参考答案和解析
正确答案: D
解析: 暂无解析
更多“单选题Which the security mechanism uses the concept of a realm?()A  authorizationB  data integrityC  confidentialityD  authentication”相关问题
  • 第1题:

    All three types of cryptography schemes have unique function mapping to specific applications. For example, the symmetric key( ) approach is typically used for the encryption of data providing ( ) , whereas asymmetric key cryptography is mainly used in key ( ) and nonrepudiation , thereby providing confidentiality and authentication. The hash ( ) (noncryptic), on the other hand, does not provide confidentiality but provides message integrity, and cryptographic hash algorithms provide message ( ) and identity of peers during transport over insecure channels.

    A.Cryptography

    B.decode

    C.privacy

    D.security@@@SXB@@@A.Conduction

    B.confidence

    C.confidentiality

    D.connection@@@SXB@@@A.Authentication

    B.structure

    C.encryption

    D.exchange@@@SXB@@@A.Algorithm

    B.Secure

    C.structure

    D.encryption@@@SXB@@@A.Confidentiality

    B.integrity

    C.service

    D.robustness


    正确答案:D,C,C,A,C

  • 第2题:

    Which option ensures that data is not modified in transit?()

    • A、Authorization
    • B、Confidentiality
    • C、Authentication
    • D、Integrity

    正确答案:D

  • 第3题:

    Which security mechanism is employed only on the server-side to limit access to resources or components?()

    • A、 authorization
    • B、 data integrity
    • C、 confidentiality
    • D、 authentication

    正确答案:A

  • 第4题:

    Which two security mechanisms protect the response stream?()

    • A、 authorization
    • B、 data integrity
    • C、 confidentiality
    • D、 authentication

    正确答案:B,C

  • 第5题:

    Which two statements about using the CHAP authentication mechanism in a PPP link are true?()

    • A、CHAP uses a two-way handshake
    • B、CHAP authentication periodically occurs after link establishment
    • C、CHAP has no protection from playback attacks
    • D、CHAP authentication is performed only upon link establishment
    • E、CHAP uses a three-way handshake
    • F、CHAP authentication passwords are sent in plaintext

    正确答案:B,E

  • 第6题:

    Which security mechanism uses the concept of a realm?()

    • A、Authorization
    • B、Data integrity
    • C、Confidentiality
    • D、Authentication

    正确答案:D

  • 第7题:

    Which three security concerns can be addressed by a tunnel mode IPsec VPN secured by AH?() (Choose three.)

    • A、data integrity
    • B、data confidentiality
    • C、data authentication
    • D、outer IP header confidentiality
    • E、outer IP header authentication

    正确答案:A,C,E

  • 第8题:

    Which three authentication resources are grouped within an authentication realm?()

    • A、Authentication enforcer
    • B、Directory server
    • C、Captive authentication
    • D、Authentication policy
    • E、Role-mapping rules

    正确答案:B,D,E

  • 第9题:

    单选题
    Which security mechanism can be directed through the  element in a web deployment descriptor()?
    A

     authorization

    B

     data integrity

    C

     confidentiality

    D

     authentication


    正确答案: A
    解析: 暂无解析

  • 第10题:

    多选题
    An authentication realm consists of which three authentication resources?()
    A

    Authentication server

    B

    Session options

    C

    Authentication policy

    D

    End-point security policy

    E

    Role-mapping rules


    正确答案: B,D
    解析: 暂无解析

  • 第11题:

    单选题
    Which the security mechanism uses the concept of a realm?()
    A

     authorization

    B

     data integrity

    C

     confidentiality

    D

     authentication


    正确答案: A
    解析: 暂无解析

  • 第12题:

    单选题
    Which security mechanism uses the concept of a realm?()
    A

    Authorization

    B

    Data integrity

    C

    Confidentiality

    D

    Authentication


    正确答案: A
    解析: 暂无解析

  • 第13题:

    Which two statements about using the CHAP authentication mechanism in a PPP link are true?()

    A.CHAP uses a two-way handshake

    B.CHAP authentication periodically occurs after link establishment

    C.CHAP has no protection from playback attacks

    D.CHAP authentication is performed only upon link establishment

    E.CHAP uses a three-way handshake

    F.CHAP authentication passwords are sent in plaintext


    参考答案:B, E

  • 第14题:

    Which two statements about the Wired Equivalent Privacy (WEP) encryption mechanism are true? ()

    • A、the two methods of authentication using the WEP encryption are open and shared key
    • B、the 802.11 standard defines WEP security using 128-bit keys
    • C、WEP can provide stronger authentication through the use of LEAP, PEAP, or EAP-FAST
    • D、WEP is a scalable encryption solution that uses static keys for authentication
    • E、WEP security provides only one-way authentication
    • F、WEPv2 offers improved encryption by replacing the RC4 encryption mechanism with the AES (symmetric block cipher) mechanism

    正确答案:A,E

  • 第15题:

    Which two pieces of information are needed when declaring the web resource collection in the deployment descriptor?()

    • A、 the URL pattern that requires authorization
    • B、 the HTTP methods that require authorization
    • C、 the users allowed access to the web resource
    • D、 the J2EE roles allowed access to the web resource
    • E、 the authentication mechanism required by the web resource

    正确答案:A,B

  • 第16题:

    An authentication realm consists of which three authentication resources?()

    • A、Authentication server
    • B、Session options
    • C、Authentication policy
    • D、End-point security policy
    • E、Role-mapping rules

    正确答案:A,C,E

  • 第17题:

    Which security mechanism can be directed through the  element in a web deployment descriptor()?

    • A、 authorization
    • B、 data integrity
    • C、 confidentiality
    • D、 authentication

    正确答案:D

  • 第18题:

    Which two security mechanisms can be directed through a sub-element of the element in a web application deployment descriptor?()

    • A、Authorization
    • B、Data integrity
    • C、Confidentiality
    • D、Authentication

    正确答案:B,C

  • 第19题:

    Which three security concerns can be addressed by a tunnel mode IPsec VPN secured by ESP?()

    • A、data integrity
    • B、data confidentiality
    • C、data authentication
    • D、outer IP header confidentiality
    • E、outer IP header authentication

    正确答案:A,B,C

  • 第20题:

    Identify the two optional WebLogic security providers in an Oracle WebLogic security realm()

    • A、 Authentication Provider
    • B、 Adjudication Provider
    • C、 Authorization Provider
    • D、 Auditing Provider

    正确答案:B,D

  • 第21题:

    单选题
    Which security mechanism is employed only on the server-side to limit access to resources or components?()
    A

     authorization

    B

     data integrity

    C

     confidentiality

    D

     authentication


    正确答案: A
    解析: 暂无解析

  • 第22题:

    单选题
    Which additional configuration must be completed when setting up role restrictions using certificates? ()
    A

    Set up a certificate authentication server.

    B

    Configure the authentication realm to remember certificate information.

    C

    Configure the authentication realm to use a certificate server for authentication.

    D

    Configure a role mapping rule requiring certification information to map user to role.


    正确答案: B
    解析: 暂无解析

  • 第23题:

    多选题
    Which two statements about using the CHAP authentication mechanism in a PPP link are true?()
    A

    CHAP uses a two-way handshake

    B

    CHAP authentication periodically occurs after link establishment

    C

    CHAP has no protection from playback attacks

    D

    CHAP authentication is performed only upon link establishment

    E

    CHAP uses a three-way handshake

    F

    CHAP authentication passwords are sent in plaintext


    正确答案: E,D
    解析: 暂无解析

  • 第24题:

    单选题
    Which activity supports the data integrity requirements of an application?()
    A

    Using HTTPS as a protocol

    B

    Using an LDAP security realm

    C

    Using HTTP Basic authentication

    D

    Using forms-based authentication


    正确答案: C
    解析: 暂无解析