单选题Which security mechanism is employed only on the server-side to limit access to resources or components?()A authorizationB data integrityC confidentialityD authentication

单选题
Which security mechanism is employed only on the server-side to limit access to resources or components?()
A

 authorization

B

 data integrity

C

 confidentiality

D

 authentication


参考解析

解析: 暂无解析

相关考题:

Firewall is a (74) mechanism used by organizations to protect their LANs from the Internet.(74)A. reliableB. stableC. peacefulD. security

When adding a new user and assigning a role, which user role has "read only" rights to theconfiguration and operational states? () A.userB.read_onlyC.target_operatorD.security_operator

Firewall is a(74) mechanism used by organizations to protect their LANs from the Internet.A.reliableB.stableC.peacefulD.security

Which of the following is true about Outbound Malware Scanning?() A、 It has its own policy table.B、 It is configured as part of Access Policies.C、 It is configured as part ofIronPort data Security.D、 It only has global configuration.

Which two statements about queuing mechanisms are true? ()A、FIFO queuing is only appropriate for slower serial interfacesB、weighted fair queuing is the default queuing mechanism used for all but slower than E1 rate interfacesC、only one queuing mechanism type can be applied to an interfaceD、weighted fair queuing does not require the configuration of access lists to classify traffic  E、flow-based weighted fair queuing provides for queues to be serviced in a round-robin fashion

The PIX Security Appliance feature set is a subset of the ASA Security Appliance feature set. Which two of these features are only supported by an ASA Security Appliance? (Choose two.)()A、 security contextsB、- transparent firewallC、 WebVPND、 Active/Active failoverE、 low latency queuingF、 AIP-SSM intrusion prevention

Which of these statements accurately identifies how Unicast Reverse Path Forwarding can be employed to prevent the use of malformed or forged IP sources addresses?()A、It is applied only on the input interface of a router.B、It is applied only on the output interface of a router.C、It can be configured either on the input or output interface of a router.D、It cannot be configured on a router interface.E、It is configured under any routing protocol process.

Which of the following is true when considering the Server load-balancing design within the E-Commerce Module of the Enterprise Campus network?()A、 Routed mode requires the ACE run OSPF or EIGRPB、 Bridged mode switches a packet between the public and the private subnets when it sees itsMAC address as the destinationC、 Two-armed mode will place the SLB inline to the servers, with different client-side and a server-side VLANsD、 One-armed mode, which uses the same VLAN for the client, the ACE, and the servers, requiresa traffic-diversion mechanism to ensure the traffic return from the server passes though the ACE

Which statement is true about the components of a queuing mechanism?()A、Each subinterface has its own hardware queue and can experience congestion just like its main interfaceB、Hardware queuing is only used if the software queues are experiencing congestion.C、Hardware queues and software queues are not used concurrently.D、The hardware queuing system always uses the FIFO queuing mechanism.

Which two statements about the Wired Equivalent Privacy (WEP) encryption mechanism are true? ()A、the two methods of authentication using the WEP encryption are open and shared keyB、the 802.11 standard defines WEP security using 128-bit keysC、WEP can provide stronger authentication through the use of LEAP, PEAP, or EAP-FASTD、WEP is a scalable encryption solution that uses static keys for authenticationE、WEP security provides only one-way authenticationF、WEPv2 offers improved encryption by replacing the RC4 encryption mechanism with the AES (symmetric block cipher) mechanism

Which security mechanism is employed only on the server-side to limit access to resources or components?()A、 authorizationB、 data integrityC、 confidentialityD、 authentication

When adding a new user and assigning a role, which user role has "read only" rights to theconfiguration and operational states? ()A、userB、read_onlyC、target_operatorD、security_operator

You are employed as a DBA in an organization. You are informed that the record of EMP_NO 1000 is missing from the SCOTT.EMP table. You are required to identify the user who deleted the record, the SQL statement that will undo the deletion, and the transaction ID of the transaction that deleted the employee record. Which feature will you use to perform the tasks?()A、 Only the Flashback TableB、 Both the Flashback Transaction Query and the Flashback Version QueryC、 Only the Flashback DropD、 Only the Flashback Version

Which two actions can be configured to allow traffic to traverse an interface when zone-based security isbeing employed?()A、PassB、FlowC、AllowD、Inspect

You need to configure port security on switch R1.  Which two statements are true about this  technology? ()A、 Port security can be configured for ports supporting VoIP.B、 With port security configured, four MAC addresses are allowed by default.C、 The network administrator must manually enter the MAC address for each device in order for  the switch to allow connectivity.D、Withsecurity configured, only one MAC addresses is allowed by default.  E、 Port security cannot be configured for ports supporting VoIP.

An administrator needs to update the anti-virus, security patches, BIOS, and the web server software on a production system. Which of the following is the BEST method to accomplish this?()A、Update anti-virus, security patches, BIOS software, and then the web software.B、Update the web software, security patches, anti-virus, and then the BIOS.C、Update security patches, BIOS, web software, and then the anti-virus.D、The order does not matter, only one change at a time should be done.

Which security mechanism can be directed through the  element in a web deployment descriptor()?A、 authorizationB、 data integrityC、 confidentialityD、 authentication

You need to design a security strategy for the DHCP servers in the Seattle office. Which two actions should you perform?()A、Disable all unnecessary services on each DHCP serverB、Modify the discretionary access control lists (DACLs) in Active Directory so that only members of the Enterprise Admins security group can authorize additional DHCP serversC、Use an IPSec policy that allows only the packets necessary for DHCP and domain membership for each DHCP serverD、Install a digital certificate for SSL on each DHCP server

单选题Which the security mechanism uses the concept of a realm?()A authorizationB data integrityC confidentialityD authentication

单选题You are employed as a DBA in an organization. You are informed that the record of EMP_NO 1000 is missing from the SCOTT.EMP table. You are required to identify the user who deleted the record, the SQL statement that will undo the deletion, and the transaction ID of the transaction that deleted the employee record. Which feature will you use to perform the tasks?()A Only the Flashback TableB Both the Flashback Transaction Query and the Flashback Version QueryC Only the Flashback DropD Only the Flashback Version

单选题Which statement is true about the components of a queuing mechanism?()AEach subinterface has its own hardware queue and can experience congestion just like its main interfaceBHardware queuing is only used if the software queues are experiencing congestion.CHardware queues and software queues are not used concurrently.DThe hardware queuing system always uses the FIFO queuing mechanism.

单选题Which of the following is true when considering the Server load-balancing design within the E-Commerce Module of the Enterprise Campus network?()A Routed mode requires the ACE run OSPF or EIGRPB Bridged mode switches a packet between the public and the private subnets when it sees itsMAC address as the destinationC Two-armed mode will place the SLB inline to the servers, with different client-side and a server-side VLANsD One-armed mode, which uses the same VLAN for the client, the ACE, and the servers, requiresa traffic-diversion mechanism to ensure the traffic return from the server passes though the ACE

多选题The PIX Security Appliance feature set is a subset of the ASA Security Appliance feature set. Which two of these features are only supported by an ASA Security Appliance? (Choose two.)()Asecurity contextsB- transparent firewallCWebVPNDActive/Active failoverElow latency queuingFAIP-SSM intrusion prevention

多选题Which two statements about queuing mechanisms are true? ()AFIFO queuing is only appropriate for slower serial interfacesBweighted fair queuing is the default queuing mechanism used for all but slower than E1 rate interfacesConly one queuing mechanism type can be applied to an interfaceDweighted fair queuing does not require the configuration of access lists to classify trafficEflow-based weighted fair queuing provides for queues to be serviced in a round-robin fashion

单选题Which security mechanism can be directed through the  element in a web deployment descriptor()?A authorizationB data integrityC confidentialityD authentication

单选题Which security mechanism is employed only on the server-side to limit access to resources or components?()A authorizationB data integrityC confidentialityD authentication

单选题Which security mechanism uses the concept of a realm?()AAuthorizationBData integrityCConfidentialityDAuthentication

单选题Which of these statements accurately identifies how Unicast Reverse Path Forwarding can be employed to prevent the use of malformed or forged IP sources addresses?()AIt is applied only on the input interface of a router.BIt is applied only on the output interface of a router.CIt can be configured either on the input or output interface of a router.DIt cannot be configured on a router interface.EIt is configured under any routing protocol process.