单选题Which activity supports the data integrity requirements of an application?()A Using HTTPS as a protocolB Using an LDAP security realmC Using HTTP Basic authenticationD Using forms-based authentication

题目
单选题
Which activity supports the data integrity requirements of an application?()
A

Using HTTPS as a protocol

B

Using an LDAP security realm

C

Using HTTP Basic authentication

D

Using forms-based authentication


相似考题
参考答案和解析
正确答案: C
解析: 暂无解析
更多“单选题Which activity supports the data integrity requirements of an application?()A Using HTTPS as a protocolB Using an LDAP security realmC Using HTTP Basic authenticationD Using forms-based authentication”相关问题
  • 第1题:

    Which of the following options would best help to reduce packet fragmentation for a TCP application transferring large amounts of data between servers across a path of multiple networks?()

    • A、 Adjust Path MTU attributes, using the no command.
    • B、 Adjust the status queue size on the adapters, using the chdev command.
    • C、 Adjust ipforwarding to enabled, using the no command.
    • D、 Adjust tcp_maxburst to enabled, using the no command.

    正确答案:A

  • 第2题:

    What is the objective of the aaa authentication login console-in local command?()

    • A、It specifies the login authentication method list named console-in using the local user database on the router
    • B、It specifies the login authorization method list named console-in using the local RADIUS username-password data base
    • C、It specifies the login authentication list named console-in using the local username- password data base on the router
    • D、It specifies the login authorization method list named console-in using the local username- password data base on the router

    正确答案:A

  • 第3题:

    In the wireless Advanced Feature Set using lightweight access points, a virtual interface is used when supporting which of the following features?()

    • A、PSK authentication
    • B、EAP authentication
    • C、WPA authentication
    • D、Web authentication

    正确答案:D

  • 第4题:

    Which two authentication mechanisms provide weaker protection than other mechanisms?()

    • A、 HTTP Basic Authentication
    • B、 Form Based Authentication
    • C、 HTTP Digest Authentication
    • D、 HTTPS Client Authentication

    正确答案:A,B

  • 第5题:

    Which basic authentication type is optional for a J2EE 1.4 compliant web container?()

    • A、HTTP Basic Authentication
    • B、Form Based Authentication
    • C、HTTP Digest Authentication
    • D、HTTPS Client Authentication

    正确答案:C

  • 第6题:

    Which statement is true when logging in using the WebUI? ()

    • A、Port 80 for HTTP is enabled by default. 
    • B、Port 443 for HTTPS is enabled by default.
    • C、Port 8090 for HTTP is enabled by default.
    • D、Both HTTP and HTTPS are enabled using their standard port values.

    正确答案:C

  • 第7题:

    You are the network administrator for your company. The network consists of a single Active Directory domain. All servers run Windows Server 2003. The network contains a Web server that runs IIS 6.0 and hosts a secure intranet site. All users are required to connect to the intranet site by authenticating and using HTTPS. However, because an automated Web application must connect to the Web site by using HTTP, you cannot configure the intranet site to require HTTPS.  You need to collect information about which users are connecting to the Web site by using HTTPS.   What should you do?()

    • A、Check the application log on the Web server.
    • B、Use Network Monitor to capture network traffic on the Web server.
    • C、Review the log files created by IIS on the Web server.
    • D、Configure a performance log to capture all Web service counters. Review the performance log data.

    正确答案:C

  • 第8题:

    单选题
    WebSphere Application Server supports performance data collection using the Performance Monitoring Infrastructure (PMI).  Which tool supports PMI and would be best to analyze the WebSphere Commerce runtime EJB, JVM and thread pool stats?()
    A

    WebSphere Commerce Analyzer

    B

    Tivoli Performance Viewer.

    C

    Tivoli Web Site Analyzer.

    D

    DB2 Intelligent Miner for Data.


    正确答案: B
    解析: 暂无解析

  • 第9题:

    单选题
    What is the objective of the aaa authentication login console-in local command?()
    A

    It specifies the login authentication method list named console-in using the local user database on the router

    B

    It specifies the login authorization method list named console-in using the local RADIUS username-password data base

    C

    It specifies the login authentication list named console-in using the local username- password data base on the router

    D

    It specifies the login authorization method list named console-in using the local username- password data base on the router


    正确答案: C
    解析: 暂无解析

  • 第10题:

    单选题
    Which of the following options would best help to reduce packet fragmentation for a TCP application transferring large amounts of data between servers across a path of multiple networks?()
    A

     Adjust Path MTU attributes, using the no command.

    B

     Adjust the status queue size on the adapters, using the chdev command.

    C

     Adjust ipforwarding to enabled, using the no command.

    D

     Adjust tcp_maxburst to enabled, using the no command.


    正确答案: D
    解析: 暂无解析

  • 第11题:

    单选题
    Which statement is true when logging in using the WebUI? ()
    A

    Port 80 for HTTP is enabled by default. 

    B

    Port 443 for HTTPS is enabled by default.

    C

    Port 8090 for HTTP is enabled by default.

    D

    Both HTTP and HTTPS are enabled using their standard port values.


    正确答案: A
    解析: 暂无解析

  • 第12题:

    单选题
    Which activity supports the data integrity requirements of an application?()
    A

    Using HTTPS as a protocol

    B

    Using an LDAP security realm

    C

    Using HTTP Basic authentication

    D

    Using forms-based authentication


    正确答案: C
    解析: 暂无解析

  • 第13题:

    Company.com network consists of a single Active Directory domain named  Company.com.Company.com has an Exchange Server 2010 organization.The Company.com employees use Microsoft Office Outlook 2007 to connect to their mailboxes.RPC over HTTP and Auto discover are configured on Microsoft Office Outlook 2007. A new Company.com security policy requires that the employees connected to the domain does not need authentication when using Outlook Anywhere.However, those not connected t the domain needs to be authentication when using Outlook Anywhere.The employees need to comply with the new Company.com security policy.  What should you do?()

    • A、You should consider using Basic authentication on Outlook Anywhere and set up only Basic authentication on the RPC virtual directory.
    • B、You should consider using NTLM authentication on Outlook Anywhere and set up Basic authentication and NTLM authentication on the RPC virtual directory.
    • C、You should consider using NTLM authentication on Outlook Anywhere and set up only Basic authentication on the RPC virtual directory.
    • D、You should consider using Basic authentication on Outlook Anywhere and set up Basic authentication and NTLM authentication on the RPC virtual directory.

    正确答案:B

  • 第14题:

    Which two are true about authentication?()

    • A、Form-based logins should NOT be used with HTTPS.
    • B、When using Basic Authentication the target server is NOT authenticated.
    • C、J2EE compliant web containers are NOT required to support the HTTPS protocol.
    • D、Web containers are required to support unauthenticated access to unprotected web resources.

    正确答案:B,D

  • 第15题:

    When determining a customer’s security requirements using the security site survey from the steps for success methodology, which three of theses should be included in the customer’s security policy and procedures?()

    • A、Third-party due diligence policy review
    • B、Remote Access Policy
    • C、Encryption Policy
    • D、Application change control policy
    • E、Security Personnel policy

    正确答案:A,B,D

  • 第16题:

    Which activity supports the data integrity requirements of an application?()

    • A、Using HTTPS as a protocol
    • B、Using an LDAP security realm
    • C、Using HTTP Basic authentication
    • D、Using forms-based authentication

    正确答案:A

  • 第17题:

    Which mechanism requires the client to provide its public key certificate?()

    • A、HTTP Basic Authentication
    • B、Form Based Authentication
    • C、HTTP Digest Authentication
    • D、HTTPS Client Authentication

    正确答案:D

  • 第18题:

    In your database,the LDAP_DIRECTORY_SYSAUTH initialization parameter has been set to YES and the users who need to access the database as DBAs have been granted SYSDBA enterprise role in Oracle Internet Directory (OID). SSL and the password file have been configured. A user SCOTT with the SYSDBA privilege tries to connect to the database instance from a remote machine using the command:$ SQLPLUS scott/tiger@DB01 AS SYSDBA   where DB01 is the net service name.   Which authentication method would be used first?()  

    • A、 authentication by password file
    • B、 authentication by using certificates over SSL
    • C、 authentication by using the Oracle Internet Directory
    • D、 authentication by using the local OS of the database server

    正确答案:A

  • 第19题:

    多选题
    Which two are true about authentication?()
    A

    Form-based logins should NOT be used with HTTPS.

    B

    When using Basic Authentication the target server is NOT authenticated.

    C

    J2EE compliant web containers are NOT required to support the HTTPS protocol.

    D

    Web containers are required to support unauthenticated access to unprotected web resources.


    正确答案: A,C
    解析: 暂无解析

  • 第20题:

    单选题
    In your database,the LDAP_DIRECTORY_SYSAUTH initialization parameter has been set to YES and the users who need to access the database as DBAs have been granted SYSDBA enterprise role in Oracle Internet Directory (OID). SSL and the password file have been configured. A user SCOTT with the SYSDBA privilege tries to connect to the database instance from a remote machine using the command:$ SQLPLUS scott/tiger@DB01 AS SYSDBA   where DB01 is the net service name.   Which authentication method would be used first?()
    A

     authentication by password file

    B

     authentication by using certificates over SSL

    C

     authentication by using the Oracle Internet Directory

    D

     authentication by using the local OS of the database server


    正确答案: A
    解析: 暂无解析

  • 第21题:

    单选题
    You are the network administrator for The network consists of a single Active Directory domain named All servers run Windows Server 2003. The network contains a Web server that runs IIS 6.0 and hosts a secure intranet site. All users are required to connect to the intranet site by authenticating and using HTTPS. However, because an automated Web application must connect to the Web site by using HTTP, you cannot configure the intranet site to require HTTPS. You need to collect information about which users are connecting to the Web site by using HTTPS. What should you do?()
    A

    Check the application log on the Web server.

    B

    Use Network Monitor to capture network traffic on the Web server.

    C

    Review the log files created by IIS on the Web server.

    D

    Configure a performance log to capture all Web service counters. Review the performance log data.


    正确答案: A
    解析: 暂无解析

  • 第22题:

    多选题
    Which two statements about the open and shared key wireless-authentication methods are true? ()
    A

    Shared key authentication is considered more secure than open authentication.

    B

    Shared key authentication is considered less secure than open authentication.

    C

    If the WEP keys do not match using the open authentication method, the client will not authenticate, associate, and transfer data.

    D

    If the WEP keys do not match using the open authentication method, the client will still be able to authenticate and associate, but will not transfer data.

    E

    If the WEP keys do not match using the open authentication method, the client will still be able to authenticate, associate, and transfer data.


    正确答案: C,B
    解析: 暂无解析

  • 第23题:

    单选题
    Which the basic authentication type is optional for a J2EE 1.4 compliant web container?()
    A

     HTTP Basic Authentication

    B

     Form Based Authentication

    C

     HTTP Digest Authentication

    D

     HTTPS Client Authentication


    正确答案: A
    解析: 暂无解析

  • 第24题:

    单选题
    Company.com network consists of a single Active Directory domain named  Company.com.Company.com has an Exchange Server 2010 organization.The Company.com employees use Microsoft Office Outlook 2007 to connect to their mailboxes.RPC over HTTP and Auto discover are configured on Microsoft Office Outlook 2007. A new Company.com security policy requires that the employees connected to the domain does not need authentication when using Outlook Anywhere.However, those not connected t the domain needs to be authentication when using Outlook Anywhere.The employees need to comply with the new Company.com security policy.  What should you do?()
    A

    You should consider using Basic authentication on Outlook Anywhere and set up only Basic authentication on the RPC virtual directory.

    B

    You should consider using NTLM authentication on Outlook Anywhere and set up Basic authentication and NTLM authentication on the RPC virtual directory.

    C

    You should consider using NTLM authentication on Outlook Anywhere and set up only Basic authentication on the RPC virtual directory.

    D

    You should consider using Basic authentication on Outlook Anywhere and set up Basic authentication and NTLM authentication on the RPC virtual directory.


    正确答案: C
    解析: 暂无解析