Which the basic authentication type is optional for a J2EE 1.4 compliant web container?()A、 HTTP Basic AuthenticationB、 Form Based AuthenticationC、 HTTP Digest AuthenticationD、 HTTPS Client Authentication

Which the basic authentication type is optional for a J2EE 1.4 compliant web container?()

  • A、 HTTP Basic Authentication
  • B、 Form Based Authentication
  • C、 HTTP Digest Authentication
  • D、 HTTPS Client Authentication

相关考题:

Which element is NOT part of a microkemel?A.basic I/OB.a file systemC.IPC mechanismsD.memory management

A ___is the basic form. of a word which cannot be further analyzed without total loss of identity.

Whenaddingaelementtoawebapplicationdeploymentdescriptor,theinclusionofwhichsub-elementrequiresthedefinitionofanerrorpage()? A.realm-nameB.auth-metodC.auth-constraintD.form-login-configE.user-data-constaint

You notice that during peak hours, some firewall enforcers contain a high number of auth table entries. As you investigate the issue, you discover that all users are getting auth table mappings to all firewalls, which is not acceptable.What should you do on the Junos Pulse Access Control Service to resolve this problem?()A. Delete the default auth table mapping policyB. Create auth table mapping policies that route users to specific resourcesC. Create Resource Access policies that permit access to specific resourcesD. Create Source Interface policies that route users to specific resources

You have created a Host Checker policy that contains multiple rules. You want to inform end users which rule specifically has failed.In the admin GUI, which configuration setting would you enable?() A. Enable Custom InstructionsB. Pre-auth notificationC. Remediation messageD. Send reason strings

Which of the following devices is used to connect a WAN to a LAN?() A.Basic routerB.Basic switchC.BridgeD.Repeater

Which element of a web application deployment descriptor  element is required()?A、 realm-name B、 auth-method C、 security-role D、 transport-guarantee E、 web-resource-collection

You need to determine the correct wireless LAN topology for use in the Company network.  Which  three statements are true about the various WLAN topologies?()A、 In ad hoc mode, the Independent Basic Service Set (IBSS) is a framework in which mobile  clients connect directly without an intermediate access point.B、 In Infrastructure mode, the Basic Service Set (BSS) is a framework in which mobile clients use  a single access point for connecting to each other or to wired network resources.C、 In Infrastructure mode, the Extended Services Set (ESS) is a framework in which two or more  Basic Service Sets are connected by a common distribution system (DS).D、 In Infrastructure mode, the Independent Basic Service Setet (IBSS) is a framework in which  mobile clients connect directly without an intermediate access point.E、 In ad hoc mode, the Basic Service Set (BSS) is a framework in which mobile clients use a  single AP for connecting to each other or to wired network resources.F、 In ad hoc mode, the Extended Services Set (ESS) is a framework in which two or more Basic  Service Sets are connected by a common distribution system (DS)

Which of the following devices is used to connect a WAN to a LAN?()A、Basic routerB、Basic switchC、BridgeD、Repeater

Given the two security constraints in a deployment descriptor: 101. 102.  103.SALES 104.SALES 105. 106. 107. 108.  109. 110. If the two security constraints have the same url-pattern and http-method which two inserted independentlyat line 109,will allow users with role names of either SALES or MARKETING to access this resource?()A、auth-constraint/B、auth-constraintrole-name*/role-name/auth-constraintC、auth-constraintrole-nameANY/role-name/auth-constraintD、auth-constraintrole-nameMARKETING/role-name/auth-constraint

When adding a  element to a web application deployment descriptor, the inclusion of which sub-element requires the definition of an error page()?A、 realm-name B、 auth-metod C、 auth-constraint D、 form-login-config E、 user-data-constaint

Which parameter do you use to enable Junos Pulse Access Control Service enforcement on a policy on a ScreenOS platform?()A、uac-policyB、ic-policyC、inyranet-authD、uac-auth

You navigate to "UAC" "Infranet Enforcer" "Auth Table Mapping" in the admin GUI. You see one policy, which is the unmodified, original default policy.Which statement is true?()A、Dynamic auth table mapping is not enabled.B、A successful authentication attempt will result in a new authentication table entry, which will be delivered only to the Junos enforcer protecting the network from which the user has authenticated.C、To create a static auth table mapping, you must delete the default policy.D、The default policy applies only to the factory-default role User.

如果/etc/syslog.conf中,包含以下设置:“auth.warning/var/adm/auth.log”,则以下说法正确的是:()。A、/var/adm/auth.log将仅仅记录auth的warning级别的日志B、/var/adm/auth.log将记录auth的emerg、alert、crit、err、warning级别的日志C、/var/adm/auth.log将记录auth的warning、notice、info、debug级别的日志D、/var/adm/auth.log将记录auth的所有级别的日志

单选题With time going on, _____.Aa luxury may change into a need which most people want to getBthe basic needs are getting smaller and smallerCa luxury and the basic needs can be exchangedDthe basic needs can be changed into a luxury

单选题You have created a Host Checker policy that contains multiple rules. You want to inform end users which rule specifically has failed.In the admin GUI, which configuration setting would you enable?()AEnable Custom InstructionsBPre-auth notificationCRemediation messageDSend reason strings

单选题如果/etc/syslog.conf中,包含以下设置:“auth.warning/var/adm/auth.log”,则以下说法正确的是:()。A/var/adm/auth.log将仅仅记录auth的warning级别的日志B/var/adm/auth.log将记录auth的emerg、alert、crit、err、warning级别的日志C/var/adm/auth.log将记录auth的warning、notice、info、debug级别的日志D/var/adm/auth.log将记录auth的所有级别的日志

单选题Which Cisco IOS command globally enables port-based authentication on a switch? ()Aaaa port-auth enableBradius port-control enableCdot1x system-auth-controlDswitchport aaa-control enable

多选题Given the two security constraints in a deployment descriptor: 101. 102.  103.SALES 104.SALES 105. 106. 107. 108.  109. 110. If the two security constraints have the same url-pattern and http-method which two inserted independentlyat line 109,will allow users with role names of either SALES or MARKETING to access this resource?()Aauth-constraint/Bauth-constraintrole-name*/role-name/auth-constraintCauth-constraintrole-nameANY/role-name/auth-constraintDauth-constraintrole-nameMARKETING/role-name/auth-constraint

单选题When adding a  element to a web application deployment descriptor, the inclusion of which sub-element requires the definition of an error page()?A realm-name B auth-metod C auth-constraint D form-login-config E user-data-constaint

多选题You need to determine the correct wireless LAN topology for use in the Company network.  Which  three statements are true about the various WLAN topologies?()AIn ad hoc mode, the Independent Basic Service Set (IBSS) is a framework in which mobile  clients connect directly without an intermediate access point.BIn Infrastructure mode, the Basic Service Set (BSS) is a framework in which mobile clients use  a single access point for connecting to each other or to wired network resources.CIn Infrastructure mode, the Extended Services Set (ESS) is a framework in which two or more  Basic Service Sets are connected by a common distribution system (DS).DIn Infrastructure mode, the Independent Basic Service Setet (IBSS) is a framework in which  mobile clients connect directly without an intermediate access point.EIn ad hoc mode, the Basic Service Set (BSS) is a framework in which mobile clients use a  single AP for connecting to each other or to wired network resources.FIn ad hoc mode, the Extended Services Set (ESS) is a framework in which two or more Basic  Service Sets are connected by a common distribution system (DS)

单选题Which configuration command allows the router to utilize a RADIUS server to auth enticate in coming Telnet users?()Aaaa new-modelBaaa telnet loginCtelnet authentication loginDauthentication telnet login

单选题You notice that during peak hours, some firewall enforcers contain a high number of auth table entries. As you investigate the issue, you discover that all users are getting auth table mappings to all firewalls, which is not acceptable. What should you do on the Junos Pulse Access Control Service to resolve this problem?()ADelete the default auth table mapping policyBCreate auth table mapping policies that route users to specific resourcesCCreate Resource Access policies that permit access to specific resourcesDCreate Source Interface policies that route users to specific resources

单选题You navigate to "UAC" "Infranet Enforcer" "Auth Table Mapping" in the admin GUI. You see one policy, which is the unmodified, original default policy.Which statement is true?()ADynamic auth table mapping is not enabled.BA successful authentication attempt will result in a new authentication table entry, which will be delivered only to the Junos enforcer protecting the network from which the user has authenticated.CTo create a static auth table mapping, you must delete the default policy.DThe default policy applies only to the factory-default role User.

单选题Which parameter do you use to enable Junos Pulse Access Control Service enforcement on a policy on a ScreenOS platform?()Auac-policyBic-policyCinyranet-authDuac-auth

单选题Which element of a web application deployment descriptor  element is required()?A realm-name B auth-method C security-role D transport-guarantee E web-resource-collection

单选题Which the basic authentication type is optional for a J2EE 1.4 compliant web container?()A HTTP Basic AuthenticationB Form Based AuthenticationC HTTP Digest AuthenticationD HTTPS Client Authentication