单选题What is a benefit of NTLMSSP over basic authentication?()A basic cannot be used in transparent proxy modeB basic requiresreauthentication with every new domainC NTLMSSP is compatible with open LDAPD NTLMSSP is more secure than basic

单选题
What is a benefit of NTLMSSP over basic authentication?()
A

 basic cannot be used in transparent proxy mode

B

 basic requiresreauthentication with every new domain

C

 NTLMSSP is compatible with open LDAP

D

 NTLMSSP is more secure than basic


参考解析

解析: 暂无解析

相关考题:

You develop a Windows Communication Foundation (WCF) service that uses basic authentication for client credentials. This service is currently configured to use message security. The service is hosted on a server in workgroup mode.Users report that their passwords are stolen when they use public computers.You need to ensure that messages are secure and users are authenticated.You prevent the service from being called over HTTP through Microsoft Internet Information Services (IIS) configuration.What should you do next?()A. Use the transport security mode and specify None for transport client credential type.B. Use the transportWithMessageCredential security mode and specify Basic for the transport client credential type.C. Use the message security mode and specify Basic for the transport client credential type.D. Use the transportWithMessageCredential security mode and specify None for the transport client credential type.

When configuring PPP over ATM interfaces, what does the profile utility accomplish?() A.It binds an interface to a virtual router.B.It allows for dynamic interface creation.C.It assigns a Domain Name Server for a session.D.It identifies the RADIUS server to use for authentication

What is a key benefit of using a GRE tunnel to provide connectivity bet ween branch offices and headquarters?() A. authentication, integrity checking, and confidentialityB. less overheadC. dynamic routing over the tunnelD. granular QoS supportE. open standardF. scalability

You are an administrator of a network that uses PPP for CHAP authentication over ever WAN link. What command would you enter to display the CHAP authentication as it occurs in real time?() A. show ppp authenticationB. debug PAP authenticationC. debug PPP authenticationD. show interface serial0E. show CHAP authentication

What are three basic parameters to configure on a wireless access point?() A.SSIDB.RTS/CTSC.AES-CCMPD.TKIP/MICE.RF channelF.authentication method

What is a benefit of NTLMSSP over basic authentication?() A、 basic cannot be used in transparent proxy modeB、 basic requiresreauthentication with every new domainC、 NTLMSSP is compatible with open LDAPD、 NTLMSSP is more secure than basic

Which the basic authentication type is optional for a J2EE 1.4 compliant web container?()A、 HTTP Basic AuthenticationB、 Form Based AuthenticationC、 HTTP Digest AuthenticationD、 HTTPS Client Authentication

Company.com network consists of a single Active Directory domain named  Company.com.Company.com has an Exchange Server 2010 organization.The Company.com employees use Microsoft Office Outlook 2007 to connect to their mailboxes.RPC over HTTP and Auto discover are configured on Microsoft Office Outlook 2007. A new Company.com security policy requires that the employees connected to the domain does not need authentication when using Outlook Anywhere.However, those not connected t the domain needs to be authentication when using Outlook Anywhere.The employees need to comply with the new Company.com security policy.  What should you do?()A、You should consider using Basic authentication on Outlook Anywhere and set up only Basic authentication on the RPC virtual directory.B、You should consider using NTLM authentication on Outlook Anywhere and set up Basic authentication and NTLM authentication on the RPC virtual directory.C、You should consider using NTLM authentication on Outlook Anywhere and set up only Basic authentication on the RPC virtual directory.D、You should consider using Basic authentication on Outlook Anywhere and set up Basic authentication and NTLM authentication on the RPC virtual directory.

What is a key benefit of using a GRE tunnel to provide connectivity bet ween branch offices and headquarters?()A、authentication, integrity checking, and confidentialityB、less overheadC、dynamic routing over the tunnelD、granular QoS supportE、open standardF、scalability

You are an administrator of a network that uses PPP for CHAP authentication over ever WAN link. What command would you enter to display the CHAP authentication as it occurs in real time?()A、show ppp authenticationB、debug PAP authenticationC、debug PPP authenticationD、show interface serial0E、show CHAP authentication

Which statement about the Link Control Protocol (LCP) is true?()A、LCP is used for basic PPP link setup and operation.B、LCP is used for PPP CHAP authentication.C、LCP is used for PPP over ATM (PPPoA) setup.D、LCP is used for PPP over Ethernet (PPPoE) setup.E、LCP is used for PPP over Frame Relay (PPPoFR) setup

What are three basic parameters to configure on a wireless access point?()A、SSIDB、RTS/CTSC、AES-CCMPD、TKIP/MICE、RF channelF、authentication method

Identity authentication, protocol encryption, secure guest access, voice over WLAN features, and a small device footprint are all highlights of what product in the wireless technology market?()A、wireless monitoring deviceB、wireless LAN controllerC、wireless bridgeD、wireless management deviceE、access point

When configuring PPP over ATM interfaces, what does the profile utility accomplish?()A、It binds an interface to a virtual router.B、It allows for dynamic interface creation.C、It assigns a Domain Name Server for a session.D、It identifies the RADIUS server to use for authentication

You need to recommend a security strategy for WebApp2 that meets the company’s applicaton  requirements.What should you include in the recommendation?()A、Basic authentication and connection security rulesB、Basic authentication and SSLC、Digest authentication and connection security rulesD、Digest authentication and SSL

单选题Which statement about the Link Control Protocol (LCP) is true?()ALCP is used for basic PPP link setup and operation.BLCP is used for PPP CHAP authentication.CLCP is used for PPP over ATM (PPPoA) setup.DLCP is used for PPP over Ethernet (PPPoE) setup.ELCP is used for PPP over Frame Relay (PPPoFR) setup

单选题You are developing a Web application. Your code restricts access to some pages based on the users credentials. You need to configure IIS to supply the user's Windows credentials to your Web application. These credentials must be encrypted. What should you do? ()AEnable Anonymous access. Enable Integrated Windows authentication.BEnable Anonymous access. Enable Basic authentication.CDisable Anonymous access. Enable Integrated Windows authentication.DDisable Anonymous access. Enable Basic authentication.

多选题Which two authentication mechanisms provide weaker protection than other mechanisms?()AHTTP Basic AuthenticationBForm Based AuthenticationCHTTP Digest AuthenticationDHTTPS Client Authentication

单选题You work as the enterprise exchange administrator at Xxx .The Xxx network consists of a domain named xxx . Xxx has three Exchange Server 2007 mail servers named XXX-EX01, XXX-EX02 and XXX-EX03 that has the following implementation: records.What action must you take to make sure of the availability of the mailboxes on XXX-EX03 if the employees utilize the Exchange ActiveSync after the instrallation of XXX-EX04?()AYou should use Basic authentication on Exchange ActiveSync and set up only Basic authentication on the RPC virtual directory.BYou should use NTLM authentication on the RPC virtual directory.CYou should use Microsoft Challenge Handshake Authentication Protocol version 2 (MS-CHAP v2) on XXX-EX01.DYou should use the anonymous setting in the authentication type for the Microsoft-Server-ActiveSync virtual directory on XXX-EX01.

单选题Identity authentication, protocol encryption, secure guest access, voice over WLAN features, and a small device footprint are all highlights of what product in the wireless technology market?()Awireless monitoring deviceBwireless LAN controllerCwireless bridgeDwireless management deviceEaccess point

单选题You need to recommend a disk configuration for the planned SQL Server deployment.The solution must ensure that the servers can fail over automatically. What should you include in the recommendation?()AGPT disks and basic disksBGPT disks and dynamic disksCMBR disks and basic disksDMBR disks and dynamic disks

单选题You develop a Windows Communication Foundation (WCF) service that uses basic authentication for client credentials. This service is currently configured to use message security. The service is hosted on a server in workgroup mode.Users report that their passwords are stolen when they use public computers.You need to ensure that messages are secure and users are authenticated.You prevent the service from being called over HTTP through Microsoft Internet Information Services (IIS) configuration. What should you do next?()AUse the transport security mode and specify None for transport client credential type.BUse the transportWithMessageCredential security mode and specify Basic for the transport client credential type.CUse the message security mode and specify Basic for the transport client credential type.DUse the transportWithMessageCredential security mode and specify None for the transport client credential type.

单选题When configuring PPP over ATM interfaces, what does the profile utility accomplish?()AIt binds an interface to a virtual router.BIt allows for dynamic interface creation.CIt assigns a Domain Name Server for a session.DIt identifies the RADIUS server to use for authentication

多选题Which three statements about NetFlow are true? ()ALCP is used for PPP over ATM (PPPoA) setup.BLCP is used for PPP over Ethernet (PPPoE) setup.CLCP is used for PPP over Ethernet (PPPoPR) setup.DLCP is used for PPP CHAP authentication.ELCP is used for basic PPP link setup and operation.

单选题An Enterprise decides to implement Authentication Proxy for per-user authentication for home offices. Each home office also supports an IP Phone. What should you do?()AConfigure Access Control Lists to ensure Voice over IP traffic is checked by Auth Proxy.BConfigure pNAT to ensure Voice over IP packets are properly translated.CConfigure IOS firewall to permit RTP port numbers through the firewall via VPN. DConfigure Access Control Lists to allow Voice over IP traffic to bypass Auth Proxy checking.

单选题What is a key benefit of using a GRE tunnel to provide connectivity bet ween branch offices and headquarters?()Aauthentication, integrity checking, and confidentialityBless overheadCdynamic routing over the tunnelDgranular QoS supportEopen standardFscalability

单选题Which the basic authentication type is optional for a J2EE 1.4 compliant web container?()A HTTP Basic AuthenticationB Form Based AuthenticationC HTTP Digest AuthenticationD HTTPS Client Authentication