单选题Which security token may carry user attribute information as part of the defined token format?()AKerberosBRACF TokenCSAML AssertionDUsername Token
单选题
Which security token may carry user attribute information as part of the defined token format?()
A
Kerberos
B
RACF Token
C
SAML Assertion
D
Username Token
参考解析
解析:
暂无解析
相关考题:
You are developing a Windows Communication Foundation (WCF) service. The service operation takes a customer number as the only argument and returns information about the customer. The service requires a security token in the header of the message. You need to create a message contract for the service.Which code segment should you use?()A.B.C.D.
How should we go through the security check?A.you should wait one by oneB.show your certificate onlyC.put your carry _on baggage on the belt ,which will take it to be sereen bay X-ray equipmentD.you should go through the gate and the staff may give you a personal search
What information does the Junos Pulse Access Control Service provide to Security Threat Response Manager (STRM)?() A. Session lengthB. User browser informationC. Session IP addressD. User identity information
A user receives an email slating that their account was compromised and there is a need to verifyaccount credentials by submitting the correct information on a website.Which of the following security threats is occurring?()A. PhishingB. Smurf attackC. Denial of serviceD. Man-in-the-middle
In the fields of physical security and information security,access control is the selective restriction of access to a place or other resource.The act of accessing may mean consuming,entering,or using.Permission to access a resource is called authorization(授权).An access control mechanism(71)between a user(or a process executing on behalf of a user)and system resources,such as applications,operating systems,firewalls,routers,files,and databases.The system must first authenticate(验证)a user seeking access.Typically the authentication function determines whether the user is(72)to access the system at all.Then the access control function determines if the specific requested access by this user is permitted.A security administrator maintains an authorization database that specifies what type of access to which resources is allowed for this user.The access control function consults this database to determine whether to(73)access.An auditing function monitors and keeps a record of user accesses to system resources.In practice,a number of(74)may cooperatively share the access control function.All operating systems have at least a rudimentary(基本的),and in many cases a quite robust,access control component.Add-on security packages can add to the(75)access control capabilities of the OS.Particular applications or utilities,such as a database management system,also incorporate access control functions.External devices,such as firewalls,can also provide access control services.A.cooperatesB.coordinatesC.connectsD.mediates
You are enabling AAA RADIUS/TACACS+ on a UCS which attribute must be added to the User account?()A、Encryption algorithmB、Shared Secret KeyC、Security policyD、CiscoAvPair
You are developing a Windows Communication Foundation (WCF) service. One of the parameters used with the service operations is a security token. The security token is not sensitive. The monitoring software tracks security tokens and can read tokens in clear text only.The company security policy requires that you validate all clear text data passed over the corporate network.You need to ensure that the service verifies that the security token is not changed during transit. What should you do?()A、For all the security-sensitive members, set the ProtectionLevel parameter of the MessageBodyMember or MessageHeader attribute to EncryptAndSign.B、Implement IEndpointldentityProvider in the message contract class.C、Implement ISecureConversationSession in the message contract class.D、For all the security-sensitive members, set the ProtectionLevel parameter of the MessageBodyMember or MessageHeader attribute to Sign.
A user receives an email slating that their account was compromised and there is a need to verify account credentials by submitting the correct information on a website. Which of the following security threats is occurring?()A、PhishingB、Smurf attackC、Denial of serviceD、Man-in-the-middle
Which of the following is the MOST secure method to authenticate users?()A、User ID, a strong password, and a fingerprint scannerB、User ID, a strong password, and a token based deviceC、User ID and two levels of strong password requirementsD、User ID, a strong password, and a smart card
A user received an email from their bank asking them to login and verify their personal information.The user complies and fills in the requested information. Days later the user notices their checking account is empty. This is a result of which of the following?()A、SpamB、PhishingC、AdwareD、A Trojan
An administrator was asked to log information on possible security breaches on a server. To which file should additional entries be added to capture this information()A、/var/adm/sulogB、/etc/syslog.confC、/etc/security/sysck.cfgD、/etc/security/syslog.conf
Which of the following options indicates why it is important to talk to the user and ask appropriate questions about a software problem? ()A、Software problems don't generate errors. B、The user is more knowledgeable about software. C、The system logs will provide useful information alone. D、Key information pertaining to the software may be uncovered.
Which security token may carry user attribute information as part of the defined token format?()A、KerberosB、RACF TokenC、SAML AssertionD、Username Token
The root id is set so that direct login is disabled. Information must be reviewed relating to when root access was obtained. In which of the following files is this information located?()A、 /var/adm/sulog B、 /var/adm/wtmp C、 /etc/security/user D、 /etc/security/failedlogin
A system administrator was asked to log information on possible security breaches on a server. Which file should additional entries be added to capture this information?()A、/var/adm/sulogB、/etc/syslog.confC、/etc/security/sysck.cfgD、/etc/security/login.cfg
What information does the Junos Pulse Access Control Service provide to Security Threat Response Manager (STRM)?()A、Session lengthB、User browser informationC、Session IP addressD、User identity information
You need to recommend a solution for managing the address information of the user accounts. The solution must meet the company’s security requirements. What should you include in the recommendation?()A、Active Directory delegationB、Authorization ManagerC、built-in security groupsD、user rights assignments
Your network contains an Active Directory forest. The forest schema contains a custom attribute for user objects. You need to modify the custom attribute value of 500 user accounts. Which tool should you use()A、CsvdeB、DsmodC、DsrmD、Ldifde
Your company’s security policy requires complex passwords. You have a comma delimited file named import.csv that contains user account information. You need to create user accounts in the domain by using the import.csv file. You also need to ensure that the new user accounts are set to use default passwords and are disabled. What should you do()A、Modify the userAccountControl attribute to disabled. Run the csvde -i -k -f import.csv command. Run the DSMOD utilityB、Modify the userAccountControl attribute to accounts disabled. Run the csvde -f import.csv command. Run the DSMOD utilityC、Modify the userAccountControl attribute to disabled. Run the wscript import.csv command. Run the DSADD utilityD、Modify the userAccountControl attribute to disabled. Run the ldifde -i -f import.csv command. Run the DSADD utility
单选题You are developing a Windows Communication Foundation (WCF) service. One of the parameters used with the service operations is a security token. The security token is not sensitive. The monitoring software tracks security tokens and can read tokens in clear text only.The company security policy requires that you validate all clear text data passed over the corporate network.You need to ensure that the service verifies that the security token is not changed during transit. What should you do?()AFor all the security-sensitive members, set the ProtectionLevel parameter of the MessageBodyMember or MessageHeader attribute to EncryptAndSign.BImplement IEndpointldentityProvider in the message contract class.CImplement ISecureConversationSession in the message contract class.DFor all the security-sensitive members, set the ProtectionLevel parameter of the MessageBodyMember or MessageHeader attribute to Sign.
单选题Which of the following options indicates why it is important to talk to the user and ask appropriate questions about a software problem? ()ASoftware problems don't generate errors. BThe user is more knowledgeable about software. CThe system logs will provide useful information alone. DKey information pertaining to the software may be uncovered.
单选题Which statement accurately describes firewall user authentication?()AFirewall user authentication provides another layer of security in a network.BFirewall user authentication provides a means for accessing a JUNOS Software-based security device.CFirewall user authentication enables session-based forwarding.DFirewall user authentication is used as a last resort security method in a network.
单选题An administrator was asked to log information on possible security breaches on a server. To which file should additional entries be added to capture this information()A/var/adm/sulogB/etc/syslog.confC/etc/security/sysck.cfgD/etc/security/syslog.conf
单选题A system administrator was asked to log information on possible security breaches on a server. Which file should additional entries be added to capture this information?()A/var/adm/sulogB/etc/syslog.confC/etc/security/sysck.cfgD/etc/security/login.cfg
单选题A user received an email from their bank asking them to login and verify their personal information.The user complies and fills in the requested information. Days later the user notices their checking account is empty. This is a result of which of the following?()ASpamBPhishingCAdwareDA Trojan
单选题The root id is set so that direct login is disabled. Information must be reviewed relating to when root access was obtained. In which of the following files is this information located?()A /var/adm/sulog B /var/adm/wtmp C /etc/security/user D /etc/security/failedlogin
单选题Your companys security policy requires complex passwords. You have a comma delimited file named import.csv that contains user account information. You need to create user accounts in the domain by using the import.csv file. You also need to ensure that the new user accounts are set to use default passwords and are disabled. What should you do()AModify the userAccountControl attribute to disabled. Run the csvde i k f import.csv command. Run the DSMOD utility to set default passwords for the user accounts.BModify the userAccountControl attribute to accounts disabled. Run the csvde f import.csv command. Run the DSMOD utility to set default passwords for the user accounts.CModify the userAccountControl attribute to disabled. Run the wscript import.csv command. Run the DSADD utility to set default passwords for the imported user accounts.DModify the userAccountControl attribute to disabled. Run the ldifde i f import.csv command. Run the DSADD utility to set passwords for the imported user accounts.
单选题A user receives an email slating that their account was compromised and there is a need to verify account credentials by submitting the correct information on a website. Which of the following security threats is occurring?()APhishingBSmurf attackCDenial of serviceDMan-in-the-middle