Which security mechanism is employed only on the server-side to limit access to resources or components?()
第1题:
A. Provides users access to network resources.
B. Performs router commands after user authentication.
C. Provides users with remote access only capabilities.
D. Does not require an authentication server
第2题:
第3题:
Which of the following is true about Outbound Malware Scanning?()
第4题:
Which two statements about the Wired Equivalent Privacy (WEP) encryption mechanism are true? ()
第5题:
Which two commands can be used to monitor firewall user authentication?()
第6题:
An authentication realm consists of which three authentication resources?()
第7题:
Kerberos is a form of user authentication that:()
第8题:
Which security mechanism uses the concept of a realm?()
第9题:
Under which configuration hierarchy is an access profile configured for firewall user authentication?()
第10题:
authorization
data integrity
confidentiality
authentication
第11题:
Authentication server
Session options
Authentication policy
End-point security policy
Role-mapping rules
第12题:
authorization
data integrity
confidentiality
authentication
第13题:
第14题:
第15题:
Which two components should be part of a security implementation plan?()
第16题:
Which two pieces of information are needed when declaring the web resource collection in the deployment descriptor?()
第17题:
Which two security mechanisms protect the response stream?()
第18题:
Which component of VPN technology ensures that data can be read only by its intended recipient?()
第19题:
Which security mechanism can be directed through the
第20题:
Which two security mechanisms can be directed through a sub-element of the
第21题:
Which three security concerns can be addressed by a tunnel mode IPsec VPN secured by ESP?()
第22题:
authorization
data integrity
confidentiality
authentication
第23题:
[edit access]
[edit security access]
[edit firewall access]
[edit firewall-authentication]