单选题The configuration of a Web Services Security management (WSSM) Partner allows for the specification of XSL mapping rules. What is the input and output of these XSL mapping rules?()AThe input to the XSL mapping rules of a WSSM Partner is the binary security token as received on the Web Service request. The output of the mapping rules is a new security token ready for use by the Web Service application. BThe input to the XSL mapping rules of a WSSM Partner is an STSUniveralUser XML document created from the security token received on the Web Service request. The output of the mapping rules is an arbitrary collection of attributes that will be made available to the Web Services application. CThe input to the XSL mapping rules of a WSSM Partner is an STSUniveralUser XML document created from the security token received on the Web Service request. The output of the mapping rules is a new STSUniversalUser XML document that represents the security token required by the application. DThe input to the XSL mapping rules of a WSSM Partner is an STSUniveralUser XML document created from the security token received on the Web Service request. The output of the mapping rules is an IBM Tivoli Access Manager for e-business credential that will be used to authorize the partner's access to the Web Service application.

单选题
The configuration of a Web Services Security management (WSSM) Partner allows for the specification of XSL mapping rules. What is the input and output of these XSL mapping rules?()
A

The input to the XSL mapping rules of a WSSM Partner is the binary security token as received on the Web Service request. The output of the mapping rules is a new security token ready for use by the Web Service application. 

B

The input to the XSL mapping rules of a WSSM Partner is an STSUniveralUser XML document created from the security token received on the Web Service request. The output of the mapping rules is an arbitrary collection of attributes that will be made available to the Web Services application. 

C

The input to the XSL mapping rules of a WSSM Partner is an STSUniveralUser XML document created from the security token received on the Web Service request. The output of the mapping rules is a new STSUniversalUser XML document that represents the security token required by the application. 

D

The input to the XSL mapping rules of a WSSM Partner is an STSUniveralUser XML document created from the security token received on the Web Service request. The output of the mapping rules is an IBM Tivoli Access Manager for e-business credential that will be used to authorize the partner's access to the Web Service application.


参考解析

解析: 暂无解析

相关考题:

What are three advantages of the Cisco Integrated Services Pouter product family? (Choose three.) ()A、 provides advanced security such as hardware encryption accelerationB、 provides investment protection through increased modularityC、 comes equipped with at least one 1000-based TX interlaceD、 contains integrated wireless access using the 802.11 g/b standardE、 contains integrated web-based management tools for easy configuration and maintenance

FCAPS is a network maintenance model defined by ISO. What does it stand for?()A、Action ManagementB、Fault ManagementC、Configuration ManagementD、Protocol ManagementE、Security Management

Which of the following management types can be used to deploy appropriate quality-of-servicesolutions to make the most efficient use of bandwidth?()A、Fault managementB、Accounting managementC、Operations managementD、Performance managementE、Security managementF、Configuration management

Choose the service component in the optimize phase which assesses the wlan system and drives continuous improvements by recommending remediation measures including device configuration optimization, capacity planning, traffic analysis, security assessment, ()and quality issue resolution.A、technology assessmentB、operations assessmentC、security assessmentD、security administrationE、change management

Your company has an Active Directory domain. All the servers in the company run either Windows Server 2008 or Windows Server 2003. A Windows Server 2003 server named WSS2 runs Microsoft SQL Server 2005 SP2 and Microsoft Windows SharePoint Services (WSS) 2.0.  The company plans to migrate to WSS 3.0 on a Windows Server 2008 server named WSS3. You need to migrate the configuration and content from WSS2 to WSS3. What should you do?()A、Back up the SharePoint configuration and content from WSS2. Install WSS 3.0 on WSS3. Restore the backup from WSS2 to WSS3.B、Upgrade WSS2 to Windows Server 2008. Back up the SharePoint configuration and content from WSS2. Install WSS 3.0 on WSS3. Restore the backup from WSS2 to WSS3.C、Back up the SQL Server 2005 configuration and the WSS 2.0 databases from WSS2. Install SQL Server 2005 on WSS3. Restore the SQL Server 2005 backup from WSS2 to WSS3.D、Back up the WSS 2.0 configuration and content from WSS2. Install WSS 2.0 on WSS3. Restore the backup from WSS2 to WSS3. Perform an in-place upgrade of WSS 2.0 to WSS 3.0 on WSS3.

What are two benefits of the Cisco 1800 Series Integrated Services Routers?()A、 fixed configuration for secure broadband, metro Ethernet, and wireless connectivityB、 configuration for security policy monitoringC、 dynamic management through self-healing processesD、 connectivity options and investment protection through support for existing Cisco 1700 SeriesWICs

Which network management solution performs configuration, monitoring, and management of Cisco Firewall, VPN router, and IPS devices as well as maintains network device inventory and software distribution features?()A、 CiscoWorks Security Device Management Center (SD/MC)B、 Security Device Manager (SDM)C、 Adaptive Security Device Manager (ASDM)D、 CiscoWorks VMS/Management Center (VMS/MC)

Which of these is a benefit of an integrated security management system?  ()A、 It provides configuration, monitoring, and troubleshooting capabilities across a wide range of security products.B、 It integrates security device management products and collects events on an "as needed" basis to reduce management overhead.C、 It integrates security management capabilities into the router or switch.D、 It provides a single point of contact for all security configuration tasks thereby enhancing the return on investment.E、 It leverages existing network management systems such as HP OpenView to lower the cost of implementation.

Which statement is true about a Dynamic Chain Selection Module instance?()A、It is the first module in the partner module chain in Web Services Security Management (WSSM).B、It is the last module in the partner module chain in WSSM.C、It is the first module in the application module chain for partner.D、It is the last module in the application module chain for the partner.

You are a systems administrator in charge of adding the Windows SharePoint Services (WSS) server roleon a computer running Windows Server 2008. You have completed the initial installation process for theserver but have not yet added any roles or features to the installation. Based on your technical requirements, you have decided to install WSS in a server farm configuration. Which of the following is nota dependency of the WSS server role?()A、Windows Internal Database role serviceB、Windows Process Activation role serviceC、Microsoft .NET Framework 3.0D、Web Server (IIS) roleE、File Server role

As a senior administrator at Cer-tech .com, you manage a server named ERA1 that runs Windows Server2008. It has the Windows SharePoint Services (WSS) role installed in a standalone mode.You also manage another server called ERA2. For a big project, you install WSS role on ERA2. You indicate duringthe installation that the ERA2 must be the member of a WSS server farm. But you are unable to connect toERA1 in the WSS server farm. What should you do to configure both ERA1 and ERA2 in the WSS serverarm?()A、reduce the Microsoft .NET Framework Trust Level to Low on both ERA1 and ERA2B、Reconfigure the Web Management Service on ERA1C、Set the Microsoft .NET Framework Trust Level to High on both ERA1 and ERA2D、Uninstall the WSS on ERA1 and select the server farm mode while reinstalling it.E、None of the above

Your company has a server that runs Windows Server 2008. The Windows SharePoint Services (WSS) role is installed on the Windows Server 2008 server. You need to configure WSS to support SMTP. What should you do?()A、Bind the SharePoint Web site to port 25.B、Uninstall and reinstall the WSS role.C、Install the SMTP Server feature by using the Server Manager console.D、Install the Application Server role by using the Server Manager console.

You work as the IT professional in an international company which is named Wiikigo. You are experiencedin implementing and administering a network operating system. You are specialized in deploying servers,configuring Windows Server 2008 Terminal services and network application services, and configuring aweb services infrastructure. There is a single Active Directory domain in your company. The domaincontains a server that runs Windows Server 2008. The server has Windows SharePoint Services (WSS)installed. Now you receive an order from the company management. According to the company requirement, you should allow users to create distribution lists from a SharePoint site. What action should you perform on the WSS server?()A、The site should be configured to use the default Rights Management server in Active Directory DomainServices.B、The outgoing mail character set should be set to 1200(Unicode).C、The SharePoint Directory Management Service should be enabled.D、The site should be configured to accept messages from authenticated users only.

You have successfully configured EchoClient and EchoApplication secured by Web Services Security Management (WSSM). You want to test that authorization is correctly being performed on the request. Which technique would allow you to do this?()A、stop all running instances of PDACLDB、log in to the EchoClient as a different IBM Tivoli Access Manager for e-business (TAMeb) userC、change the TAMeb ACL policy applying to the Web Services namespaceD、update the authorization module configuration in the Trust Service using the IBM Tivoli Federated Identity Manager Console

单选题Which of these is a benefit of an integrated security management system?  ()A It provides configuration, monitoring, and troubleshooting capabilities across a wide range of security products.B It integrates security device management products and collects events on an as needed basis to reduce management overhead.C It integrates security management capabilities into the router or switch.D It provides a single point of contact for all security configuration tasks thereby enhancing the return on investment.E It leverages existing network management systems such as HP OpenView to lower the cost of implementation.

单选题Your network contains a Terminal Services server named Server1 that runs Windows Server 2003 Service Pack 2 (SP2).  Server1 has a server certificate from a trusted authority installed. All Terminal Services clients have the RDP client version 5.2 installed. You need to ensure that all Terminal Services connections to Server1 use Transport Layer Security.  What should you do?()AIn Terminal Services Configuration, change the permissions for Remote Desktop Users to Full Control.BIn Terminal Services Configuration, change the security layer setting to Negotiate and set the encryption level to High.CIn Local Security Policy, enable Domain Member: Require strong (Windows 2000 or later) session key.DIn Local Security Policy, enable Domain Member: Digitally encrypt or sign secure channel data (always).

单选题WS-Security在SOA中起什么作用?()AWS-Security为Restful Web services的内部交换提供安全机制BWS-Security可以在SOA内部提供身份认证和授权CWS-Security为Web services提供终端到终端的安全性语境DWS-Security为企业服务总线(EBS)提供一种安全实施策略

单选题Your network consists of a single Active Directory domain. The domain contains a server that runs Windows Server 2008. The server has the Windows SharePoint Services (WSS) server role installed.You need to allow users to create distribution lists from a SharePoint site. What should you do on the WSS server?()ASet the outgoing mail character set to 1200(Unicode).BEnable the SharePoint Directory Management Service.CConfigure the site to accept messages from authenticated users only.DConfigure the site to use the default Rights Management server in Active Directory Domain Services.

单选题You work as the IT professional in an international company which is named Wiikigo. You are experiencedin implementing and administering a network operating system. You are specialized in deploying servers,configuring Windows Server 2008 Terminal services and network application services, and configuring aweb services infrastructure. There is a single Active Directory domain in your company. The domaincontains a server that runs Windows Server 2008. The server has Windows SharePoint Services (WSS)installed. Now you receive an order from the company management. According to the company requirement, you should allow users to create distribution lists from a SharePoint site. What action should you perform on the WSS server?()AThe site should be configured to use the default Rights Management server in Active Directory DomainServices.BThe outgoing mail character set should be set to 1200(Unicode).CThe SharePoint Directory Management Service should be enabled.DThe site should be configured to accept messages from authenticated users only.

单选题Which network management solution performs configuration, monitoring, and management of Cisco Firewall, VPN router, and IPS devices as well as maintains network device inventory and software distribution features?()A CiscoWorks Security Device Management Center (SD/MC)B Security Device Manager (SDM)C Adaptive Security Device Manager (ASDM)D CiscoWorks VMS/Management Center (VMS/MC)

单选题A service fails to start. Which of the following places can a technician go to find the services console?()ASystem configuration utilityBDevice ManagementCTask ManagerDComputer Management

单选题You need to recommend a management solution for the corporate Web sites that meets the museum’s security policy    What should you include in the recommendation?()AInternet Information Services (IIS) ManagerBRemote Desktop Services (RDS)CRemote Server Administration Tools (RSAT)DWindows PowerShell 2.0

单选题Which statement is true about a Dynamic Chain Selection Module instance?()AIt is the first module in the partner module chain in Web Services Security Management (WSSM).BIt is the last module in the partner module chain in WSSM.CIt is the first module in the application module chain for partner.DIt is the last module in the application module chain for the partner.

多选题What are two benefits of the Cisco 1800 Series Integrated Services Routers?()Afixed configuration for secure broadband, metro Ethernet, and wireless connectivityBconfiguration for security policy monitoringCdynamic management through self-healing processesDconnectivity options and investment protection through support for existing Cisco 1700 SeriesWICs

多选题What are three advantages of the Cisco Integrated Services Pouter product family? (Choose three.) ()Aprovides advanced security such as hardware encryption accelerationBprovides investment protection through increased modularityCcomes equipped with at least one 1000-based TX interlaceDcontains integrated wireless access using the 802.11 g/b standardEcontains integrated web-based management tools for easy configuration and maintenance

单选题Which command is used to enable access to J-Web using HTTPS?()Aset system remote-access provle httpsBset services remote-access profile j-web-httpsCset system services web-management httpsDset services web-management j-web-https

单选题As a senior administrator at Cer-tech .com, you manage a server named ERA1 that runs Windows Server2008. It has the Windows SharePoint Services (WSS) role installed in a standalone mode.You also manage another server called ERA2. For a big project, you install WSS role on ERA2. You indicate duringthe installation that the ERA2 must be the member of a WSS server farm. But you are unable to connect toERA1 in the WSS server farm. What should you do to configure both ERA1 and ERA2 in the WSS serverarm?()Areduce the Microsoft .NET Framework Trust Level to Low on both ERA1 and ERA2BReconfigure the Web Management Service on ERA1CSet the Microsoft .NET Framework Trust Level to High on both ERA1 and ERA2DUninstall the WSS on ERA1 and select the server farm mode while reinstalling it.ENone of the above