单选题Which security mechanism can be directed through the element in a web deployment descriptor()?A authorizationB data integrityC confidentialityD authentication
单选题
Which security mechanism can be directed through the element in a web deployment descriptor()?
A
authorization
B
data integrity
C
confidentiality
D
authentication
参考解析
解析:
暂无解析
相关考题:
Which statement describes a security zone?() A. A security zone can contain one or more interfaces.B. A security zone can contain interfaces in multiple routing instances.C. A security zone must contain two or more interfaces.D. A security zone must contain bridge groups.
Which of the following security threats are MOST likely prevented through user training?() A. Network IntrusionB. Adware PopupsC. Social EngineeringD. Spam Messages
assuming the default switch configuration which vlan range can be added modified and removed on a cisco switch?() A.2 through 1001B.1 through 1001C.1 through 1002D.2 through 1005
Which of the following is NOT true of security attacks?[A] Employees will keep up with security polices and awareness if they are highly-trained.[B] The rate of security attacks appears faster than the growth of the Internet.[C] One's computer system will never be secure.[D] Vulnerabilities can go through phones, wireless devices, and network appliances
Which Cisco security tool can best determine it a Cisco ISR router is properly secured? ()A、 Cisco SDM Security AuditB、 Cisco Security MARSC、 Cisco Security Agent MCD、 Cisco Security IntelliShieldE、 CAN
Which two statements about the Wired Equivalent Privacy (WEP) encryption mechanism are true? ()A、the two methods of authentication using the WEP encryption are open and shared keyB、the 802.11 standard defines WEP security using 128-bit keysC、WEP can provide stronger authentication through the use of LEAP, PEAP, or EAP-FASTD、WEP is a scalable encryption solution that uses static keys for authenticationE、WEP security provides only one-way authenticationF、WEPv2 offers improved encryption by replacing the RC4 encryption mechanism with the AES (symmetric block cipher) mechanism
Which security mechanism is employed only on the server-side to limit access to resources or components?()A、 authorizationB、 data integrityC、 confidentialityD、 authentication
assuming the default switch configuration which vlan range can be added modified and removed on a cisco switch?()A、2 through 1001B、1 through 1001C、1 through 1002D、2 through 1005
Which two protocols can have their headers compressed through MQC?()A、RTPB、RTSPC、HTTPD、TCPE、UDP
Which QoS mechanism can help classify different kinds of Citrix traffic print job versus real-time terminalcontrol?()A、qos-groupB、DSCPC、LFID、NBAR
assuming the default switch configuration which vlan range can be added modified and removed on a ciscoswitch?()A、2 through 1001B、1 through 1001C、1 through 1002D、2 through 1005
Which of the following printer failure symptoms can be described as a condition where the internal feed mechanism has stopped working temporarily?()A、Power cycleB、Paper jamC、No connectivityD、Corrupt printer driver
Which of the following security threats are MOST likely prevented through user training?()A、Network IntrusionB、Adware PopupsC、Social EngineeringD、Spam Messages
Which of the following is a storage system that can be connected to multiple servers through an iSCSI connection?()A、JBODB、DASC、NASD、SAN
Which security mechanism can be directed through the element in a web deployment descriptor()?A、 authorizationB、 data integrityC、 confidentialityD、 authentication
Which two security mechanisms can be directed through a sub-element of the element in a web application deployment descriptor?()A、AuthorizationB、Data integrityC、ConfidentialityD、Authentication
Regarding zone types, which statement is true?()A、You cannot assign an interface to a functional zone.B、You can specifiy a functional zone in a security policy.C、Security zones must have a scheduler applied.D、You can use a security zone for traffic destined for the device itself.
单选题Which the security mechanism uses the concept of a realm?()A authorizationB data integrityC confidentialityD authentication
单选题Which statement describes a security zone?()AA security zone can contain one or more interfaces.BA security zone can contain interfaces in multiple routing instances.CA security zone must contain two or more interfaces.DA security zone must contain bridge groups.
多选题The Cisco ASA Security Appliance can offer benefit of integrating which three security services into one device?()AIPSBVPN ConcentratorCACS serverDPIX firewallECSA MCFDDoS Anomaly Guard and Detector
单选题Which statement about firefighting foam is TRUE?()AFoam conducts electricityBTo be most effective,foam should be directed at the base of the fireCFoam is most effective on burning liquids which are flowingDFoam can ONLY be used to extinguish class A fires
单选题Which security mechanism is employed only on the server-side to limit access to resources or components?()A authorizationB data integrityC confidentialityD authentication
单选题Which security mechanism uses the concept of a realm?()AAuthorizationBData integrityCConfidentialityDAuthentication
多选题Which two network attack statements are true?()AAccess attacks can consist of password attacks,trust exploitation,port redirection,and man-in-the-middle attacks.BAccess attacks can consist of UDP and TCP SYN flooding,ICMP echo-request floods,and ICMP directed broadcasts.CDoS attacks can be reduced through the use of access control configuration,encryption,and RFC 2827 filtering.DDoS attacks can consist of IP spoofing and DDoS attacks.EIP spoofing can be reduced through the use of policy-based routing.FIP spoofing exploits known vulnerabilities in authentication services, FTP services,and web services to gain entry to web accounts,confidential databases,and other sensitive information.
多选题Which two commands can be used to monitor firewall user authentication?()Ashow access firewall-authenticationBshow security firewall-authentication usersCshow security audit logDshow security firewall-authentication history
单选题Which Cisco security tool can best determine it a Cisco ISR router is properly secured? ()A Cisco SDM Security AuditB Cisco Security MARSC Cisco Security Agent MCD Cisco Security IntelliShieldE CAN