网友您好, 请在下方输入框内输入要搜索的题目:
题目内容
(请给出正确答案)
单选题
Which mechanism requires the client to provide its public key certificate?()
A
HTTP Basic Authentication
B
Form Based Authentication
C
HTTP Digest Authentication
D
HTTPS Client Authentication
参考答案
参考解析
解析:
暂无解析
更多 “单选题Which mechanism requires the client to provide its public key certificate?()A HTTP Basic AuthenticationB Form Based AuthenticationC HTTP Digest AuthenticationD HTTPS Client Authentication” 相关考题
考题
following code segment.[ServiceContract]public interface ICustomerService{...}public class CustomerService : ICustomerService{...}The service is self-hosted in a console application. Older client applications access the service at http://contoso.com:8080/CustomerService/V1.Newer client applications access the service at http://contoso.com:8080/CustomerService/V2.You need to ensure that any client application can access the service at either address.Which code segment should you use?()A.B.C.D.
考题
Originally introduced by Netscape Communications,(1)are a general mechanism which HTFP Server side applications, such as CGI(2), can use to both store and retrieve information on the HTTP(3)side of the connection. Basically, Cookies can be used to compensate for the(4)nature of HTTP. The addition of a simple, persistent, client-side state significantly extends the capabilities of WWW-based(5).A.BrowsersB.CookiesC.ConnectionsD.Scripts
考题
Originally introduced by Netscape Communications,(21)are a general mechanism which HTTP Server side applications, such as CGI(22), can use to both store and retrieve information on the HTTP(23)side of the connection. Basically, Cookies can be used to compensate for the(24)nature of HTTP. The addition of a simple, persistent, client-side state significantly extends the capabilities of WWW-based(25).A.BrowsersB.CookiesC.ConnectionsD.Scripts
考题
Originally-introduced by Netscape Communications,(31)are a general mechanism which HTTP Server side applications, such as CGI(32), can use to both store and retrieve information on the HTTP(33)side of the connection. Basically, Cookies can be used to compensate for the(34)nature of HTTP. The addition ora simple, persistent, client-side state significantly extends the capabilities of WWW-based(35).A.BrowsersB.CookiesC.ConnectionsD.Scripts
考题
属于IEEE802.11的用户认证机制有:()。
A.Open authenticationB.Pre-Shared Key authenticationC.Shared Key authenticationD.MAC authentication
考题
Which two are true about authentication?()A、Form-based logins should NOT be used with HTTPS.B、When using Basic Authentication the target server is NOT authenticated.C、J2EE compliant web containers are NOT required to support the HTTPS protocol.D、Web containers are required to support unauthenticated access to unprotected web resources.
考题
You develop a Windows Communication Foundation (WCF) service that uses basic authentication for client credentials. This service is currently configured to use message security. The service is hosted on a server in workgroup mode.Users report that their passwords are stolen when they use public computers.You need to ensure that messages are secure and users are authenticated.You prevent the service from being called over HTTP through Microsoft Internet Information Services (IIS) configuration. What should you do next?()A、Use the transport security mode and specify None for transport client credential type.B、Use the transportWithMessageCredential security mode and specify Basic for the transport client credential type.C、Use the message security mode and specify Basic for the transport client credential type.D、Use the transportWithMessageCredential security mode and specify None for the transport client credential type.
考题
属于IEEE802.11的用户认证机制有:()。A、Open authenticationB、Pre-Shared Key authenticationC、Shared Key authenticationD、MAC authentication
考题
In the wireless Advanced Feature Set using lightweight access points, a virtual interface is used when supporting which of the following features?()A、PSK authenticationB、EAP authenticationC、WPA authenticationD、Web authentication
考题
If authentication is enabled,which statement is true?()A、client reports will display authenticated usernamesB、client reports will display both the username and IP address of the clientsC、client reports are not affected by authenticationD、client reports will display the IP address of the authentication server
考题
If a certificate authority trustpoint is not configured when enabling HTTPS and the remote HTTPS server requires client authentication, connections to the secure HTTP client will fail. Which command must be enabled for correct operation?()A、ip http client secure-ciphersuite 3des-ede-cbc-shaB、ip https max-connections 10C、ip http timeout-policy idle 30 life 120 requests 100D、ip http client secure-trustpoint trustpoint-name
考题
Which two statements about the open and shared key wireless-authentication methods are true?()A、shared key authentication is considered more secure than open authenticationB、shared key authentication is considered less secure than open authenticationC、if the WEP keys do not match using the open authentication method, the client will not authenticate, associate, and transfer dataD、if the WEP keys do not match using the open authentication method, the client will still be able to authenticate and associate, but will not transfer dataE、if the WEP keys do not match using the open authentication method, the client will still be able to authenticate, associate, and transfer data
考题
Which description of BGP authentication is true?()A、MD5 has been used by BGP to encrypt BGP update packets.B、BGP uses a message-digest algorithm to authenticate BGP peersC、A plain-text password authentication is an option of BGP authenticationD、EBGP peers authentication is faster than IBGP peers authenticationE、BGP uses public key and private key to authenticate BGP peers.
考题
Which two authentication mechanisms provide weaker protection than other mechanisms?()A、 HTTP Basic AuthenticationB、 Form Based AuthenticationC、 HTTP Digest AuthenticationD、 HTTPS Client Authentication
考题
Which activity supports the data integrity requirements of an application?()A、Using HTTPS as a protocolB、Using an LDAP security realmC、Using HTTP Basic authenticationD、Using forms-based authentication
考题
Which basic authentication type is optional for a J2EE 1.4 compliant web container?()A、HTTP Basic AuthenticationB、Form Based AuthenticationC、HTTP Digest AuthenticationD、HTTPS Client Authentication
考题
Which mechanism requires the client to provide its public key certificate?()A、HTTP Basic AuthenticationB、Form Based AuthenticationC、HTTP Digest AuthenticationD、HTTPS Client Authentication
考题
Which statement is correct about HTTP trickling?()A、It prevents the HTTP client or server from timing-out during an antivirus updateB、It prevents the HTTP client or server from timing-out during antivirus scanning.C、It is an attack.D、It is used to bypass antivirus scanners.
考题
You need to recommend a strategy to ensure that the administration of AD LDS is encrypted. What should you include in the recommendation?()A、a server authentication certificateB、client authentication certificatesC、Digest authenticationD、Windows Integrated authentication
考题
You have an Exchange Server 2003 organization. All users connect to their mailboxes by using Microsoft Office Outlook. You start to transition the organization to new Exchange Server 2010 servers. The new servers are on a secured subnet that is separated by a firewall. You will move half of the mailboxes to the new servers. Client Access servers and Mailbox servers are on the secured subnet. Client computers on the network can access the Client Access servers. You need to recommend a solution that allows users to connect to Public Folders by using Outlook orOutlook Web App (OWA). What should you include in the solution?()A、Public Folder referrals and forms-based authenticationB、Public Folder referrals and HTTP connections to the Mailbox serversC、Public Folder replicas and MAPI connections to the Mailbox serversD、Public Folder replicas and WebReady Document Viewing
考题
多选题Which two authentication mechanisms provide weaker protection than other mechanisms?()AHTTP Basic AuthenticationBForm Based AuthenticationCHTTP Digest AuthenticationDHTTPS Client Authentication
考题
单选题Which statement is correct about HTTP trickling?()A
It prevents the HTTP client or server from timing-out during an antivirus updateB
It prevents the HTTP client or server from timing-out during antivirus scanning.C
It is an attack.D
It is used to bypass antivirus scanners.
考题
单选题You develop a Windows Communication Foundation (WCF) service that uses basic authentication for client credentials. This service is currently configured to use message security. The service is hosted on a server in workgroup mode.Users report that their passwords are stolen when they use public computers.You need to ensure that messages are secure and users are authenticated.You prevent the service from being called over HTTP through Microsoft Internet Information Services (IIS) configuration. What should you do next?()A
Use the transport security mode and specify None for transport client credential type.B
Use the transportWithMessageCredential security mode and specify Basic for the transport client credential type.C
Use the message security mode and specify Basic for the transport client credential type.D
Use the transportWithMessageCredential security mode and specify None for the transport client credential type.
考题
单选题Which basic authentication type is optional for a J2EE 1.4 compliant web container?()A
HTTP Basic AuthenticationB
Form Based AuthenticationC
HTTP Digest AuthenticationD
HTTPS Client Authentication
考题
单选题If a certificate authority trustpoint is not configured when enabling HTTPS and the remote HTTPS server requires client authentication, connections to the secure HTTP client will fail. Which command must be enabled for correct operation?()A
ip http client secure-ciphersuite 3des-ede-cbc-shaB
ip https max-connections 10C
ip http timeout-policy idle 30 life 120 requests 100D
ip http client secure-trustpoint trustpoint-name
考题
单选题Which the basic authentication type is optional for a J2EE 1.4 compliant web container?()A
HTTP Basic AuthenticationB
Form Based AuthenticationC
HTTP Digest AuthenticationD
HTTPS Client Authentication
考题
单选题Which activity supports the data integrity requirements of an application?()A
Using HTTPS as a protocolB
Using an LDAP security realmC
Using HTTP Basic authenticationD
Using forms-based authentication
热门标签
最新试卷