多选题Given the two security constraints in a deployment descriptor: 101. 102. 103.SALES 104.SALES 105. 106. 107. 108. 109. 110. If the two security constraints have the same url-pattern and http-method which two inserted independentlyat line 109,will allow users with role names of either SALES or MARKETING to access this resource?()Aauth-constraint/Bauth-constraintrole-name*/role-name/auth-constraintCauth-constraintrole-nameANY/role-name/auth-constraintDauth-constraintrole-nameMARKETING/role-name/auth-constraint
多选题
Given the two security constraints in a deployment descriptor: 101. 102. 103.SALES 104.SALES 105. 106. 107. 108. 109. 110. If the two security constraints have the same url-pattern and http-method which two inserted independentlyat line 109,will allow users with role names of either SALES or MARKETING to access this resource?()
A
<auth-constraint/>
B
<auth-constraint><role-name>*</role-name></auth-constraint>
C
<auth-constraint><role-name>ANY</role-name></auth-constraint>
D
<auth-constraint><role-name>MARKETING</role-name></auth-constraint>
参考解析
解析:
暂无解析
相关考题:
At which two levels of the Junos CLI hierarchy is the host-inbound-traffic command configured? ()(Choose two.) A. [edit security idp]B. [edit security zones security-zone trust interfaces ge-0/0/0.0]C. [edit security zones security-zone trust]D. [edit security screen]
The PIX Security Appliance feature set is a subset of the ASA Security Appliance feature set. Which two of these features are only supported by an ASA Security Appliance? (Choose two.)()A、 security contextsB、- transparent firewallC、 WebVPND、 Active/Active failoverE、 low latency queuingF、 AIP-SSM intrusion prevention
Which two are valid values for the element inside a element of a web application deployment descriptor?()A、 NULLB、 SECUREC、 INTEGRALD、 ENCRYPTEDE、 CONFIDENTIAL
Which two statements are true about the security-related tags in a valid Java EE deployment descriptor?()A、Every tag must have at least one tag.B、A tag can have many tags.C、A given tag can apply to only one tag.D、A given tag can contain from zero to many tags.E、It is possible to construct a valid tag such that,for a given resource,no user rolescan access that resource.
Given the two security constraints in a deployment descriptor: 101. 102. 103.SALES 104.SALES 105. 106. 107. 108. 109. 110. If the two security constraints have the same url-pattern and http-method which two inserted independentlyat line 109,will allow users with role names of either SALES or MARKETING to access this resource?()A、auth-constraint/B、auth-constraintrole-name*/role-name/auth-constraintC、auth-constraintrole-nameANY/role-name/auth-constraintD、auth-constraintrole-nameMARKETING/role-name/auth-constraint
Which two security mechanisms can be directed through a sub-element of the element in a web application deployment descriptor?()A、AuthorizationB、Data integrityC、ConfidentialityD、Authentication
Which two are valid values for the element inside a element ofa web application deployment descriptor?()A、NULLB、SECUREC、INTEGRALD、ENCRYPTEDE、CONFIDENTIAL
At which two levels of the Junos CLI hierarchy is the host-inbound-traffic command configured? ()(Choose two.)A、[edit security idp]B、[edit security zones security-zone trust interfaces ge-0/0/0.0]C、[edit security zones security-zone trust]D、[edit security screen]
Which two parameters are configured in IPsec policy? ()(Choose two.)A、modeB、IKE gatewayC、security proposalD、Perfect Forward Secrecy
For which two constraints does the Oracle Server implicitly create a unique index?()A、NOT NULLB、PRIMARY KEYC、FOREIGN KEYD、CHECKE、UNIQUE
Which two statements about creating constraints are true? ()A、Constraint names must start with SYS_CB、All constraints must be defines at the column levelC、Constraints can be created after the table is createdD、Constraints can be created at the same time the table is createdE、Information about constraints is found in the VIEW_CONSTRAINTS dictionary view
Which two statements about creating constraints are true?()A、Constraint names must start with SYS_CB、All constraints must be defines at the column level.C、Constraints can be created after the table is created.D、Constraints can be created at the same time the table is created.E、Information about constraints is found in the VIEW_CONSTRAINTS dictionary view.
多选题Which two are components of the enhanced services software architecture?() (Choose two.)ALinux kernelBrouting protocol daemonCsession-based forwarding moduleDseparate routing and security planes
多选题Which two security mechanisms can be directed through a sub-element of the element in a web application deployment descriptor?()AAuthorizationBData integrityCConfidentialityDAuthentication
多选题Given the two security constraints in a deployment descriptor: 101. 102. 103.SALES 104.SALES 105. 106. 107. 108. 109. 110. If the two security constraints have the same url-pattern and http-method which two inserted independentlyat line 109,will allow users with role names of either SALES or MARKETING to access this resource?()Aauth-constraint/Bauth-constraintrole-name*/role-name/auth-constraintCauth-constraintrole-nameANY/role-name/auth-constraintDauth-constraintrole-nameMARKETING/role-name/auth-constraint
多选题Which two statements are true about the security-related tags in a valid Java EE deployment descriptor?()AEvery tag must have at least one tag.BA tag can have many tags.CA given tag can apply to only one tag.DA given tag can contain from zero to many tags.EIt is possible to construct a valid tag such that,for a given resource,no user rolescan access that resource.
多选题Which two are valid values for the element inside a element ofa web application deployment descriptor?()ANULLBSECURECINTEGRALDENCRYPTEDECONFIDENTIAL
多选题Which two statements regarding firewall user authentication client groups are true?() (Choose two.)AA client group is a list of clients associated with a group.BA client group is a list of groups associated with a client.CClient groups are referenced in security policy in the same manner in which individual clients are referenced.DClient groups are used to simplify configuration by enabling firewall user authentication without security policy.
多选题Given the security constraint in a DD:// 101. 102. 103.Foo 104./Bar/Baz/* 105.POST 106. 107. 108.DEVELOPER 109. 110. And given that "MANAGER" is a valid role-name,which four are true for this security constraint?()AMANAGER can do a GET on resources in the /Bar/Baz directory.BMANAGER can do a POST on any resource in the /Bar/Baz directory.CMANAGER can do a TRACE on any resource in the /Bar/Baz directory.DDEVELOPER can do a GET on resources in the /Bar/Baz directory.EDEVELOPER can do only a POST on resources in the /Bar/Baz directory.FDEVELOPER can do a TRACE on any resource in the /Bar/Baz directory.
多选题At which two levels of the Junos CLI hierarchy is the host-inbound-traffic command configured? ()(Choose two.)A[edit security idp]B[edit security zones security-zone trust interfaces ge-0/0/0.0]C[edit security zones security-zone trust]D[edit security screen]
多选题Which two statements about creating constraints are true?()AConstraint names must start with SYS_CBAll constraints must be defines at the column levelCConstraints can be created after the table is createdDConstraints can be created at the same time the table is createdEInformation about constraints is found in the VIEW_CONSTRAINTS dictionary view
多选题Which two statements about creating constraints are true?()AConstraint names must start with SYS_CBAll constraints must be defines at the column level.CConstraints can be created after the table is created.DConstraints can be created at the same time the table is created.EInformation about constraints is found in the VIEW_CONSTRAINTS dictionary view.
多选题Which two are valid values for the element inside a element of a web application deployment descriptor?()ANULLBSECURECINTEGRALDENCRYPTEDECONFIDENTIAL
多选题Which two security mechanisms protect the response stream?()AauthorizationBdata integrityCconfidentialityDauthentication
多选题For which two constraints does the Oracle Server implicitly create a unique index? ()ANOT NULLBPRIMARY KEYCFOREIGN KEYDCHECKEUNIQUE
多选题The PIX Security Appliance feature set is a subset of the ASA Security Appliance feature set. Which two of these features are only supported by an ASA Security Appliance? (Choose two.)()Asecurity contextsB- transparent firewallCWebVPNDActive/Active failoverElow latency queuingFAIP-SSM intrusion prevention