单选题In AsyncOS 7.0 for web the choice of Authentication Surrogate is?()A A global settingB Defined separately for each Access PolicyC Defined separately for each IdentityD Defined separately for each malware engine
单选题
In AsyncOS 7.0 for web the choice of Authentication Surrogate is?()
A
A global setting
B
Defined separately for each Access Policy
C
Defined separately for each Identity
D
Defined separately for each malware engine
参考解析
解析:
暂无解析
相关考题:
A user wants to establish an FTP session to a server behind an SRX device but must authenticate to a Web page on the SRX device for additional authentication.Which type of user authentication is configured?()A. pass-throughB. WebAuthC. WebAuth with Web redirectD. pass-through with Web redirect
A user wants to establish an HTTP session to a server behind an SRX device but is being pointed to Web page on the SRX device for additional authentication.Which type of user authentication is configured?()A. pass-through with Web redirectB. WebAuth with HTTP redirectC. WebAuthD. pass-through
If a web site is blocked because it has a low web reputation score, which of the following iscontained in the un-customized End-User Notification?()A、 The authenticated users,if authentication tool place.B、 The DVS engine verdict.C、 The web reputation score.D、 The Treat Type.
Which two pieces of information are needed when declaring the web resource collection in the deployment descriptor?()A、 the URL pattern that requires authorizationB、 the HTTP methods that require authorizationC、 the users allowed access to the web resourceD、 the J2EE roles allowed access to the web resourceE、 the authentication mechanism required by the web resource
Your company has an Active Directory domain. All computers are members of the domain. Your networkcontains an internal Web site that uses Integrated Windows Authentication. From a computer that runs Windows 7, you attempt to connect to the Web site and are prompted for authentication. You verify that youruser account has permission to access the Web site. You need to ensure that you are automaticallyauthenticated when you connect to the Web site. What should you do?()A、Create a complex password for your user account.B、Open Credential Manager and modify your credentials.C、Add the URL of the Web site to the Trusted sites zone.D、Add the URL of the Web site to the Local intranet zone.
Which the basic authentication type is optional for a J2EE 1.4 compliant web container?()A、 HTTP Basic AuthenticationB、 Form Based AuthenticationC、 HTTP Digest AuthenticationD、 HTTPS Client Authentication
Which two statements are true regarding firewall user authentication?() (Choose two.)A、When configured for pass-through firewall user authentication, the user must first open a connection to the Junos security remote network resource.B、When configured for Web firewall user authentication only, the user must first open a connection to the Junos security remote network resource.C、If a Junos security device is configured for pass-through firewall user authentication, new sessions are automatically intercepted .D、If a Junos security device is configured for Web firewall user authentication, new sessions are automatically intercepted.
Which two are true about authentication?()A、Form-based logins should NOT be used with HTTPS.B、When using Basic Authentication the target server is NOT authenticated.C、J2EE compliant web containers are NOT required to support the HTTPS protocol.D、Web containers are required to support unauthenticated access to unprotected web resources.
In AsyncOS 7.0 for web the choice of Authentication Surrogate is?()A、 A global settingB、 Defined separately for each Access PolicyC、 Defined separately for each IdentityD、 Defined separately for each malware engine
Which security mechanism can be directed through the element in a web deployment descriptor()?A、 authorizationB、 data integrityC、 confidentialityD、 authentication
Which two security mechanisms can be directed through a sub-element of the element in a web application deployment descriptor?()A、AuthorizationB、Data integrityC、ConfidentialityD、Authentication
Which two statements are true regarding firewall user authentication?()A、When configured for pass-through firewall user authentication, the user must first open a connection to the JUNOS security platform before connecting to a remote network resource.B、When configured for Web firewall user authentication only, the user must first open a connection to the JUNOS security platform before connecting to a remote network resource.C、If a JUNOS security device is configured for pass-through firewall user authentication, new sessions are automatically intercepted to perform authentication.D、If a JUNOS security device is configured for Web firewall user authentication, new sessions are automatically intercepted to perform authentication.
You need to design an access control solution for customer information. Your solution must meet security requirements.What should you do?()A、Configure the Web site to require SSL connections. Configure the Web site to require client certificates. Enable and configure client certificate mapping on the Web siteB、Configure the Web site to require SSL connections. Disable anonymous access to the Web site.Assign the Allow – Read permission to the customer user accounts for the folder that contains the Web site filesC、Configure the Web site to use only Microsoft .NET Passport authentication. Specify the den.corp.woodgrovebank.com domain as the default domain for .NET Passport authentication.Configure a custom local IPSec policy on the Web servers to require IPSec communicationsD、Configure the Web site to use only Windows Integrated authentication. Configure a custom local IPSec policy on the Web servers to require IPSec communications. Configure the IPSec policy to use certificate-based authentication and encryption
You have an Exchange Server 2010 organization.You need to prevent users from changing their password by using Outlook Web App (OWA).What should you do?()A、Create a Group Policy Object.B、Create an Outlook Web App Mailbox policy.C、Modify the authentication settings of the OWA virtual directory.D、Modify the authentication settings of the IISADMPWD virtual directory.
You are an IIS Web server administrator implementing authentication settings for a new Web site.According to the requirements for the Human Resources Web site, users should be prompted forauthentication information when they attempt to access the site. The site will be accessed only by userswho have accounts in your organization’s Active Directory domain. You have already configured the filesystem permissions for the content based on the appropriate settings. You also want to maximize securityof the site. Which two actions should you take to meet these requirements?()A、Enable Windows authentication.B、Enable basic authentication.C、Disable anonymous authentication.D、Enable anonymous authentication.
多选题Which two pieces of information are needed when declaring the web resource collection in the deployment descriptor?()Athe URL pattern that requires authorizationBthe HTTP methods that require authorizationCthe users allowed access to the web resourceDthe J2EE roles allowed access to the web resourceEthe authentication mechanism required by the web resource
单选题You need to implement an authentication method on SQL4. The TravelOnline database will be accessed through a Web services application. You need to make the authentication method as secure as possible.What should you do?()ACreate an HTTP endpoint with NTLM authentication, and create a service principal name (SPN).BCreate an HTTP endpoint with digest authentication, and create a service principal name (SPN).CCreate an HTTP endpoint with integrated authentication, and create a service principal name (SPN).DCreate an HTTP endpoint with Kerberos authentication.
多选题You manage a server that runs Windows Server 2008. The server has the Web Server (IIS) role installed. The server hosts an Internet-accessible Web site that has a virtual directory named /orders/. A Web server certificate is installed and an SSL listener has been configured for the Web site. The /orders/ virtual directory must meet the following company policy requirements: Be accessible to authenticated users only. Allow authentication types to support all browsers. Encrypt all authentication traffic by using HTTPS. All other directories of the Web site must be accessible to anonymous users and be available withoutSSL. You need to configure the /orders/ virtual directory to meet the company policy requirements. Which two actions should you perform?()AConfigure the Web site to the Require SSL setting.BConfigure the /orders/ virtual directory to the Require SSL setting.CConfigure the Digest Authentication setting to Enabled for the /orders/ virtual directory.DConfigure the Basic Authentication setting to Enabled and the Anonymous Authentication setting to Disabled for the Web site.EConfigure the Basic Authentication setting to Enabled and the Anonymous Authentication setting to Disabled for the /orders/ virtual directory.
单选题You are developing a Web application. Your code restricts access to some pages based on the users credentials. You need to configure IIS to supply the user's Windows credentials to your Web application. These credentials must be encrypted. What should you do? ()AEnable Anonymous access. Enable Integrated Windows authentication.BEnable Anonymous access. Enable Basic authentication.CDisable Anonymous access. Enable Integrated Windows authentication.DDisable Anonymous access. Enable Basic authentication.
单选题Which security mechanism can be directed through the element in a web deployment descriptor()?A authorizationB data integrityC confidentialityD authentication
单选题You manage a server that runs Windows Server 2008. The server has the Web Server (IIS) role installed. The Web developer at your company creates a new Web site that runs an ASP.NET 3.0 Web application. The ASP.NET Web application must run under a security context that is separate from any other ASP.NET application on the Web server. You create a local user account and grant account rights and permissions to run the ASP.NET Web application. You need to configure authentication for the new Web site to support the Web application. What should you do?()AConfigure the Windows Authentication setting to Enabled.BConfigure the Forms Authentication setting to Enabled by using all the default settings.CConfigure the ASP.NET State service to log on to the new local user account by using the Services console.DConfigure the ASP.NET Impersonation setting to Enabled. Edit the ASP.NET Impersonation setting by specifying the new local user account.
多选题Which two statements are true regarding firewall user authentication?()AWhen configured for pass-through firewall user authentication, the user must first open a connection to the JUNOS security platform before connecting to a remote network resource.BWhen configured for Web firewall user authentication only, the user must first open a connection to the JUNOS security platform before connecting to a remote network resource.CIf a JUNOS security device is configured for pass-through firewall user authentication, new sessions are automatically intercepted to perform authentication.DIf a JUNOS security device is configured for Web firewall user authentication, new sessions are automatically intercepted to perform authentication.
多选题Which two statements are true regarding firewall user authentication?() (Choose two.)AWhen configured for pass-through firewall user authentication, the user must first open a connection to the Junos security remote network resource.BWhen configured for Web firewall user authentication only, the user must first open a connection to the Junos security remote network resource.CIf a Junos security device is configured for pass-through firewall user authentication, new sessions are automatically intercepted .DIf a Junos security device is configured for Web firewall user authentication, new sessions are automatically intercepted.
单选题A user wants to establish an HTTP session to a server behind an SRX device but is being pointed to Web page on the SRX device for additional authentication.Which type of user authentication is configured?()Apass-through with Web redirectBWebAuth with HTTP redirectCWebAuthDpass-through
单选题A user wants to establish an FTP session to a server behind an SRX device but must authenticate to a Web page on the SRX device for additional authentication.Which type of user authentication is configured?()Apass-throughBWebAuthCWebAuth with Web redirectDpass-through with Web redirect
多选题Which two are true about authentication?()AForm-based logins should NOT be used with HTTPS.BWhen using Basic Authentication the target server is NOT authenticated.CJ2EE compliant web containers are NOT required to support the HTTPS protocol.DWeb containers are required to support unauthenticated access to unprotected web resources.
单选题Which the basic authentication type is optional for a J2EE 1.4 compliant web container?()A HTTP Basic AuthenticationB Form Based AuthenticationC HTTP Digest AuthenticationD HTTPS Client Authentication