA, and then observes the output from these two show commands.Which two of these changes are necessary for SwitchA to meet the requirements? ()APort security needs to be globally enabled.BPort security needs to be enabled on the interface.CPort security needs to be configured to shut down the interface in the event of a violation.DPort security needs to be configured to allow only one learned MAC address.EPort security interface counters need to be cleared before using the show command.FThe port security configuration needs to be saved to NVRAM before it can become active.
考题
单选题A developer has used this code within a servlet: 62.if(request.isUserInRole("vip")) { 63.// VIP-related logic here 64.} What else must the developer do to ensure that the intended security goal is achieved?()A
Create a user called vip in the security realmB
Define a group within the security realm and call it vipC
Define a security-role named vip in the deployment descriptorD
Declare a security-role-ref for vip in the deployment descripto
考题
多选题Which two statements about creating constraints are true?()AConstraint names must start with SYS_CBAll constraints must be defines at the column level.CConstraints can be created after the table is created.DConstraints can be created at the same time the table is created.EInformation about constraints is found in the VIEW_CONSTRAINTS dictionary view.
考题
多选题What are two security appliances that can be installed in a network (Choose two.)()。AATMBIDSCIOSDIOXEIPSFSDM
热门标签
最新试卷