单选题You have successfully configured EchoClient and EchoApplication secured by Web Services Security Management (WSSM). You want to test that authorization is correctly being performed on the request. Which technique would allow you to do this?()Astop all running instances of PDACLDBlog in to the EchoClient as a different IBM Tivoli Access Manager for e-business (TAMeb) userCchange the TAMeb ACL policy applying to the Web Services namespaceDupdate the authorization module configuration in the Trust Service using the IBM Tivoli Federated Identity Manager Console

单选题
You have successfully configured EchoClient and EchoApplication secured by Web Services Security Management (WSSM). You want to test that authorization is correctly being performed on the request. Which technique would allow you to do this?()
A

stop all running instances of PDACLD

B

log in to the EchoClient as a different IBM Tivoli Access Manager for e-business (TAMeb) user

C

change the TAMeb ACL policy applying to the Web Services namespace

D

update the authorization module configuration in the Trust Service using the IBM Tivoli Federated Identity Manager Console


参考解析

解析: 暂无解析

相关考题:

Every morning, you inspect your company‘s development and staging servers. You do this to ensure that the servers have the same versions of all files in your Web application.For security reasons, you can only access the staging server through FTP.You need to synchronize files from the staging server so that the staging server matches the development server.You want to achieve this goal by using the minimum amount of administrative effort.Which tool should you use?()A. FTPB. XCOPYC. the Publish Web toolD. the Copy Web tool

You deploy your companys Internet Web site. You need to deny anonymous access to the Web site, allowing only authenticated users. Which code segment should you use?()A、authorization allow users="?"/ /authorizationB、authorization deny users="?"/ /authorizationC、authorization deny users="*"//authorizationD、authorization allow users="*"/ /authorization

You work as the IT professional in an international company which is named Wiikigo. You are experiencedin implementing and administering a network operating system. You are specialized in deploying servers,configuring Windows Server 2008 Terminal services and network application services, and configuring aweb services infrastructure. You manage a server that runs Windows Server 2008. The TS Gateway roleservice is installed on this server. You have to provide a security group access to the TS Gateway server. So what action should you perform?()A、A Terminal Services Resource Authorization Policy should be created and configured.B、A Terminal Services Connection Authorization Policy should be created and configured.C、The security group should be added to the Remote Desktop Users group.D、The security group should be added to the TS Web Access Computers group.

You want to allow all hosts on interface ge-0/0/0.0 to be able to ping the device’s ge-0/0/0.0 IP address.Where do you configure this functionality?()A、[edit interfaces]B、[edit security zones]C、[edit system services]D、[edit security interfaces]

You work as a database administrator for Supportcenter.cn. You want to administer your database servers, which are running on different host machines, using the Web-enabled grid control interface. You have configured the agent on the host machines. You have started the Oracle Database 10g Grid Control utility on your machine. Which two additional components would you configure to achieve this objective?()A、Application Server ControlB、Oracle Management ServiceC、Oracle Enterprise Manager RepositoryD、Oracle Enterprise Manager Database Control

Your company has an Active Directory domain. A server named Server2 runs Windows Server 2008. All client computers run Windows Vista.  You install the Terminal Services role,Terminal Services Web Access role service,and Terminal Services Gateway role service on Server2.  You need to ensure that all client computers have compliant firewall, antivirus software,and antispyware. Which two actions should you perform?()A、Configure Network Access Protection (NAP) on a server in the domain.B、Add the Terminal Services servers to the Windows Authorization Access domain local security group.C、Add the Terminal Services client computers to the Windows Authorization Access domain local security group.D、Enable the Request clients to send a statement of health option in the Terminal Services client access policy.

Every morning, you inspect your company's development and staging servers. You do this to ensure that the servers have the same versions of all files in your Web application.For security reasons, you can only access the staging server through FTP.You need to synchronize files from the staging server so that the staging server matches the development server.You want to achieve this goal by using the minimum amount of administrative effort. Which tool should you use?() A、FTPB、XCOPYC、the Publish Web toolD、the Copy Web tool

You upgrade 11 computers in the accounting department from Windows NT Workstation 4.0 to Windows 2000 Professional. All of the upgraded computers are configured to have the default security settings.   After the upgrade, users in the accounting department report that they can no longer run any financial or credit applications on their computers.   You want all accounting department users to be able to run these applications. You want to allow only the rights that allow users to run the applications.   What should you do?()A、Add each user account to the Power Users group on that user’s computer.B、Configure the financial and credit applications to run as services on the computers in the accounting department.C、Apply the Compatws.inf security template to the local security policy of the computers in the accounting department.D、Use the Computer Management console to configure separate memory spaces for each financial and credit application on the accounting department computers.

You work as the IT professional in an international company which is named Wiikigo. You are experiencedin implementing and administering a network operating system. You are specialized in deploying servers,configuring Windows Server 2008 Terminal services and network application services, and configuring aweb services infrastructure. You are in charge of a server that runs Windows Server 2008. The server hasthe Web Server (IIS) server role installed. The server contains a Web site that is configured to use onlyWindows Authentication. You have a security group named Group1 that contains several user accounts.Now you receive an order from the company management. According to the company requirement, youhave to prevent the members of Group1 from accessing a Web site. But you are not allowed prevent otherusers from accessing the Web site. Which Web site feature should you configure?()A、You should configure SSL SettingsB、You should configure AuthenticationC、You should configure Authorization RulesD、You should configure IIS Manager Permissions

You work as the IT professional in an international company which is named Wiikigo. You are experiencedin implementing and administering a network operating system. You are specialized in deploying servers,configuring Windows Server 2008 Terminal services and network application services, and configuring aweb services infrastructure. There is an Active Directory domain in your company. Windows Server 2008 isrun by a server named S02. All client computers run Windows Vista. You perform the installation of theTerminal Services server role, TS Web Access role service, and TS Gateway role service on S02. Youhave to make sure that all client computers have compliant firewall, antivirus software,and antispyware. What should you do to make sure of this?()A、The Request clients should be enabled to send a statement of health option in the Terminal Servicesclient access policy.B、Network Access Protection (NAP) should be configured on a server in the domain.C、The Terminal Services servers should be added to the Windows Authorization Access domain localsecurity group.D、The Terminal Services client computers should be added to the Windows Authorization Access domainlocal security group.

You have a combined Windows 2000 and Windows 98 network that contain sensitive data. You want to utilize as many new Windows 2000 security features as possible. You want to customize a security policy on each computer to ensure that data is kept confidential and secured. Allcomputers must still be able to communicate with each other over the network. What should you do?()A、Use the security configuration and analysis console to improve the HISECWS security  template file.B、Use the local computer policy to disable the access this computer from the network option.C、Use SECEDIT to reconfigure the computer default security settings to not allow anonymous  access to the computer.D、Create a policy that excludes write access to the windows 2000 computers then apply the  policy to all non-windows 2000 computers.E、None of the above, Windows 9X systems cannot be secured using security template files.

You need to design a security patch management strategy. Your solution must meet business and security requirements, and it must accommodate the company’s resource restrictions. What should you do?()A、Test and manually deploy updatesB、Deploy a Software Update Services (SUS) server. Test all updates and then approve them. Configure all client computers to automatically obtain updates from the serverC、Test all updates and then use a third-party utility to repackage updates in a Windows Installer file. Deploy the -.msi files by using Group PolicyD、Configure all client computers to use Automatic Updates to obtain security updates from the Windows Update Web site. Test all updates posted to the Windows Update Web site

You use Windows 2000 Professional on your desktop Computer. You schedule a task to run an MMC snap-in to perform configuration tasks on other computers. You notice that the task is not completing correctly. You manually start MMC. You add the snap-in. You are then able to successfully run the task. You verify that all of your other tasks are working correctly. You want to enable your tasks to complete successfully. What should you do?()A、Use Scheduled Tasks to configure the task to run under the security context of your account.B、Configure the Task Scheduler service account to use a local Administrator account and password.C、Use Computer Management to start the Messenger service and to configure the Messenger service to start automatically. D、Use Computer Management to start the Task Scheduler service and to configure the Task Scheduler service to start automatically.

You have an Exchange Server 2010 organization with mailbox server in a lab environment.The lab is not connected to internet.You need to verify autodiscover is configured correctly for client connectivity.What will you use?()A、Best practice analyzerB、Remote connectivity analyzerC、Test-MAPIconnectivity cmdletD、Test-outlookWeb services cmdlet

You have a server that runs Windows Server 2008. The server has the Terminal Services Gateway (TS Gateway) role service installed.  You need to provide a security group access to the TS Gateway server. What should you do?()A、Add the security group to the Remote Desktop Users group.B、Add the security group to the TS Web Access Computers group.C、Create and configure a Resource Authorization Policy.D、Create and configure a Connection Authorization Policy.

You have a server that runs Windows Server 2008. The server has the Web Server (IIS) server role installed.   The server contains a Web site that is configured to use only Windows Authentication. You have a security group named Group1 that contains several user accounts.  You need to prevent the members of Group1 from accessing a Web site. You must not prevent other users from accessing the Web site.  Which Web site feature should you configure?()A、AuthenticationB、Authorization RulesC、IIS Manager PermissionsD、SSL Settings

You have a share on your local computer. Someone has been intentionally damaging your files.  You want to be able to know which account is doing this. What do you do? ()A、Turn on auditing for objects in the Local Security Policy and Select 'Process Tracking'. B、Turn on auditing for objects in the Local Security Policy and Select 'Object Access'. C、Use Windows Explorer to turn on auditing for the specific files. D、Have the administrator for domains log you on as an administrator and enable auditing for a  specific file. E、Turn on auditing for objects in the Local Security Policy and Select 'Account Management'. F、Allow only one account at a time to log on to your shared folder. Check the event viewer to  see who logged on.

You have successfully configured EchoClient and EchoApplication secured by Web Services Security Management (WSSM). You want to test that authorization is correctly being performed on the request. Which technique would allow you to do this?()A、stop all running instances of PDACLDB、log in to the EchoClient as a different IBM Tivoli Access Manager for e-business (TAMeb) userC、change the TAMeb ACL policy applying to the Web Services namespaceD、update the authorization module configuration in the Trust Service using the IBM Tivoli Federated Identity Manager Console

单选题You have a server that runs Windows Server 2008. The server has the Terminal Services Gateway (TS Gateway) role service installed.  You need to provide a security group access to the TS Gateway server. What should you do?()AAdd the security group to the Remote Desktop Users group.BAdd the security group to the TS Web Access Computers group.CCreate and configure a Resource Authorization Policy.DCreate and configure a Connection Authorization Policy.

单选题You upgrade 11 computers in the accounting department from Windows NT Workstation 4.0 to Windows 2000 Professional. All of the upgraded computers are configured to have the default security settings.   After the upgrade, users in the accounting department report that they can no longer run any financial or credit applications on their computers.   You want all accounting department users to be able to run these applications. You want to allow only the rights that allow users to run the applications.   What should you do?()AAdd each user account to the Power Users group on that user’s computer.BConfigure the financial and credit applications to run as services on the computers in the accounting department.CApply the Compatws.inf security template to the local security policy of the computers in the accounting department.DUse the Computer Management console to configure separate memory spaces for each financial and credit application on the accounting department computers.

单选题Every morning, you inspect your company's development and staging servers. You do this to ensure that the servers have the same versions of all files in your Web application.For security reasons, you can only access the staging server through FTP.You need to synchronize files from the staging server so that the staging server matches the development server.You want to achieve this goal by using the minimum amount of administrative effort. Which tool should you use?()AFTPBXCOPYCthe Publish Web toolDthe Copy Web tool

单选题You use Windows 2000 Professional on your desktop Computer. You schedule a task to run an MMC snap-in to perform configuration tasks on other computers. You notice that the task is not completing correctly. You manually start MMC. You add the snap-in. You are then able to successfully run the task. You verify that all of your other tasks are working correctly. You want to enable your tasks to complete successfully. What should you do?()AUse Scheduled Tasks to configure the task to run under the security context of your account.BConfigure the Task Scheduler service account to use a local Administrator account and password.CUse Computer Management to start the Messenger service and to configure the Messenger service to start automatically. DUse Computer Management to start the Task Scheduler service and to configure the Task Scheduler service to start automatically.

单选题You have a combined Windows 2000 and Windows 98 network that contain sensitive data. You want to utilize as many new Windows 2000 security features as possible. You want to customize a security policy on each computer to ensure that data is kept confidential and secured. Allcomputers must still be able to communicate with each other over the network. What should you do?()AUse the security configuration and analysis console to improve the HISECWS security  template file.BUse the local computer policy to disable the access this computer from the network option.CUse SECEDIT to reconfigure the computer default security settings to not allow anonymous  access to the computer.DCreate a policy that excludes write access to the windows 2000 computers then apply the  policy to all non-windows 2000 computers.ENone of the above, Windows 9X systems cannot be secured using security template files.

单选题You work as the IT professional in an international company which is named Wiikigo. You are experiencedin implementing and administering a network operating system. You are specialized in deploying servers,configuring Windows Server 2008 Terminal services and network application services, and configuring aweb services infrastructure. You manage a server that runs Windows Server 2008. The TS Gateway roleservice is installed on this server. You have to provide a security group access to the TS Gateway server. So what action should you perform?()AA Terminal Services Resource Authorization Policy should be created and configured.BA Terminal Services Connection Authorization Policy should be created and configured.CThe security group should be added to the Remote Desktop Users group.DThe security group should be added to the TS Web Access Computers group.

单选题You want to allow all hosts on interface ge-0/0/0.0 to be able to ping the device’s ge-0/0/0.0 IP address.Where do you configure this functionality?()A[edit interfaces]B[edit security zones]C[edit system services]D[edit security interfaces]

单选题You work as the IT professional in an international company which is named Wiikigo. You are experiencedin implementing and administering a network operating system. You are specialized in deploying servers,configuring Windows Server 2008 Terminal services and network application services, and configuring aweb services infrastructure. You are in charge of a server that runs Windows Server 2008. The server hasthe Web Server (IIS) server role installed. The server contains a Web site that is configured to use onlyWindows Authentication. You have a security group named Group1 that contains several user accounts.Now you receive an order from the company management. According to the company requirement, youhave to prevent the members of Group1 from accessing a Web site. But you are not allowed prevent otherusers from accessing the Web site. Which Web site feature should you configure?()AYou should configure SSL SettingsBYou should configure AuthenticationCYou should configure Authorization RulesDYou should configure IIS Manager Permissions

单选题You have successfully configured EchoClient and EchoApplication secured by Web Services Security Management (WSSM). You want to test that authorization is correctly being performed on the request. Which technique would allow you to do this?()Astop all running instances of PDACLDBlog in to the EchoClient as a different IBM Tivoli Access Manager for e-business (TAMeb) userCchange the TAMeb ACL policy applying to the Web Services namespaceDupdate the authorization module configuration in the Trust Service using the IBM Tivoli Federated Identity Manager Console