Which mechanism requires the client to provide its public key certificate?()A、HTTP Basic AuthenticationB、Form Based AuthenticationC、HTTP Digest AuthenticationD、HTTPS Client Authentication

Which mechanism requires the client to provide its public key certificate?()

  • A、HTTP Basic Authentication
  • B、Form Based Authentication
  • C、HTTP Digest Authentication
  • D、HTTPS Client Authentication

相关考题:

You develop a Windows Communication Foundation (WCF) service that uses basic authentication for client credentials. This service is currently configured to use message security. The service is hosted on a server in workgroup mode.Users report that their passwords are stolen when they use public computers.You need to ensure that messages are secure and users are authenticated.You prevent the service from being called over HTTP through Microsoft Internet Information Services (IIS) configuration.What should you do next?()A. Use the transport security mode and specify None for transport client credential type.B. Use the transportWithMessageCredential security mode and specify Basic for the transport client credential type.C. Use the message security mode and specify Basic for the transport client credential type.D. Use the transportWithMessageCredential security mode and specify None for the transport client credential type.

following code segment.[ServiceContract]public interface ICustomerService{...}public class CustomerService : ICustomerService{...}The service is self-hosted in a console application. Older client applications access the service at http://contoso.com:8080/CustomerService/V1.Newer client applications access the service at http://contoso.com:8080/CustomerService/V2.You need to ensure that any client application can access the service at either address.Which code segment should you use?()A.B.C.D.

Originally introduced by Netscape Communications,(1)are a general mechanism which HTFP Server side applications, such as CGI(2), can use to both store and retrieve information on the HTTP(3)side of the connection. Basically, Cookies can be used to compensate for the(4)nature of HTTP. The addition of a simple, persistent, client-side state significantly extends the capabilities of WWW-based(5).A.BrowsersB.CookiesC.ConnectionsD.Scripts

Originally introduced by Netscape Communications,(21)are a general mechanism which HTTP Server side applications, such as CGI(22), can use to both store and retrieve information on the HTTP(23)side of the connection. Basically, Cookies can be used to compensate for the(24)nature of HTTP. The addition of a simple, persistent, client-side state significantly extends the capabilities of WWW-based(25).A.BrowsersB.CookiesC.ConnectionsD.Scripts

Which statement is correct about HTTP trickling?() A. It prevents the HTTP client or server from timing-out during an antivirus updateB. It prevents the HTTP client or server from timing-out during antivirus scanning.C. It is an attack.D. It is used to bypass antivirus scanners.

Originally-introduced by Netscape Communications,(31)are a general mechanism which HTTP Server side applications, such as CGI(32), can use to both store and retrieve information on the HTTP(33)side of the connection. Basically, Cookies can be used to compensate for the(34)nature of HTTP. The addition ora simple, persistent, client-side state significantly extends the capabilities of WWW-based(35).A.BrowsersB.CookiesC.ConnectionsD.Scripts

属于IEEE802.11的用户认证机制有:()。 A.Open authenticationB.Pre-Shared Key authenticationC.Shared Key authenticationD.MAC authentication

Which two are true about authentication?()A、Form-based logins should NOT be used with HTTPS.B、When using Basic Authentication the target server is NOT authenticated.C、J2EE compliant web containers are NOT required to support the HTTPS protocol.D、Web containers are required to support unauthenticated access to unprotected web resources.

You develop a Windows Communication Foundation (WCF) service that uses basic authentication for client credentials. This service is currently configured to use message security. The service is hosted on a server in workgroup mode.Users report that their passwords are stolen when they use public computers.You need to ensure that messages are secure and users are authenticated.You prevent the service from being called over HTTP through Microsoft Internet Information Services (IIS) configuration. What should you do next?()A、Use the transport security mode and specify None for transport client credential type.B、Use the transportWithMessageCredential security mode and specify Basic for the transport client credential type.C、Use the message security mode and specify Basic for the transport client credential type.D、Use the transportWithMessageCredential security mode and specify None for the transport client credential type.

属于IEEE802.11的用户认证机制有:()。A、Open authenticationB、Pre-Shared Key authenticationC、Shared Key authenticationD、MAC authentication

In the wireless Advanced Feature Set using lightweight access points, a virtual interface is used when supporting which of the following features?()A、PSK authenticationB、EAP authenticationC、WPA authenticationD、Web authentication

If authentication is enabled,which statement is true?()A、client reports will display authenticated usernamesB、client reports will display both the username and IP address of the clientsC、client reports are not affected by authenticationD、client reports will display the IP address of the authentication server

If a certificate authority trustpoint is not configured when enabling HTTPS and the remote HTTPS server requires client authentication, connections to the secure HTTP client will fail. Which command must be enabled for correct operation?()A、ip http client secure-ciphersuite 3des-ede-cbc-shaB、ip https max-connections 10C、ip http timeout-policy idle 30 life 120 requests 100D、ip http client secure-trustpoint trustpoint-name

Which two statements about the open and shared key wireless-authentication methods are true?()A、shared key authentication is considered more secure than open authenticationB、shared key authentication is considered less secure than open authenticationC、if the WEP keys do not match using the open authentication method, the client will not authenticate, associate, and transfer dataD、if the WEP keys do not match using the open authentication method, the client will still be able to authenticate and associate, but will not transfer dataE、if the WEP keys do not match using the open authentication method, the client will still be able to authenticate, associate, and transfer data

Which description of BGP authentication is true?()A、MD5 has been used by BGP to encrypt BGP update packets.B、BGP uses a message-digest algorithm to authenticate BGP peersC、A plain-text password authentication is an option of BGP authenticationD、EBGP peers authentication is faster than IBGP peers authenticationE、BGP uses public key and private key to authenticate BGP peers.

Which two authentication mechanisms provide weaker protection than other mechanisms?()A、 HTTP Basic AuthenticationB、 Form Based AuthenticationC、 HTTP Digest AuthenticationD、 HTTPS Client Authentication

Which activity supports the data integrity requirements of an application?()A、Using HTTPS as a protocolB、Using an LDAP security realmC、Using HTTP Basic authenticationD、Using forms-based authentication

Which basic authentication type is optional for a J2EE 1.4 compliant web container?()A、HTTP Basic AuthenticationB、Form Based AuthenticationC、HTTP Digest AuthenticationD、HTTPS Client Authentication

Which statement is correct about HTTP trickling?()A、It prevents the HTTP client or server from timing-out during an antivirus updateB、It prevents the HTTP client or server from timing-out during antivirus scanning.C、It is an attack.D、It is used to bypass antivirus scanners.

You need to recommend a strategy to ensure that the administration of AD LDS is encrypted.  What should you include in the recommendation?()A、a server authentication certificateB、client authentication certificatesC、Digest authenticationD、Windows Integrated authentication

You have an Exchange Server 2003 organization.  All users connect to their mailboxes by using Microsoft Office Outlook.  You start to transition the organization to new Exchange Server 2010 servers. The new servers are on a secured subnet that is separated by a firewall. You will move half of the mailboxes to the new servers.  Client Access servers and Mailbox servers are on the secured subnet. Client computers on the network can access the Client Access servers.  You need to recommend a solution that allows users to connect to Public Folders by using Outlook orOutlook Web App (OWA).  What should you include in the solution?()A、Public Folder referrals and forms-based authenticationB、Public Folder referrals and HTTP connections to the Mailbox serversC、Public Folder replicas and MAPI connections to the Mailbox serversD、Public Folder replicas and WebReady Document Viewing

多选题Which two authentication mechanisms provide weaker protection than other mechanisms?()AHTTP Basic AuthenticationBForm Based AuthenticationCHTTP Digest AuthenticationDHTTPS Client Authentication

单选题Which statement is correct about HTTP trickling?()AIt prevents the HTTP client or server from timing-out during an antivirus updateBIt prevents the HTTP client or server from timing-out during antivirus scanning.CIt is an attack.DIt is used to bypass antivirus scanners.

单选题Which basic authentication type is optional for a J2EE 1.4 compliant web container?()AHTTP Basic AuthenticationBForm Based AuthenticationCHTTP Digest AuthenticationDHTTPS Client Authentication

单选题Which mechanism requires the client to provide its public key certificate?()AHTTP Basic AuthenticationBForm Based AuthenticationCHTTP Digest AuthenticationDHTTPS Client Authentication

单选题Which the basic authentication type is optional for a J2EE 1.4 compliant web container?()A HTTP Basic AuthenticationB Form Based AuthenticationC HTTP Digest AuthenticationD HTTPS Client Authentication

单选题Which activity supports the data integrity requirements of an application?()AUsing HTTPS as a protocolBUsing an LDAP security realmCUsing HTTP Basic authenticationDUsing forms-based authentication