多选题Which two security mechanisms can be directed through a sub-element of the element in a web application deployment descriptor?()AAuthorizationBData integrityCConfidentialityDAuthentication

多选题
Which two security mechanisms can be directed through a sub-element of the element in a web application deployment descriptor?()
A

Authorization

B

Data integrity

C

Confidentiality

D

Authentication


参考解析

解析: 暂无解析

相关考题:

Which two statements are true regarding the system-default security policy [edit security policies default-policy]?()(Choose two.) A. Traffic is permitted from the trust zone to the untrust zone.B. Intrazone traffic in the trust zone is permitted.C. All traffic through the device is denied.D. The policy is matched only when no other matching policies are found.

Which statement describes a security zone?() A. A security zone can contain one or more interfaces.B. A security zone can contain interfaces in multiple routing instances.C. A security zone must contain two or more interfaces.D. A security zone must contain bridge groups.

Which of the following is NOT true of security attacks?[A] Employees will keep up with security polices and awareness if they are highly-trained.[B] The rate of security attacks appears faster than the growth of the Internet.[C] One's computer system will never be secure.[D] Vulnerabilities can go through phones, wireless devices, and network appliances

For which two types of applications can the SDM provide wizards?()A、 security servicesB、 TACACS+servicesC、 Mpls servicesD、 Routing servicesE、 Ppp0e servicesF、 Poe services

Which two statements about the Wired Equivalent Privacy (WEP) encryption mechanism are true? ()A、the two methods of authentication using the WEP encryption are open and shared keyB、the 802.11 standard defines WEP security using 128-bit keysC、WEP can provide stronger authentication through the use of LEAP, PEAP, or EAP-FASTD、WEP is a scalable encryption solution that uses static keys for authenticationE、WEP security provides only one-way authenticationF、WEPv2 offers improved encryption by replacing the RC4 encryption mechanism with the AES (symmetric block cipher) mechanism

Which two statements are true regarding firewall user authentication?() (Choose two.)A、When configured for pass-through firewall user authentication, the user must first open a connection to the Junos security remote network resource.B、When configured for Web firewall user authentication only, the user must first open a connection to the Junos security remote network resource.C、If a Junos security device is configured for pass-through firewall user authentication, new sessions are automatically intercepted .D、If a Junos security device is configured for Web firewall user authentication, new sessions are automatically intercepted.

Which two actions can be configured to allow traffic to traverse an interface when zone-based security isbeing employed?()A、PassB、FlowC、AllowD、Inspect

Routers can be used to integrate a variety of services. Which two common services are often specified by businesses?()A、 Mitigation and ResponseB、 Fibre Channel over EthernetC、 IP communicationsD、 Data Center VirtualizationE、 VPN security

Which two protocols can have their headers compressed through MQC?()A、RTPB、RTSPC、HTTPD、TCPE、UDP

In which two ways does an integrated security solution reduce TCO? ()A、 by enabling businesses to leverage investments in the networkB、 by spending less time addressing attacksC、 by enforcing policy complianceD、 through admission control

Which security mechanism can be directed through the  element in a web deployment descriptor()?A、 authorizationB、 data integrityC、 confidentialityD、 authentication

Which two security mechanisms can be directed through a sub-element of the element in a web application deployment descriptor?()A、AuthorizationB、Data integrityC、ConfidentialityD、Authentication

Which two statements are true regarding the system-default security policy [edit security policies default-policy]?()(Choose two.)A、Traffic is permitted from the trust zone to the untrust zone.B、Intrazone traffic in the trust zone is permitted.C、All traffic through the device is denied.D、The policy is matched only when no other matching policies are found.

Which two of the following are the imposed restrictions to production redeployment in WebLogic Server ?()A、 Can’t cahnge application’s deployment targetsB、 Can’t cahnge application’s security modelC、 Can’t cahnge application’s node managerD、 Can’t cahnge application’s persistent store settings

You are designing the security for dial-up remote access to meet the business and technical requirements.   Which two mechanisms should you use? ()A、 EAP-TLS authenticationB、 MS-CHAP v2 authenticationC、 a stand-alone certification serverD、 an enterprise certification serverE、 MPPE 56-bit encryption

单选题Which statement describes a security zone?()AA security zone can contain one or more interfaces.BA security zone can contain interfaces in multiple routing instances.CA security zone must contain two or more interfaces.DA security zone must contain bridge groups.

多选题Which two security mechanisms protect the response stream?()AauthorizationBdata integrityCconfidentialityDauthentication

多选题Compare the features of the Cisco PIN architecture and Cisco validated Designs. Which two of the following statements are making sense?() (Choose two.)ACisco validated Designs can be implemented quickly without customer input.BCisco is focusing on the PIN architecture as a means to driving integrated networks.CThe Cisco PIN architecture is a critical mechanism for supporting integrated markets because it can be implemented quickly.DThe Cisco validated Designs program provides critical mechanisms for supporting integrated markets because the mechanisms can be implemented quickly.

多选题Which two authentication mechanisms provide weaker protection than other mechanisms?()AHTTP Basic AuthenticationBForm Based AuthenticationCHTTP Digest AuthenticationDHTTPS Client Authentication

单选题Which security mechanism can be directed through the  element in a web deployment descriptor()?A authorizationB data integrityC confidentialityD authentication

多选题Which two statements are true regarding firewall user authentication?() (Choose two.)AWhen configured for pass-through firewall user authentication, the user must first open a connection to the Junos security remote network resource.BWhen configured for Web firewall user authentication only, the user must first open a connection to the Junos security remote network resource.CIf a Junos security device is configured for pass-through firewall user authentication, new sessions are automatically intercepted .DIf a Junos security device is configured for Web firewall user authentication, new sessions are automatically intercepted.

多选题Which two protocols can have their headers compressed through MQC?()ARTPBRTSPCHTTPDTCPEUDP

多选题Which two firewall user authentication objects can be referenced in a security policy?()Aaccess profileBclient groupCclientDdefault profile

多选题Which two management-software applications can you use to manage the Cisco Catalyst Express 500 Series Switches?()ACisco Network AssistantBCisco Security Device ManagerCCisco Device ManagerDCisco Adaptive Security Device Manager

多选题Routers can be used to integrate a variety of services. Which two common services are often specified by businesses?()AMitigation and ResponseBFibre Channel over EthernetCIP communicationsDData Center VirtualizationEVPN security

多选题Which two network attack statements are true?()AAccess attacks can consist of password attacks,trust exploitation,port redirection,and man-in-the-middle attacks.BAccess attacks can consist of UDP and TCP SYN flooding,ICMP echo-request floods,and ICMP directed broadcasts.CDoS attacks can be reduced through the use of access control configuration,encryption,and RFC 2827 filtering.DDoS attacks can consist of IP spoofing and DDoS attacks.EIP spoofing can be reduced through the use of policy-based routing.FIP spoofing exploits known vulnerabilities in authentication services, FTP services,and web services to gain entry to web accounts,confidential databases,and other sensitive information.

多选题Which two commands can be used to monitor firewall user authentication?()Ashow access firewall-authenticationBshow security firewall-authentication usersCshow security audit logDshow security firewall-authentication history

多选题Which two mechanisms can be used to detect IPsec GRE tunnel failures?()ADead Peer Detection (DPD)BCDPCisakmp keepalivesDGRE keepalive mechanismEThe hello mechanism of the routing protocol across the IPsec tunnel