Which security token may carry user attribute information as part of the defined token format?()A、KerberosB、RACF TokenC、SAML AssertionD、Username Token

Which security token may carry user attribute information as part of the defined token format?()

  • A、Kerberos
  • B、RACF Token
  • C、SAML Assertion
  • D、Username Token

相关考题:

One solution to major security problems is ______, which are frequently installed to fix known security holes.A.patchesB.compensationsC.complementsD.additions

You are developing a Windows Communication Foundation (WCF) service. The service operation takes a customer number as the only argument and returns information about the customer. The service requires a security token in the header of the message. You need to create a message contract for the service.Which code segment should you use?()A.B.C.D.

_______means the level for which appropriate additional protective security measures shall be maintained for a period of time as a result of heightened risk of a security incident.A.Security level 1B.Security level 2C.Security level 3D.Security level 4

Which statement describes a security zone?() A. A security zone can contain one or more interfaces.B. A security zone can contain interfaces in multiple routing instances.C. A security zone must contain two or more interfaces.D. A security zone must contain bridge groups.

In which of the following topologies could the failure of one machine cause the entire network tostop functioning?() A. MeshB. Token ringC. StarD. Spanning tree

Which of the following does a star ring topology use for data transfer?() A.CSMA/CDB.CSMA/CAC.CHAPD.Token passing

( )is the popular LAN developed under the direction of the IEEE 802.5.( )is the popular backbone technology for transmitting information at highspeed with a high level of fault tolerance which is developed under thedirection of ANSI.A.Ethernet,FDDIB.Token Bus,EthernetC.Token Ring,FDDID.DQDB,QinQ

Which Cisco security tool can best determine it a Cisco ISR router is properly secured? ()A、 Cisco SDM Security AuditB、 Cisco Security MARSC、 Cisco Security Agent MCD、 Cisco Security IntelliShieldE、 CAN

You are developing a Windows Communication Foundation (WCF) service. One of the parameters used with the service operations is a security token. The security token is not sensitive. The monitoring software tracks security tokens and can read tokens in clear text only.The company security policy requires that you validate all clear text data passed over the corporate network.You need to ensure that the service verifies that the security token is not changed during transit. What should you do?()A、For all the security-sensitive members, set the ProtectionLevel parameter of the MessageBodyMember or MessageHeader attribute to EncryptAndSign.B、Implement IEndpointldentityProvider in the message contract class.C、Implement ISecureConversationSession in the message contract class.D、For all the security-sensitive members, set the ProtectionLevel parameter of the MessageBodyMember or MessageHeader attribute to Sign.

During which phase of the Steps to Success methodology for Cisco SMB Security Solutions would the Security Technology Requirements document be used to determine a customer’s security requirements?()A、PerformB、PositionC、DevelopD、PrepareE、PlanF、Design

Which three Layer 2 encapsulation types would be used on a WAN rather than a LAN? ()A、HDLCB、EthernetC、Token RingD、PPPE、FDDIF、Frame Relay

In which of the following topologies could the failure of one machine cause the entire network tostop functioning?()A、MeshB、Token ringC、StarD、Spanning tree

Which of the following connectivity issues is likely to occur within a token ring network?()A、CrosstalkB、Broadcast stormC、Duplex mismatchD、Collision

Which of the following are examples of physical security measures?()A、Policies and proceduresB、EncryptionC、Locked doorsD、Security personnelE、Backup tapes

Which of the following would be used to test out the security of a specific network by allowing it toreceive security attacks?()A、HoneynetB、HoneypotC、Vulnerability scannerD、Network based IDS

Which menu option must be used to grant a user the authority to add or remove users to one or more Security Groups?()A、 Security ControlsB、 Database AccessC、 Set Security ProfileD、 Authorize Group Reassignment

Which file contains the attributes used to setup a new user account when executing ‘mkuser’ without any flags?()A、/etc/security/userB、/etc/security/passwdC、/etc/security/mkuser.sysD、/etc/security/mkuser.default

Which of the following options should be used to obtain the latest security patches for AIX?()A、FixDistB、The Bonus Pack CDC、OPSD、The Security Maintenance CD

A System p administrator needs to set the default password length for all users to six characters.  Which of the following files needs to be edited to accomplish this ()A、/etc/security/limitsB、/etc/security/mkuser.sysC、/etc/security/privD、/etc/security/user

At which two levels of the Junos CLI hierarchy is the host-inbound-traffic command configured? ()(Choose two.)A、[edit security idp]B、[edit security zones security-zone trust interfaces ge-0/0/0.0]C、[edit security zones security-zone trust]D、[edit security screen]

单选题Which menu option must be used to grant a user the authority to add or remove users to one or more Security Groups?()A Security ControlsB Database AccessC Set Security ProfileD Authorize Group Reassignment

多选题You are designing a service that will use the Windows Azure AppFabric Service Bus.  You need to recommend an approach for controlling access to the service by using the Windows Azure AppFabric Access Control Service. Which two actions should you recommend?()AConfigure the service to not require authentication.BConfigure the service to require a relay access token.CSpecify message security for all communications between clients and the service.DSpecify transport security for allcommunications between clients and the service.

单选题You are developing a Windows Communication Foundation (WCF) service. One of the parameters used with the service operations is a security token. The security token is not sensitive. The monitoring software tracks security tokens and can read tokens in clear text only.The company security policy requires that you validate all clear text data passed over the corporate network.You need to ensure that the service verifies that the security token is not changed during transit. What should you do?()AFor all the security-sensitive members, set the ProtectionLevel parameter of the MessageBodyMember or MessageHeader attribute to EncryptAndSign.BImplement IEndpointldentityProvider in the message contract class.CImplement ISecureConversationSession in the message contract class.DFor all the security-sensitive members, set the ProtectionLevel parameter of the MessageBodyMember or MessageHeader attribute to Sign.

单选题The configuration of a Web Services Security management (WSSM) Partner allows for the specification of XSL mapping rules. What is the input and output of these XSL mapping rules?()AThe input to the XSL mapping rules of a WSSM Partner is the binary security token as received on the Web Service request. The output of the mapping rules is a new security token ready for use by the Web Service application. BThe input to the XSL mapping rules of a WSSM Partner is an STSUniveralUser XML document created from the security token received on the Web Service request. The output of the mapping rules is an arbitrary collection of attributes that will be made available to the Web Services application. CThe input to the XSL mapping rules of a WSSM Partner is an STSUniveralUser XML document created from the security token received on the Web Service request. The output of the mapping rules is a new STSUniversalUser XML document that represents the security token required by the application. DThe input to the XSL mapping rules of a WSSM Partner is an STSUniveralUser XML document created from the security token received on the Web Service request. The output of the mapping rules is an IBM Tivoli Access Manager for e-business credential that will be used to authorize the partner's access to the Web Service application.

单选题Which operational mode command displays all active IPsec phase 2 security associations?()Ashow ike security-associationsBshow ipsec security-associationsCshow security ike security-associationsDshow security ipsec security-associations

单选题Which Cisco security tool can best determine it a Cisco ISR router is properly secured? ()A Cisco SDM Security AuditB Cisco Security MARSC Cisco Security Agent MCD Cisco Security IntelliShieldE CAN

单选题Which CLI command provides a summary of what the content-filtering engine has blocked?()Ashow security utm content-filtering statisticsBshow security flow sessionCshow security flow statisticsDshow security utm content-filtering summary