Using an LDAP authentication server, what do you configure to validate certificate attributes?()A、Use the "is exactly" or "contains" operators.B、Create a user filter matching thedn of the certificate.C、Verify that the certificate is issued by a publicly trusted cs.D、Match the certificate type and value with an attribute from theldap server.
Using an LDAP authentication server, what do you configure to validate certificate attributes?()
- A、Use the "is exactly" or "contains" operators.
- B、Create a user filter matching the dn of the certificate.
- C、Verify that the certificate is issued by a publicly trusted cs.
- D、Match the certificate type and value with an attribute from the ldap server.
相关考题:
In your database, the LDAP_DIRECTORY_SYSAUTH initialization parameter has been set to YES and the users who need to access the database as DBAs have been granted SYSDBA enterprise role in Oracle Internet Directory (OID). SSL and the password file have been configured. A user SCOTT with the SYSDBA privilege tries to connect to the database instance from a remote machine using the command:Which authentication method would be used first?()A. authentication by password fileB. authentication by using certificates over SSLC. authentication by using the Oracle Internet DirectoryD. authentication by using the local OS of the database server
You are configuring an LDAP authentication server, and you want to configure role-mapping rules based on group membership. When you attempt to search for groups in the server catalog, no groups appear.Assuming the LDAP server is reachable and functioning properly, in the admin GUI. Which two parts of the configuration should you verify are correct?()A. Finding user entriesB. Authentication requiredC. LDAP Server TypeD. Determining group membership
A company is using RADIUS to authenticate login requests to its Juniper Networks routers. Usersshould still be able to authenticate using the local password database but only if the RADIUS server is unreachable. Which JUNOS software configuration accomplishes this goal?()A. authentication-order radius;B. authentication-order password;C. authentication-order [radius password];D. authentication-order [password radius];
Which two items does a user object in the UCS system contain?()A、Authentication and Authorization credentialsB、Microsoft Active Directory credentialsC、LDAP assignmentD、Role assignment
Which two statements about the open and shared key wireless-authentication methods are true? ()A、 Shared key authentication is considered more secure than open authentication.B、 Shared key authentication is considered less secure than open authentication.C、 If the WEP keys do not match using the open authentication method, the client will not authenticate, associate, and transfer data.D、 If the WEP keys do not match using the open authentication method, the client will still be able to authenticate and associate, but will not transfer data.E、 If the WEP keys do not match using the open authentication method, the client will still be able to authenticate, associate, and transfer data.
When a client using the SERVER_ENCRYPT authentication type connects to a server using the SERVER authentication type, what happens?()A、An error will occur.B、Data passed between the client and the server is encrypted.C、User IDs and passwords are passed to the server unencrypted.D、User IDs and passwords are encrypted before they are passed to the server.
Company.com network consists of a single Active Directory domain named Company.com.Company.com has an Exchange Server 2010 organization.The Company.com employees use Microsoft Office Outlook 2007 to connect to their mailboxes.RPC over HTTP and Auto discover are configured on Microsoft Office Outlook 2007. A new Company.com security policy requires that the employees connected to the domain does not need authentication when using Outlook Anywhere.However, those not connected t the domain needs to be authentication when using Outlook Anywhere.The employees need to comply with the new Company.com security policy. What should you do?()A、You should consider using Basic authentication on Outlook Anywhere and set up only Basic authentication on the RPC virtual directory.B、You should consider using NTLM authentication on Outlook Anywhere and set up Basic authentication and NTLM authentication on the RPC virtual directory.C、You should consider using NTLM authentication on Outlook Anywhere and set up only Basic authentication on the RPC virtual directory.D、You should consider using Basic authentication on Outlook Anywhere and set up Basic authentication and NTLM authentication on the RPC virtual directory.
What is the objective of the aaa authentication login console-in local command?()A、It specifies the login authentication method list named console-in using the local user database on the routerB、It specifies the login authorization method list named console-in using the local RADIUS username-password data baseC、It specifies the login authentication list named console-in using the local username- password data base on the routerD、It specifies the login authorization method list named console-in using the local username- password data base on the router
A company is using RADIUS to authenticate login requests to its Juniper Networks routers. Usersshould still be able to authenticate using the local password database but only if the RADIUS server is unreachable. Which JUNOS software configuration accomplishes this goal?()A、authentication-order radius;B、authentication-order password;C、authentication-order [radius password];D、authentication-order [password radius];
In a network using cisco autonomous access points running wds. What port is used for authentication by the local authentication service on an access point?()A、1813B、1645C、1646D、1812
Which statement about WSA user authentication is true?() A、 a single WSA can have multiple LDAP realmsB、 WSA supports LDAP but not NTLMC、 WSA supports NTLM but not LDAPD、 a single WSA can have up to two authentication realms: one for LDAP and for NTLM
In a network using Cisco autonomous access points running WDS, what port is used for authentication by the local authentication service on an access point?()A、1813B、1645C、1646D、1812
Which two statements about the open and shared key wireless-authentication methods are true?()A、shared key authentication is considered more secure than open authenticationB、shared key authentication is considered less secure than open authenticationC、if the WEP keys do not match using the open authentication method, the client will not authenticate, associate, and transfer dataD、if the WEP keys do not match using the open authentication method, the client will still be able to authenticate and associate, but will not transfer dataE、if the WEP keys do not match using the open authentication method, the client will still be able to authenticate, associate, and transfer data
On a standalone access point, client association using EAP-Cisco Wireless (Cisco-LEAP) isfailing, but association using EAP-PEAP is functioning. What needs to be enabled on the standalone accesspoint to correct this issue?()A、network EAPB、open authentication plus MACC、open authentication plus EAPD、a shared key
You work as a network administrator at, You have been asked to configure 802.1x port-based authentication. You notice that the client workstation is not compatible with 802.1x port-based authentication. What supported authentication server should be chosen?()A、TACACS with LEAP extensionsB、RADIUS with EAP extensionsC、TACACS+D、LDAP
An administrator is planning for a six node cluster but is concerned about the administration needed tomanage user accounts throughout the cluster. What PowerHA feature could the administrator use to reducethe administration overhead?()A、LDAP Authentication ModuleB、Smart Assist for Active DirectoryC、C-SPOC for user and password managementD、File Collections designating one node as the primary authentication node
Which activity supports the data integrity requirements of an application?()A、Using HTTPS as a protocolB、Using an LDAP security realmC、Using HTTP Basic authenticationD、Using forms-based authentication
You are configuring an LDAP authentication server, and you want to configure role-mapping rules based on group membership. When you attempt to search for groups in the server catalog, no groups appear.Assuming the LDAP server is reachable and functioning properly, in the admin GUI. Which two parts of the configuration should you verify are correct?()A、Finding user entriesB、Authentication requiredC、LDAP Server TypeD、Determining group membership
In your database,the LDAP_DIRECTORY_SYSAUTH initialization parameter has been set to YES and the users who need to access the database as DBAs have been granted SYSDBA enterprise role in Oracle Internet Directory (OID). SSL and the password file have been configured. A user SCOTT with the SYSDBA privilege tries to connect to the database instance from a remote machine using the command:$ SQLPLUS scott/tiger@DB01 AS SYSDBA where DB01 is the net service name. Which authentication method would be used first?() A、 authentication by password fileB、 authentication by using certificates over SSLC、 authentication by using the Oracle Internet DirectoryD、 authentication by using the local OS of the database server
单选题Which additional configuration must be completed when setting up role restrictions using certificates? ()ASet up a certificate authentication server.BConfigure the authentication realm to remember certificate information.CConfigure the authentication realm to use a certificate server for authentication.DConfigure a role mapping rule requiring certification information to map user to role.
单选题Which activity supports the data integrity requirements of an application?()AUsing HTTPS as a protocolBUsing an LDAP security realmCUsing HTTP Basic authenticationDUsing forms-based authentication
多选题You are configuring an LDAP authentication server, and you want to configure role-mapping rules based on group membership. When you attempt to search for groups in the server catalog, no groups appear.Assuming the LDAP server is reachable and functioning properly, in the admin GUI. Which two parts of the configuration should you verify are correct?()AFinding user entriesBAuthentication requiredCLDAP Server TypeDDetermining group membership
单选题What is the objective of the aaa authentication login console-in local command?()AIt specifies the login authentication method list named console-in using the local user database on the routerBIt specifies the login authorization method list named console-in using the local RADIUS username-password data baseCIt specifies the login authentication list named console-in using the local username- password data base on the routerDIt specifies the login authorization method list named console-in using the local username- password data base on the router
单选题On a standalone access point, client association using EAP-Cisco Wireless (Cisco-LEAP) is failing, butassociation using EAP-PEAP is functioning. What needs to be enabled on the standalone access point tocorrect this issue?()Aa shared keyBnetwork EAPCopen authentication plus EAPDopen authentication plus MAC
单选题In a network using cisco autonomous access points running wds. What port is used for authentication by the local authentication service on an access point?()A1813B1645C1646D1812
单选题Which statement about WSA user authentication is true?()A a single WSA can have multiple LDAP realmsB WSA supports LDAP but not NTLMC WSA supports NTLM but not LDAPD a single WSA can have up to two authentication realms: one for LDAP and for NTLM
多选题Which two statements about the open and shared key wireless-authentication methods are true? ()AShared key authentication is considered more secure than open authentication.BShared key authentication is considered less secure than open authentication.CIf the WEP keys do not match using the open authentication method, the client will not authenticate, associate, and transfer data.DIf the WEP keys do not match using the open authentication method, the client will still be able to authenticate and associate, but will not transfer data.EIf the WEP keys do not match using the open authentication method, the client will still be able to authenticate, associate, and transfer data.
单选题Using an LDAP authentication server, what do you configure to validate certificate attributes?()AUse the is exactly or contains operators.BCreate a user filter matching thedn of the certificate.CVerify that the certificate is issued by a publicly trusted cs.DMatch the certificate type and value with an attribute from theldap server.