authorization
data integrity
confidentiality
authentication
第1题:
For a given Servlet Response response, which retrieves an object for writing binary data? ()
第2题:
Which two statements are correct regarding MPLS LSP establishment methods?() (Choose two.)
第3题:
Which two authentication mechanisms provide weaker protection than other mechanisms?()
第4题:
For a given Servlet Response response, which two retrieve an object for writing text data? ()
第5题:
You are using Windows Communication Foundation (WCF) to create a service. You need to implement a custom message-level security binding element. Which binding element should you use?()
第6题:
HTTP Basic Authentication
Form Based Authentication
HTTP Digest Authentication
HTTPS Client Authentication
第7题:
reports financial losses from attacks
providessecutiy command and control
provides VPN connectivity to clients
expedites reporting of incidents
manage rogue wireless signals
第8题:
LDP uses Down Stream On Demand.
RSVP uses Down Stream On Demand.
LDP uses Down Stream Unsolicited.
RSVP uses Down Stream Unsolicited.
第9题:
[edit security idp]
[edit security zones security-zone trust interfaces ge-0/0/0.0]
[edit security zones security-zone trust]
[edit security screen]
第10题:
802.1X
Cisco Temporal Key Integrity Protocol (CKIP)
Extensible Authentication Protocol-Flexible Authentication via Secure Tunneling (EAP-FAST)
Cisco Message Integrity Check (CMIC)
One-Time Passwords (OTP)
Advanced Encryption Standard (AES)
第11题:
detailed VLAN information
an incident response plan
results of testing the new network configuration
an existing hierarchical network topology
a security policy for your organization
第12题:
Authorization
Data integrity
Confidentiality
Authentication
第13题:
Which two security mechanisms protect the response stream?()
第14题:
Which two are needed components when designing and implementing a security solution?()
第15题:
Which two security mechanisms can be directed through a sub-element of the
第16题:
You are creating a Windows Communication Foundation (WCF) service. You have the following requirements: Messages must be sent over TCP The service must support transactions. Messages must be encoded using a binary encoding Messages must be secured using Windows stream-based security.You need to implement a custom binding for the service. In which order should the binding stack be configured?()
第17题:
Authorization
Data integrity
Confidentiality
Authentication
第18题:
deny
discard
reject
close
第19题:
Site ID
Policies
Circuit ID
Extended communities
第20题:
response.get writer ()
response.get Output Stream ()
response.getOutput Writer()
response.get Writer ().get Output Stream ()
response.get Writer (Writer.OUTPUT_BINARY)
第21题:
response.get Writer ()
response.get Output Stream ()
response.get Output Writer ()
response.get Writer ().get Output Stream()
response.get Writer (Writer.OUTPUT_TEXT)
第22题:
cache statistics
client browser type
server response time
HTTP response codes
第23题:
EAP-TLS authentication
MS-CHAP v2 authentication
a stand-alone certification server
an enterprise certification server
MPPE 56-bit encryption