单选题A user attempts to login to a bookmarked site but is prompted for their social security number,mother’s maiden name and date of birth. Which of the following has MOST likely happened?()AThe website has updated the security policies.BThe user’s identity has been stolen.CThe browser has been hijacked.DThe user typed the website address incorrectly.

单选题
A user attempts to login to a bookmarked site but is prompted for their social security number,mother’s maiden name and date of birth. Which of the following has MOST likely happened?()
A

The website has updated the security policies.

B

The user’s identity has been stolen.

C

The browser has been hijacked.

D

The user typed the website address incorrectly.


参考解析

解析: 暂无解析

相关考题:

Yourdatabaseinitializationparameterfilehasthefollowingentry:SEC_MAX_FAILED_LOGIN_ATTEMPTS=3Whichstatementistrueregardingthissetting?() A.Itdropstheconnectionafterthespecifiednumberofloginattemptsfailforanyuser.B.Itisenforcedonlyifthepasswordprofileisenabledfortheuser.C.Itlockstheuseraccountafterthespecifiednumberofattempts.D.ItdropstheconnectionafterthespecifiednumberofloginattemptsfailonlyforuserswhohavetheSYSDBAprivilege.

Which two statements are true of login classes?() A. Users can be members of multiple login classes.B. Login classes define authorization parameters for a user.C. There are five system-defined login classes.D. Login class permission flags can be overridden for certain commands.

A router has been configured with the settings shown below:[edit]user@host show system authentication-order authentication-order [ radius tacplus ];The router also has a local database that contains the user lab with password lab123. What would happen if both the RADIUS and the TACACS servers are not accessible?()A.The user lab will not be able to login.B.The user lab will be authenticated against the local database and will be able to login.C.The user lab will receive an error message indicating the router is unable to authenticate due to the authentication servers not responding.D.The user will be able to login only if tries to login as the root user.

When configuring Cisco IOS login enhancements for virtual connections, what is the "quiet period"?()A、The period of time in which virtual login attempts are blocked, following repeated failed login attemptsB、The period of time in which virtual logins are blocked as security services fully initializeC、A period of time when no one is attempting tolog inD、The period of time between successive login attempts

Which of the following security features are enabled by default after creating an instance?()A、Password InvalidationB、Login TimeoutC、Cross Site Scripting ProtectionD、Access Logging

In your database instance, the user sessions are connected to the database server from the remote machines.You want to achieve the following for these users: 1. The user account must be locked after four unsuccessful login attempts. 2. The user must be prompted to change the password at regular intervals. 3. The user may not have more than three simultaneous sessions. 4. The user session must automatically be logged off if more than 10 minutes elapsed time used. How would you accomplish the above()A、By assigning profiles for the usersB、By implementing Fine-Grained Auditing (FGA)C、By granting a secure application role to the usersD、By implementing the Database Resource Manager plan

A user is unable to determine the default system texteditor. How can the local administrator assist the user by identifying the default text editor for the system?()A、Login as the user and run 'echo $ENV'.B、Login as root and run the 'env' command.C、Login as root and 'cat /etc/environment'.D、Login as the user and run the 'env' command.

A user is unable to determine the default system text editor. How can the local administrator assist the user by identifying the default text editor for the system?()A、Login as the user and run ’echo $ENV’.B、Login as root and run the ’env’ command.C、Login as root and ’cat /etc/environment’.D、Login as the user and run the ’env’ command.

Which two statements are true of login classes?()A、Users can be members of multiple login classes.B、Login classes define authorization parameters for a user.C、There are five system-defined login classes.D、Login class permission flags can be overridden for certain commands.

A user attempts to login to a bookmarked site but is prompted for their social security number,mother’s maiden name and date of birth. Which of the following has MOST likely happened?()A、The website has updated the security policies.B、The user’s identity has been stolen.C、The browser has been hijacked.D、The user typed the website address incorrectly.

A user has used all of the allowed logon attempts for the userid. Which command can be used to reset the unsuccessful_login_count to 0 for that user?()A、usrckB、chsecC、chuserD、passwd

Which two statements about login classes correctly define their usage within the JUNOS software?()A、A different login class must be configured for each user.B、Individual commands can be explicitly allowed or denied.C、A user must be assigned to one of the default login classes.D、Each login class is associated with one or more permissions flags.

Your database initialization parameter file has the following entry:   SEC_MAX_FAILED_LOGIN_ATTEMPTS=3   Which statement is true regarding this setting?()A、 It drops the connection after the specified number of login attempts fail for any user.B、 It is enforced only if the password profile is enabled for the user.C、 It locks the user account after the specified number of attempts.D、 It drops the connection after the specified number of login attempts fail only for users who have the SYSDBA privilege.

Which statement is true regarding this setting?()A、It drops the connection after the specified number of login attempts fail for any user.B、It is enforced only if the password profile is enabled for the user. C、It locks the user account after the specified number of attempts. D、It drops the connection after the specified number of login attempts fail only for users who have the SYSDBA privilege.

You are administering a database and you receive a requirement to apply the following restrictions: 1. A connection must be terminated after four unsuccessful login attempts by user. 2. A user should not be able to create more than four simultaneous sessions. 3. User session must be terminated after 15 minutes of inactivity. 4. Users must be prompted to change their passwords every 15 days. How would you accomplish these requirements?()A、by granting a secure application role to the usersB、by creating and assigning a profile to the users and setting the REMOTE_OS_AUTHENT parameter to falseC、By creating and assigning a profile to the users and setting the SEC_MAX_FAILED_LOGIN_ATTEMPTS parameter to 4D、By Implementing Fine-Grained Auditing (FGA) and setting the REMOTE_LOGIN_PASSWORD_FILE parameter to none.E、By implementing the database resource Manager plan and setting the SEC_MAX_FAILED_LOGIN_ATTEMPTS parameters to 4.

You are creating a custom user control. The custom user control will be used on 10 Web Forms for an ASP.NET Web site that allows users to register and log on to a personalized experience. The custom user control uses two TextBox controls and two Button controls. You need to ensure that the controls are visible only when users are not logged on to the Web site. You also need to minimize the amount of effort in development and maintenance for the Web site. Which two actions should you perform? ()A、Add the OnClick event handler for the Login button to the code used in the custom user control.B、Add the OnClick event handler for the Login button to the code used in the Web Form where the control is added.C、In the Page_Load method of the Web Form, add a code segment to set the visibility of the TextBox and Button controls where the control is added.D、In the Page_Load method of the custom user control, add a code segment to set the visibility of the TextBox and Button controls.

You are working on an existing Web site. You need to secure the Web site by redirecting all users to the logon page, Login.aspx. After logging on, users must be sent back to the page that they originally requested. Which code segment should you use? ()A、 In the Web.config file: authorization deny users=”?”//authorization On each page in the Web site: void Page_Load(Object sender, EventArgs E){ FormsAuthentication.Initialize(); //Rest of the Page_Load code goes here}B、On each page in the Web site: void Page_Load(Object sender, EventArgs E){ FormsAuthentication.RedirectToLoginPage(“login.aspx”); //Rest of the Page_Load code goes here}C、On each page in the Web site: void Page_Load(Object sender, EventArgs E){ Response.Redirect(“login.aspx”);//Rest of the Page_Load code goes here}D、In the Web.config file: authentication mode=”Forms” forms name=”.ASPXUSERDEMO” loginUrl=”login.aspx” protection=”All”timeout=”60” / /authentication

You work in a company which uses SQL Server 2008. You are the administrator of the company database. Now you are in charge of two SQL Server 2008 instance. The two instances are respectively named InstanceA and InstanceB. There is a database named Dworks on InstanceA. You move the Dworks database to InstanceB. A user use a SQL Server login named Mary to access the database on InstanceA with the password "Tk@87#34". On InstanceB, you create the same SQL Server login. The user tries to use the SQL Server login Mark to access the Dworks database on InstanceB. But the user gets an error message, according to the indication of the message, the access to the Dworks database has been denied. You must make sure that the user can access the Dworks database on InstanceB successfully.  So on InstanceB, which Transact-SQL statements should you execute?()  A、USE AdventureWorks;ALTER USER Mary WITH LOGIN = Mary; B、USE AdventureWorks;ALTER LOGIN Mary ENABLE; C、USE AdventureWorks;ALTER LOGIN Mary WITH PASSWORD = "Tk@87#34" UNLOCK; D、USE AdventureWorks;ALTER LOGIN Mary WITH DEFAULT_DATABASE = AdventureWorks;

单选题A user attempts to login to a bookmarked site but is prompted for their social security number,mother’s maiden name and date of birth. Which of the following has MOST likely happened?()AThe website has updated the security policies.BThe user’s identity has been stolen.CThe browser has been hijacked.DThe user typed the website address incorrectly.

单选题Which statement is true regarding this setting?()AIt drops the connection after the specified number of login attempts fail for any user.BIt is enforced only if the password profile is enabled for the user. CIt locks the user account after the specified number of attempts. DIt drops the connection after the specified number of login attempts fail only for users who have the SYSDBA privilege.

单选题Which of the following is NOT a security feature relating to user accounts?()ASome commands can be password protected requiring logged in customers to re-enter their password.BA user account can be disabled automatically, after a specified number of invalid login attempts.CAn account can have multiple valid passwords at the same time, any of which can be used to access the account.DThe password policy feature can allow the system to require passwords to include a minimum number of numeric characters.ELogged in customers can be logged off of the system after a specified period of inactivity.

单选题When configuring Cisco IOS login enhancements for virtual connections, what is the "quiet period"?()AThe period of time in which virtual login attempts are blocked, following repeated failed login attemptsBThe period of time in which virtual logins are blocked as security services fully initializeCA period of time when no one is attempting tolog inDThe period of time between successive login attempts

单选题A router has been configured with the settings shown below: [edit] user@host# show system authentication-order authentication-order [ radius tacplus ]; The router also has a local database that contains the user lab with password lab123. What would happen if both the RADIUS and the TACACS servers are not accessible?()AThe user lab will not be able to login.BThe user lab will be authenticated against the local database and will be able to login.CThe user lab will receive an error message indicating the router is unable to authenticate due to the authentication servers not responding.DThe user will be able to login only if tries to login as the root user.

单选题In your database instance, the user sessions are connected to the database server from the remotemachines. You want to achieve the following for these users:  1:The user account must be locked after four unsuccessful login attempts.PASSWORD_LOCK_TIME  2:The user must be prompted to change the password at regular intervals.PASSWORD_LIFE_TIME  3:The user may not have more than three simultaneous sessions.SESSIONS_PER_USER  4:The user session must automatically be logged off if more than 10 minutes elapsed time used.CONNECT_TIME  How would you accomplish the above()Aby assigning profiles for the usersBby implementing Fine-Grained Auditing (FGA)Cby granting a secure application role to the usersDby implementing the Database Resource Manager plan

单选题You create a Web site that is for members only. The behavior of the Web site changes according to the role of the user. The Web site uses the ASP.NET Membership control for creation of user accounts. You need to find out whether a user is a member of a particular role. What should you do? ()APass the user names and passwords to Membership.ValidateUser.BPass the role names to User.IsInRole.CPass the role names to Roles.RoleExists.DPass the user names to Membership.GetUser.

单选题You are administering a database and you receive a requirement to apply the following restrictions: 1. A connection must be terminated after four unsuccessful login attempts by user. 2. A user should not be able to create more than four simultaneous sessions. 3. User session must be terminated after 15 minutes of inactivity. 4. Users must be prompted to change their passwords every 15 days. How would you accomplish these requirements?()Aby granting a secure application role to the usersBby creating and assigning a profile to the users and setting the REMOTE_OS_AUTHENT parameter to falseCBy creating and assigning a profile to the users and setting the SEC_MAX_FAILED_LOGIN_ATTEMPTS parameter to 4DBy Implementing Fine-Grained Auditing (FGA) and setting the REMOTE_LOGIN_PASSWORD_FILE parameter to none.EBy implementing the database resource Manager plan and setting the SEC_MAX_FAILED_LOGIN_ATTEMPTS parameters to 4.

单选题A router has been configured with the authentication order settings shown below: [edit] user@host# show system authentication-order authentication-order [radius tacplus password]; The router also has a local database that contains the user lab with password lab123. What would happen if both the RADIUS and the TACACS servers respond with a reject for user lab?()AThe user lab will not be able to login.BThe user lab will be authenticated against the local database and will be able to login.CThe user will be able to login only if tries to login as the root user.DThe user lab will receive an error message indicating the username and password provided could not be found on the radius and tacacs servers.

多选题Which two statements about login classes correctly define their usage within the JUNOS software?()AA different login class must be configured for each user.BIndividual commands can be explicitly allowed or denied.CA user must be assigned to one of the default login classes.DEach login class is associated with one or more permissions flags.