单选题Which security mechanism can be directed through the  element in a web deployment descriptor()?A authorizationB data integrityC confidentialityD authentication

单选题
Which security mechanism can be directed through the  element in a web deployment descriptor()?
A

 authorization

B

 data integrity

C

 confidentiality

D

 authentication


参考解析

解析: 暂无解析

相关考题:

Which statement describes a security zone?() A. A security zone can contain one or more interfaces.B. A security zone can contain interfaces in multiple routing instances.C. A security zone must contain two or more interfaces.D. A security zone must contain bridge groups.

Which of the following security threats are MOST likely prevented through user training?() A. Network IntrusionB. Adware PopupsC. Social EngineeringD. Spam Messages

assuming the default switch configuration which vlan range can be added modified and removed on a cisco switch?() A.2 through 1001B.1 through 1001C.1 through 1002D.2 through 1005

Which of the following is NOT true of security attacks?[A] Employees will keep up with security polices and awareness if they are highly-trained.[B] The rate of security attacks appears faster than the growth of the Internet.[C] One's computer system will never be secure.[D] Vulnerabilities can go through phones, wireless devices, and network appliances

Which Cisco security tool can best determine it a Cisco ISR router is properly secured? ()A、 Cisco SDM Security AuditB、 Cisco Security MARSC、 Cisco Security Agent MCD、 Cisco Security IntelliShieldE、 CAN

Which two statements about the Wired Equivalent Privacy (WEP) encryption mechanism are true? ()A、the two methods of authentication using the WEP encryption are open and shared keyB、the 802.11 standard defines WEP security using 128-bit keysC、WEP can provide stronger authentication through the use of LEAP, PEAP, or EAP-FASTD、WEP is a scalable encryption solution that uses static keys for authenticationE、WEP security provides only one-way authenticationF、WEPv2 offers improved encryption by replacing the RC4 encryption mechanism with the AES (symmetric block cipher) mechanism

Which security mechanism is employed only on the server-side to limit access to resources or components?()A、 authorizationB、 data integrityC、 confidentialityD、 authentication

assuming the default switch configuration which vlan range can be added modified and removed on a cisco switch?()A、2 through 1001B、1 through 1001C、1 through 1002D、2 through 1005

Which two protocols can have their headers compressed through MQC?()A、RTPB、RTSPC、HTTPD、TCPE、UDP

Which QoS mechanism can help classify different kinds of Citrix traffic print job versus real-time terminalcontrol?()A、qos-groupB、DSCPC、LFID、NBAR

assuming the default switch configuration which vlan range can be added modified and removed on a ciscoswitch?()A、2 through 1001B、1 through 1001C、1  through 1002D、2 through 1005

Which of the following printer failure symptoms can be described as a condition where the internal feed mechanism has stopped working temporarily?()A、Power cycleB、Paper jamC、No connectivityD、Corrupt printer driver

Which of the following security threats are MOST likely prevented through user training?()A、Network IntrusionB、Adware PopupsC、Social EngineeringD、Spam Messages

Which of the following is a storage system that can be connected to multiple servers through an iSCSI connection?()A、JBODB、DASC、NASD、SAN

Which security mechanism can be directed through the  element in a web deployment descriptor()?A、 authorizationB、 data integrityC、 confidentialityD、 authentication

Which two security mechanisms can be directed through a sub-element of the element in a web application deployment descriptor?()A、AuthorizationB、Data integrityC、ConfidentialityD、Authentication

Regarding zone types, which statement is true?()A、You cannot assign an interface to a functional zone.B、You can specifiy a functional zone in a security policy.C、Security zones must have a scheduler applied.D、You can use a security zone for traffic destined for the device itself.

单选题Which the security mechanism uses the concept of a realm?()A authorizationB data integrityC confidentialityD authentication

单选题Which statement describes a security zone?()AA security zone can contain one or more interfaces.BA security zone can contain interfaces in multiple routing instances.CA security zone must contain two or more interfaces.DA security zone must contain bridge groups.

多选题The Cisco ASA Security Appliance can offer benefit of integrating which three security services into one device?()AIPSBVPN ConcentratorCACS serverDPIX firewallECSA MCFDDoS Anomaly Guard and Detector

单选题Which statement about firefighting foam is TRUE?()AFoam conducts electricityBTo be most effective,foam should be directed at the base of the fireCFoam is most effective on burning liquids which are flowingDFoam can ONLY be used to extinguish class A fires

单选题Which security mechanism can be directed through the  element in a web deployment descriptor()?A authorizationB data integrityC confidentialityD authentication

单选题Which security mechanism is employed only on the server-side to limit access to resources or components?()A authorizationB data integrityC confidentialityD authentication

单选题Which security mechanism uses the concept of a realm?()AAuthorizationBData integrityCConfidentialityDAuthentication

多选题Which two protocols can have their headers compressed through MQC?()ARTPBRTSPCHTTPDTCPEUDP

多选题Which two network attack statements are true?()AAccess attacks can consist of password attacks,trust exploitation,port redirection,and man-in-the-middle attacks.BAccess attacks can consist of UDP and TCP SYN flooding,ICMP echo-request floods,and ICMP directed broadcasts.CDoS attacks can be reduced through the use of access control configuration,encryption,and RFC 2827 filtering.DDoS attacks can consist of IP spoofing and DDoS attacks.EIP spoofing can be reduced through the use of policy-based routing.FIP spoofing exploits known vulnerabilities in authentication services, FTP services,and web services to gain entry to web accounts,confidential databases,and other sensitive information.

多选题Which two commands can be used to monitor firewall user authentication?()Ashow access firewall-authenticationBshow security firewall-authentication usersCshow security audit logDshow security firewall-authentication history

单选题Which Cisco security tool can best determine it a Cisco ISR router is properly secured? ()A Cisco SDM Security AuditB Cisco Security MARSC Cisco Security Agent MCD Cisco Security IntelliShieldE CAN