authorization
data integrity
confidentiality
authentication
第1题:
All three types of cryptography schemes have unique function mapping to specific applications. For example, the symmetric key( ) approach is typically used for the encryption of data providing ( ) , whereas asymmetric key cryptography is mainly used in key ( ) and nonrepudiation , thereby providing confidentiality and authentication. The hash ( ) (noncryptic), on the other hand, does not provide confidentiality but provides message integrity, and cryptographic hash algorithms provide message ( ) and identity of peers during transport over insecure channels.
A.Cryptography
B.decode
C.privacy
D.security@@@SXB@@@A.Conduction
B.confidence
C.confidentiality
D.connection@@@SXB@@@A.Authentication
B.structure
C.encryption
D.exchange@@@SXB@@@A.Algorithm
B.Secure
C.structure
D.encryption@@@SXB@@@A.Confidentiality
B.integrity
C.service
D.robustness
第2题:
Which option ensures that data is not modified in transit?()
第3题:
Which security mechanism is employed only on the server-side to limit access to resources or components?()
第4题:
Which two security mechanisms protect the response stream?()
第5题:
Which two statements about using the CHAP authentication mechanism in a PPP link are true?()
第6题:
Which security mechanism uses the concept of a realm?()
第7题:
Which three security concerns can be addressed by a tunnel mode IPsec VPN secured by AH?() (Choose three.)
第8题:
Which three authentication resources are grouped within an authentication realm?()
第9题:
authorization
data integrity
confidentiality
authentication
第10题:
Authentication server
Session options
Authentication policy
End-point security policy
Role-mapping rules
第11题:
authorization
data integrity
confidentiality
authentication
第12题:
Authorization
Data integrity
Confidentiality
Authentication
第13题:
A.CHAP uses a two-way handshake
B.CHAP authentication periodically occurs after link establishment
C.CHAP has no protection from playback attacks
D.CHAP authentication is performed only upon link establishment
E.CHAP uses a three-way handshake
F.CHAP authentication passwords are sent in plaintext
第14题:
Which two statements about the Wired Equivalent Privacy (WEP) encryption mechanism are true? ()
第15题:
Which two pieces of information are needed when declaring the web resource collection in the deployment descriptor?()
第16题:
An authentication realm consists of which three authentication resources?()
第17题:
Which security mechanism can be directed through the
第18题:
Which two security mechanisms can be directed through a sub-element of the
第19题:
Which three security concerns can be addressed by a tunnel mode IPsec VPN secured by ESP?()
第20题:
Identify the two optional WebLogic security providers in an Oracle WebLogic security realm()
第21题:
authorization
data integrity
confidentiality
authentication
第22题:
Set up a certificate authentication server.
Configure the authentication realm to remember certificate information.
Configure the authentication realm to use a certificate server for authentication.
Configure a role mapping rule requiring certification information to map user to role.
第23题:
CHAP uses a two-way handshake
CHAP authentication periodically occurs after link establishment
CHAP has no protection from playback attacks
CHAP authentication is performed only upon link establishment
CHAP uses a three-way handshake
CHAP authentication passwords are sent in plaintext
第24题:
Using HTTPS as a protocol
Using an LDAP security realm
Using HTTP Basic authentication
Using forms-based authentication