网友您好, 请在下方输入框内输入要搜索的题目:
题目内容
(请给出正确答案)
单选题
Which security mechanism uses the concept of a realm?()
A
Authorization
B
Data integrity
C
Confidentiality
D
Authentication
参考答案
参考解析
解析:
暂无解析
更多 “单选题Which security mechanism uses the concept of a realm?()A AuthorizationB Data integrityC ConfidentialityD Authentication” 相关考题
考题
Whichthe securitymechanismusestheconceptofarealm?()
A.authorizationB.dataintegrityC.confidentialityD.authentication
考题
Whichsecuritymechanismcanbedirectedthroughtheelementinawebdeploymentdescriptor()?
A.authorizationB.dataintegrityC.confidentialityD.authentication
考题
Whichsecuritymechanismisemployedonlyontheserver-sidetolimitaccesstoresourcesorcomponents?()
A.authorizationB.dataintegrityC.confidentialityD.authentication
考题
An authentication realm consists of which three authentication resources?()
A. Authentication serverB. Session optionsC. Authentication policyD. End-point security policyE. Role-mapping rules
考题
All three types of cryptography schemes have unique function mapping to specific applications. For example, the symmetric key( ) approach is typically used for the encryption of data providing ( ) , whereas asymmetric key cryptography is mainly used in key ( ) and nonrepudiation , thereby providing confidentiality and authentication. The hash ( ) (noncryptic), on the other hand, does not provide confidentiality but provides message integrity, and cryptographic hash algorithms provide message ( ) and identity of peers during transport over insecure channels.A.CryptographyB.decodeC.privacyD.security@@@SXB@@@A.ConductionB.confidenceC.confidentialityD.connection@@@SXB@@@A.AuthenticationB.structureC.encryptionD.exchange@@@SXB@@@A.AlgorithmB.SecureC.structureD.encryption@@@SXB@@@A.ConfidentialityB.integrityC.serviceD.robustness
考题
Which two statements about using the CHAP authentication mechanism in a PPP link are true?()
A.CHAP uses a two-way handshakeB.CHAP authentication periodically occurs after link establishmentC.CHAP has no protection from playback attacksD.CHAP authentication is performed only upon link establishmentE.CHAP uses a three-way handshakeF.CHAP authentication passwords are sent in plaintext
考题
Which option ensures that data is not modified in transit?()A、AuthorizationB、ConfidentialityC、AuthenticationD、Integrity
考题
Which two statements about the Wired Equivalent Privacy (WEP) encryption mechanism are true? ()A、the two methods of authentication using the WEP encryption are open and shared keyB、the 802.11 standard defines WEP security using 128-bit keysC、WEP can provide stronger authentication through the use of LEAP, PEAP, or EAP-FASTD、WEP is a scalable encryption solution that uses static keys for authenticationE、WEP security provides only one-way authenticationF、WEPv2 offers improved encryption by replacing the RC4 encryption mechanism with the AES (symmetric block cipher) mechanism
考题
Which security mechanism is employed only on the server-side to limit access to resources or components?()A、 authorizationB、 data integrityC、 confidentialityD、 authentication
考题
Which two pieces of information are needed when declaring the web resource collection in the deployment descriptor?()A、 the URL pattern that requires authorizationB、 the HTTP methods that require authorizationC、 the users allowed access to the web resourceD、 the J2EE roles allowed access to the web resourceE、 the authentication mechanism required by the web resource
考题
Which two security mechanisms protect the response stream?()A、 authorizationB、 data integrityC、 confidentialityD、 authentication
考题
An authentication realm consists of which three authentication resources?()A、Authentication serverB、Session optionsC、Authentication policyD、End-point security policyE、Role-mapping rules
考题
Which two statements about using the CHAP authentication mechanism in a PPP link are true?()A、CHAP uses a two-way handshakeB、CHAP authentication periodically occurs after link establishmentC、CHAP has no protection from playback attacksD、CHAP authentication is performed only upon link establishmentE、CHAP uses a three-way handshakeF、CHAP authentication passwords are sent in plaintext
考题
Which security mechanism can be directed through the element in a web deployment descriptor()?A、 authorizationB、 data integrityC、 confidentialityD、 authentication
考题
Which security mechanism uses the concept of a realm?()A、AuthorizationB、Data integrityC、ConfidentialityD、Authentication
考题
Which two security mechanisms can be directed through a sub-element of the element in a web application deployment descriptor?()A、AuthorizationB、Data integrityC、ConfidentialityD、Authentication
考题
Which three security concerns can be addressed by a tunnel mode IPsec VPN secured by AH?() (Choose three.)A、data integrityB、data confidentialityC、data authenticationD、outer IP header confidentialityE、outer IP header authentication
考题
Which three security concerns can be addressed by a tunnel mode IPsec VPN secured by ESP?()A、data integrityB、data confidentialityC、data authenticationD、outer IP header confidentialityE、outer IP header authentication
考题
Which three authentication resources are grouped within an authentication realm?()A、Authentication enforcerB、Directory serverC、Captive authenticationD、Authentication policyE、Role-mapping rules
考题
Identify the two optional WebLogic security providers in an Oracle WebLogic security realm()A、 Authentication ProviderB、 Adjudication ProviderC、 Authorization ProviderD、 Auditing Provider
考题
单选题Which security mechanism can be directed through the element in a web deployment descriptor()?A
authorizationB
data integrityC
confidentialityD
authentication
考题
单选题Which security mechanism is employed only on the server-side to limit access to resources or components?()A
authorizationB
data integrityC
confidentialityD
authentication
考题
多选题An authentication realm consists of which three authentication resources?()AAuthentication serverBSession optionsCAuthentication policyDEnd-point security policyERole-mapping rules
考题
单选题Which additional configuration must be completed when setting up role restrictions using certificates? ()A
Set up a certificate authentication server.B
Configure the authentication realm to remember certificate information.C
Configure the authentication realm to use a certificate server for authentication.D
Configure a role mapping rule requiring certification information to map user to role.
考题
单选题Which the security mechanism uses the concept of a realm?()A
authorizationB
data integrityC
confidentialityD
authentication
考题
多选题Which two statements about using the CHAP authentication mechanism in a PPP link are true?()ACHAP uses a two-way handshakeBCHAP authentication periodically occurs after link establishmentCCHAP has no protection from playback attacksDCHAP authentication is performed only upon link establishmentECHAP uses a three-way handshakeFCHAP authentication passwords are sent in plaintext
考题
单选题Which activity supports the data integrity requirements of an application?()A
Using HTTPS as a protocolB
Using an LDAP security realmC
Using HTTP Basic authenticationD
Using forms-based authentication
热门标签
最新试卷