单选题When a client using the SERVER_ENCRYPT authentication type connects to a server using the SERVER authentication type, what happens?()AAn error will occur.BData passed between the client and the server is encrypted.CUser IDs and passwords are passed to the server unencrypted.DUser IDs and passwords are encrypted before they are passed to the server.

单选题
When a client using the SERVER_ENCRYPT authentication type connects to a server using the SERVER authentication type, what happens?()
A

An error will occur.

B

Data passed between the client and the server is encrypted.

C

User IDs and passwords are passed to the server unencrypted.

D

User IDs and passwords are encrypted before they are passed to the server.


参考解析

解析: 暂无解析

相关考题:

A "trusted" client needs to communicate with a server that has been configured to use CLIENT authentication. Which of the following will be used to verify passwords?() A.User ID/password fileB.Communications layerC.Client applicationsD.Operating system

When a client using the SERVER_ENCRYPT authentication type connects to a server using the SERVER authentication type, what happens?() A.An error will occur.B.Data passed between the client and the server is encrypted.C.User IDs and passwords are passed to the server unencrypted.D.User IDs and passwords are encrypted before they are passed to the server.

Which three statements about the Cisco Easy VPN feature are true?()A、If the VPN server is configured for Xauth, the VPN client waits for a username / password challenge.B、The Cisco Easy VPN feature only supports transform sets that provide authentication and encryption.C、The VPN client initiates aggressive mode (AM) if a pre-shared key is used for authentication during the IKE phase 1 process.D、The VPN client verifies a server username/password challenge by using a AAA authentication server that supports TACACS+ or RADIUS.E、The VPN server can only be enabled on Cisco PIX Firewalls and Cisco VPN 3000 series concentrators.F、When connecting with a VPN client,the VPN server must be configured for ISAKMP group 1,2 or 5.

Using FTP passive mode, after the client opens thecommand channel (port 21) to the FTP server and requests passive mode, what will be the next step? ()A、 The FTP server sends back an acknowledgment (ACK) to the clientB、 The FTP server allocates a port touse for the data channel and transmit that port number to the clientC、 The FTP server opens the data channel to the client using the port number indicated by the clientD、 The FTP client opens the data channel to the FTP server on Port 20E、 The FTP client opens the datachannel to the FTP server on Port 21

pany has implemented 802.1X authentication as a security enhancement.  Which statement is  true about 802.1x port-based authentication?()A、 TACACS+ is the only supported authentication server type.B、 If a host initiates the authentication process and does not receive a response, it assumes it is  not authorized.C、 RADIUS is the only supported authentication server type.D、 Before transmitting data, an 802.1x host must determine the authorization state of the switch.E、 Hosts are required to havea 802.1x authentication client or utilize PPPoE.F、 None of the other alternatives apply.

Using an LDAP authentication server, what do you configure to validate certificate attributes?()A、Use the "is exactly" or "contains" operators.B、Create a user filter matching thedn of the certificate.C、Verify that the certificate is issued by a publicly trusted cs.D、Match the certificate type and value with an attribute from theldap server.

When a client using the SERVER_ENCRYPT authentication type connects to a server using the SERVER authentication type, what happens?()A、An error will occur.B、Data passed between the client and the server is encrypted.C、User IDs and passwords are passed to the server unencrypted.D、User IDs and passwords are encrypted before they are passed to the server.

A new employee needs access to a SQL Server 2005 database that is located on a server named SQL1. You create a login named ajones by using the following Transact-SQL statement. CREATE LOGIN ajones WITH PASSWORD = ’SQLServer$1’ The new employee reports that when he logs in, he receives the following error message: "Login failed. The user is not associated with a trusted SQL Server connection." You need to resolve the error and allow the new employee to gain access to SQL1. What should you do?()A、Change the SQL Server security mode from Windows Authentication mode to SQL Server and Windows authentication mode.B、Change the SQL Server security mode from SQL Server and Windows Authentication mode to Windows authentication mode.C、Ensure that the login name is created with square brackets ([]).D、Give the login access to a specific database by using the CREATE USER Transact-SQL statement.

You review the failed attempts logs on an aaa server and find: "unknown network access server error."  Which failure could produce this error?()A、aaa client and aaa server handshake failureB、supplicant authentication failureC、wrong password used by the supplicantD、failure of the wireless client and aaa server handshake

You review the failed attempts logs on an aaa server and find: "unknown network access server error." Which failure could produce this error?()A、failure of the wireless client and aaa server handshakeB、supplicant authentication failureC、aaa client and aaa server handshakeD、wrong password used by the supplicant

Which of the following commands configures the cisco 3845 integrated services router to allow eap-fast authentication using wds?()A、router (config)# wlccp authentication-server infrastructure eap group_1B、router (config)# wlccp authentication-server infrastructure eap-fast group_1C、router (config)# wlccp authentication-server client eap-fast group_1D、router (config)# wlccp authentication-server client eap group_1

You review the Failed Attempts logs on an AAA server and find: "unknown network access server error." Which failure could produce this error?()A、failure of the wireless client and AAA server handshakeB、supplicant authentication failureB.AAA client and AAA server handshake failureC、wrong password used by the supplicant

A "trusted" client needs to communicate with a server that has been configured to use CLIENT authentication. Which of the following will be used to verify passwords?()A、User ID/password fileB、Communications layerC、Client applicationsD、Operating system

Your company infrastructure includes a Windows Server 2008 R2 file server and 1,000 Windows 7 Enterprise client computers.   The company wants to require a secure connection between client computers and the file server. You need to create and deploy a Group Policy object (GPO) that includes a rule for Windows Firewall with Advanced Security.   What should you do?()A、Create a Tunnel rule and specify Gateway-to-client as the tunnel type.B、Create a Server-to-server rule and specify the endpoints as Any IP address and the file server IP address.C、Create an Isolation rule and specify Request authentication for inbound and outbound connections.D、Create an Authentication exemption rule and add the file server IP address to the Exempt Computers list.

Your network contains two Active Directory sites named Site1 and Site2. Only Site1 can be accessed from the Internet. You have an Exchange Server 2010 organization.  You deploy a Client Access server in Site1 and enable Windows Integrated Authentication for OutlookWeb App (OWA).  In Site2, you deploy a Mailbox server and a Client Access server.  You need to configure the Exchange organization to meet the following requirements: .Allow users to access their mailboxes from the Internet by using OWA  .Prevent authentication prompts from displaying when users connect to OWA by using domain- joinedcomputers that are connected to the internal network  What should you do?()A、Modify the Exchange virtual directory on the Client Access server in Site1.B、Modify the Exchange virtual directory on the Client Access server in Site2.C、Modify the OWA virtual directory on the Client Access server in Site1.D、Modify the OWA virtual directory on the Client Access server in Site2.

Your network contains two Active Directory sites named Site1 and Site2. Only Site1 can be accessed from the Internet. You have an Exchange Server 2010 organization.  You deploy a Client Access server in Site1 and enable Windows Integrated Authentication for OutlookWeb App (OWA).  In Site2, you deploy a Mailbox server and a Client Access server.  You need to configure the Exchange organization to meet the following requirements: .Allow users to access their mailboxes from the Internet by using OWA  .Prevent authentication prompts from displaying when users connect to OWA by using domain- joined computers that are connected to the internal network  What should you do?()A、Modify the Exchange virtual directory on the Client Access server in Site1.B、Modify the Exchange virtual directory on the Client Access server in Site2.C、Modify the OWA virtual directory on the Client Access server in Site1.D、Modify the OWA virtual directory on the Client Access server in Site2.

单选题Your company infrastructure includes a Windows Server 2008 R2 file server and 1,000 Windows 7 Enterprise client computers.   The company wants to require a secure connection between client computers and the file server. You need to create and deploy a Group Policy object (GPO) that includes a rule for Windows Firewall with Advanced Security.   What should you do?()ACreate a Tunnel rule and specify Gateway-to-client as the tunnel type.BCreate a Server-to-server rule and specify the endpoints as Any IP address and the file server IP address.CCreate an Isolation rule and specify Request authentication for inbound and outbound connections.DCreate an Authentication exemption rule and add the file server IP address to the Exempt Computers list.

单选题Using FTP passive mode, after the client opens thecommand channel (port 21) to the FTP server and requests passive mode, what will be the next step? ()A The FTP server sends back an acknowledgment (ACK) to the clientB The FTP server allocates a port touse for the data channel and transmit that port number to the clientC The FTP server opens the data channel to the client using the port number indicated by the clientD The FTP client opens the data channel to the FTP server on Port 20E The FTP client opens the datachannel to the FTP server on Port 21

单选题Your network contains two Active Directory sites named Site1 and Site2. Only Site1 can be accessed from the Internet. You have an Exchange Server 2010 organization.  You deploy a Client Access server in Site1 and enable Windows Integrated Authentication for OutlookWeb App (OWA).  In Site2, you deploy a Mailbox server and a Client Access server.  You need to configure the Exchange organization to meet the following requirements:.Allow users to access their mailboxes from the Internet by using OWA  .Prevent authentication prompts from displaying when users connect to OWA by using domain- joinedcomputers that are connected to the internal network  What should you do?()AModify the Exchange virtual directory on the Client Access server in Site1.BModify the Exchange virtual directory on the Client Access server in Site2.CModify the OWA virtual directory on the Client Access server in Site1.DModify the OWA virtual directory on the Client Access server in Site2.

单选题A new employee needs access to a SQL Server 2005 database that is located on a server named SQL1. You create a login named ajones by using the following Transact-SQL statement. CREATE LOGIN ajones WITH PASSWORD = ’SQLServer$1’ The new employee reports that when he logs in, he receives the following error message: "Login failed. The user is not associated with a trusted SQL Server connection." You need to resolve the error and allow the new employee to gain access to SQL1. What should you do?()AChange the SQL Server security mode from Windows Authentication mode to SQL Server and Windows authentication mode.BChange the SQL Server security mode from SQL Server and Windows Authentication mode to Windows authentication mode.CEnsure that the login name is created with square brackets ([]).DGive the login access to a specific database by using the CREATE USER Transact-SQL statement.

单选题You review the failed attempts logs on an aaa server and find: "unknown network access server error." Which failure could produce this error?()Afailure of the wireless client and aaa server handshakeBsupplicant authentication failureCaaa client and aaa server handshakeDwrong password used by the supplicant

单选题pany has implemented 802.1X authentication as a security enhancement.  Which statement is  true about 802.1x port-based authentication?()A TACACS+ is the only supported authentication server type.B If a host initiates the authentication process and does not receive a response, it assumes it is  not authorized.C RADIUS is the only supported authentication server type.D Before transmitting data, an 802.1x host must determine the authorization state of the switch.E Hosts are required to havea 802.1x authentication client or utilize PPPoE.F None of the other alternatives apply.

单选题Using an LDAP authentication server, what do you configure to validate certificate attributes?()AUse the is exactly or contains operators.BCreate a user filter matching thedn of the certificate.CVerify that the certificate is issued by a publicly trusted cs.DMatch the certificate type and value with an attribute from theldap server.

单选题Which of the following commands configures the cisco 3845 integrated services router to allow eap-fast authentication using wds?()Arouter (config)# wlccp authentication-server infrastructure eap group_1Brouter (config)# wlccp authentication-server infrastructure eap-fast group_1Crouter (config)# wlccp authentication-server client eap-fast group_1Drouter (config)# wlccp authentication-server client eap group_1

单选题Your network contains two Active Directory sites named Site1 and Site2. Only Site1 can be accessed from the Internet. You have an Exchange Server 2010 organization.  You deploy a Client Access server in Site1 and enable Windows Integrated Authentication for OutlookWeb App (OWA).  In Site2, you deploy a Mailbox server and a Client Access server.  You need to configure the Exchange organization to meet the following requirements: .Allow users to access their mailboxes from the Internet by using OWA  .Prevent authentication prompts from displaying when users connect to OWA by using domain- joined computers that are connected to the internal network  What should you do?()AModify the Exchange virtual directory on the Client Access server in Site1.BModify the Exchange virtual directory on the Client Access server in Site2.CModify the OWA virtual directory on the Client Access server in Site1.DModify the OWA virtual directory on the Client Access server in Site2.

单选题You review the failed attempts logs on an aaa server and find: "unknown network access server error."  Which failure could produce this error?()Aaaa client and aaa server handshake failureBsupplicant authentication failureCwrong password used by the supplicantDfailure of the wireless client and aaa server handshake

单选题You review the Failed Attempts logs on an AAA server and find: "unknown network access server error." Which failure could produce this error?()Afailure of the wireless client and AAA server handshakeBsupplicant authentication failureB.AAA client and AAA server handshake failureCwrong password used by the supplicant

单选题When a client using the SERVER_ENCRYPT authentication type connects to a server using the SERVER authentication type, what happens?()AAn error will occur.BData passed between the client and the server is encrypted.CUser IDs and passwords are passed to the server unencrypted.DUser IDs and passwords are encrypted before they are passed to the server.