多选题Which two authentication mechanisms provide weaker protection than other mechanisms?()AHTTP Basic AuthenticationBForm Based AuthenticationCHTTP Digest AuthenticationDHTTPS Client Authentication

题目
多选题
Which two authentication mechanisms provide weaker protection than other mechanisms?()
A

HTTP Basic Authentication

B

Form Based Authentication

C

HTTP Digest Authentication

D

HTTPS Client Authentication


相似考题
参考答案和解析
正确答案: C,D
解析: 暂无解析
更多“多选题Which two authentication mechanisms provide weaker protection than other mechanisms?()AHTTP Basic AuthenticationBForm Based AuthenticationCHTTP Digest AuthenticationDHTTPS Client Authentication”相关问题
  • 第1题:

    Which IS-IS authentication method is supported on the ERX Edge Router?()

    • A、simple password
    • B、HMAC message digest 5
    • C、Password Authentication Protocol
    • D、Challenge Handshake Authentication Protocol

    正确答案:B

  • 第2题:

    Which two are true about authentication?()

    • A、Form-based logins should NOT be used with HTTPS.
    • B、When using Basic Authentication the target server is NOT authenticated.
    • C、J2EE compliant web containers are NOT required to support the HTTPS protocol.
    • D、Web containers are required to support unauthenticated access to unprotected web resources.

    正确答案:B,D

  • 第3题:

    Which two statements about the open and shared key wireless-authentication methods are true?()

    • A、shared key authentication is considered more secure than open authentication
    • B、shared key authentication is considered less secure than open authentication
    • C、if the WEP keys do not match using the open authentication method, the client will not authenticate, associate, and transfer data
    • D、if the WEP keys do not match using the open authentication method, the client will still be able to authenticate and associate, but will not transfer data
    • E、if the WEP keys do not match using the open authentication method, the client will still be able to authenticate, associate, and transfer data

    正确答案:B,D

  • 第4题:

    Which basic authentication type is optional for a J2EE 1.4 compliant web container?()

    • A、HTTP Basic Authentication
    • B、Form Based Authentication
    • C、HTTP Digest Authentication
    • D、HTTPS Client Authentication

    正确答案:C

  • 第5题:

    Which mechanism requires the client to provide its public key certificate?()

    • A、HTTP Basic Authentication
    • B、Form Based Authentication
    • C、HTTP Digest Authentication
    • D、HTTPS Client Authentication

    正确答案:D

  • 第6题:

    You need to recommend a strategy to ensure that the administration of AD LDS is encrypted.  What should you include in the recommendation?()

    • A、a server authentication certificate
    • B、client authentication certificates
    • C、Digest authentication
    • D、Windows Integrated authentication

    正确答案:A

  • 第7题:

    多选题
    Which two are true about authentication?()
    A

    Form-based logins should NOT be used with HTTPS.

    B

    When using Basic Authentication the target server is NOT authenticated.

    C

    J2EE compliant web containers are NOT required to support the HTTPS protocol.

    D

    Web containers are required to support unauthenticated access to unprotected web resources.


    正确答案: A,C
    解析: 暂无解析

  • 第8题:

    多选题
    You manage a server that runs Windows Server 2008. The server has the Web Server (IIS) role installed. The server hosts an Internet-accessible Web site that has a virtual directory named /orders/. A Web server certificate is installed and an SSL listener has been configured for the Web site. The /orders/ virtual directory must meet the following company policy requirements: Be accessible to authenticated users only. Allow authentication types to support all browsers. Encrypt all authentication traffic by using HTTPS.  All other directories of the Web site must be accessible to anonymous users and be available withoutSSL.  You need to configure the /orders/ virtual directory to meet the company policy requirements.  Which two actions should you perform?()
    A

    Configure the Web site to the Require SSL setting.

    B

    Configure the /orders/ virtual directory to the Require SSL setting.

    C

    Configure the Digest Authentication setting to Enabled for the /orders/ virtual directory.

    D

    Configure the Basic Authentication setting to Enabled and the Anonymous Authentication setting to Disabled for the Web site.

    E

    Configure the Basic Authentication setting to Enabled and the Anonymous Authentication setting to Disabled for the /orders/ virtual directory.


    正确答案: C,A
    解析: 暂无解析

  • 第9题:

    多选题
    Which two statements about the open and shared key wireless-authentication methods are true?()
    A

    shared key authentication is considered more secure than open authentication

    B

    shared key authentication is considered less secure than open authentication

    C

    if the WEP keys do not match using the open authentication method, the client will not authenticate, associate, and transfer data

    D

    if the WEP keys do not match using the open authentication method, the client will still be able to authenticate and associate, but will not transfer data

    E

    if the WEP keys do not match using the open authentication method, the client will still be able to authenticate, associate, and transfer data


    正确答案: E,D
    解析: 暂无解析

  • 第10题:

    多选题
    Which two statements about using the CHAP authentication mechanism in a PPP link are true?()
    A

    CHAP uses a two-way handshake

    B

    CHAP authentication periodically occurs after link establishment

    C

    CHAP has no protection from playback attacks

    D

    CHAP authentication is performed only upon link establishment

    E

    CHAP uses a three-way handshake

    F

    CHAP authentication passwords are sent in plaintext


    正确答案: E,D
    解析: 暂无解析

  • 第11题:

    单选题
    Which mechanism requires the client to provide its public key certificate?()
    A

    HTTP Basic Authentication

    B

    Form Based Authentication

    C

    HTTP Digest Authentication

    D

    HTTPS Client Authentication


    正确答案: C
    解析: 暂无解析

  • 第12题:

    单选题
    Which the basic authentication type is optional for a J2EE 1.4 compliant web container?()
    A

     HTTP Basic Authentication

    B

     Form Based Authentication

    C

     HTTP Digest Authentication

    D

     HTTPS Client Authentication


    正确答案: A
    解析: 暂无解析

  • 第13题:

    Which two security mechanisms protect the response stream?()

    • A、 authorization
    • B、 data integrity
    • C、 confidentiality
    • D、 authentication

    正确答案:B,C

  • 第14题:

    Which two statements about using the CHAP authentication mechanism in a PPP link are true?()

    • A、CHAP uses a two-way handshake
    • B、CHAP authentication periodically occurs after link establishment
    • C、CHAP has no protection from playback attacks
    • D、CHAP authentication is performed only upon link establishment
    • E、CHAP uses a three-way handshake
    • F、CHAP authentication passwords are sent in plaintext

    正确答案:B,E

  • 第15题:

    Which two authentication mechanisms provide weaker protection than other mechanisms?()

    • A、 HTTP Basic Authentication
    • B、 Form Based Authentication
    • C、 HTTP Digest Authentication
    • D、 HTTPS Client Authentication

    正确答案:A,B

  • 第16题:

    Which two security mechanisms can be directed through a sub-element of the element in a web application deployment descriptor?()

    • A、Authorization
    • B、Data integrity
    • C、Confidentiality
    • D、Authentication

    正确答案:B,C

  • 第17题:

    Which three features are provided by Oracle Net Services? ()

    • A、Data encryption.
    • B、User authentication.
    • C、Transparent data conversion
    • D、Configuration and administration mechanisms.
    • E、Support for multiple network transport protocols.

    正确答案:C,D,E

  • 第18题:

    You need to recommend a security strategy for WebApp2 that meets the company’s applicaton  requirements.What should you include in the recommendation?()

    • A、Basic authentication and connection security rules
    • B、Basic authentication and SSL
    • C、Digest authentication and connection security rules
    • D、Digest authentication and SSL

    正确答案:B

  • 第19题:

    多选题
    Which two authentication mechanisms provide weaker protection than other mechanisms?()
    A

    HTTP Basic Authentication

    B

    Form Based Authentication

    C

    HTTP Digest Authentication

    D

    HTTPS Client Authentication


    正确答案: A,B
    解析: 暂无解析

  • 第20题:

    多选题
    Which two statements regarding firewall user authentication client groups are true?() (Choose two.)
    A

    A client group is a list of clients associated with a group.

    B

    A client group is a list of groups associated with a client.

    C

    Client groups are referenced in security policy in the same manner in which individual clients are referenced.

    D

    Client groups are used to simplify configuration by enabling firewall user authentication without security policy.


    正确答案: D,A
    解析: 暂无解析

  • 第21题:

    多选题
    Which two statements about the open and shared key wireless-authentication methods are true? ()
    A

    Shared key authentication is considered more secure than open authentication.

    B

    Shared key authentication is considered less secure than open authentication.

    C

    If the WEP keys do not match using the open authentication method, the client will not authenticate, associate, and transfer data.

    D

    If the WEP keys do not match using the open authentication method, the client will still be able to authenticate and associate, but will not transfer data.

    E

    If the WEP keys do not match using the open authentication method, the client will still be able to authenticate, associate, and transfer data.


    正确答案: C,B
    解析: 暂无解析

  • 第22题:

    单选题
    Which basic authentication type is optional for a J2EE 1.4 compliant web container?()
    A

    HTTP Basic Authentication

    B

    Form Based Authentication

    C

    HTTP Digest Authentication

    D

    HTTPS Client Authentication


    正确答案: B
    解析: 暂无解析

  • 第23题:

    多选题
    Which two security mechanisms protect the response stream?()
    A

    authorization

    B

    data integrity

    C

    confidentiality

    D

    authentication


    正确答案: B,C
    解析: 暂无解析

  • 第24题:

    多选题
    Which three features are provided by Oracle Net Services? ()
    A

    Data encryption.

    B

    User authentication.

    C

    Transparent data conversion

    D

    Configuration and administration mechanisms.

    E

    Support for multiple network transport protocols.


    正确答案: B,E
    解析: 暂无解析