网友您好, 请在下方输入框内输入要搜索的题目:

题目内容 (请给出正确答案)

Which two are true about authentication?()

  • A、Form-based logins should NOT be used with HTTPS.
  • B、When using Basic Authentication the target server is NOT authenticated.
  • C、J2EE compliant web containers are NOT required to support the HTTPS protocol.
  • D、Web containers are required to support unauthenticated access to unprotected web resources.

参考答案

更多 “Which two are true about authentication?()A、Form-based logins should NOT be used with HTTPS.B、When using Basic Authentication the target server is NOT authenticated.C、J2EE compliant web containers are NOT required to support the HTTPS protocol.D、Web containers are required to support unauthenticated access to unprotected web resources.” 相关考题
考题 Which two statements are true regarding firewall user authentication?() (Choose two.) A. When configured for pass-through firewall user authentication, the user must first open a connection to the Junos security remote network resource.B. When configured for Web firewall user authentication only, the user must first open a connection to the Junos security remote network resource.C. If a Junos security device is configured for pass-through firewall user authentication, new sessions are automatically intercepted .D. If a Junos security device is configured for Web firewall user authentication, new sessions are automatically intercepted.

考题 Which two pieces of information are needed when declaring the web resource collection in the deployment descriptor?()A、 the URL pattern that requires authorizationB、 the HTTP methods that require authorizationC、 the users allowed access to the web resourceD、 the J2EE roles allowed access to the web resourceE、 the authentication mechanism required by the web resource

考题 Company.com network consists of a single Active Directory domain named  Company.com.Company.com has an Exchange Server 2010 organization.The Company.com employees use Microsoft Office Outlook 2007 to connect to their mailboxes.RPC over HTTP and Auto discover are configured on Microsoft Office Outlook 2007. A new Company.com security policy requires that the employees connected to the domain does not need authentication when using Outlook Anywhere.However, those not connected t the domain needs to be authentication when using Outlook Anywhere.The employees need to comply with the new Company.com security policy.  What should you do?()A、You should consider using Basic authentication on Outlook Anywhere and set up only Basic authentication on the RPC virtual directory.B、You should consider using NTLM authentication on Outlook Anywhere and set up Basic authentication and NTLM authentication on the RPC virtual directory.C、You should consider using NTLM authentication on Outlook Anywhere and set up only Basic authentication on the RPC virtual directory.D、You should consider using Basic authentication on Outlook Anywhere and set up Basic authentication and NTLM authentication on the RPC virtual directory.

考题 You work as the IT professional in an international company which is named Wiikigo. You are experiencedin implementing and administering a network operating system. You are specialized in deploying servers,configuring Windows Server 2008 Terminal services and network application services, and configuring aweb services infrastructure. A Web site is hosted by your company, and the web site is on a server thatruns Windows Server 2008. The Web Server (IIS) server role is installed on the server. The company configures SSL on the Web site for virtual directories which encryption is needed. A new Web application is implemented on the Web site. Its own logon page named userlogin.aspx is contained by the new application. Forms Authentication is enabled in the Web site properties. Since you are the technical support, you are required to configure the Web site so as to authenticate user accounts by utilizing userlogin.aspx. Which action should be performed to achieve the goal?()A、To achieve the goal, the Login URL property for the Forms Authentication Settings should be configured to the userlogin.aspx filename.B、To achieve the goal, the Default Document setting should be configured to add the userlogin.aspx filename in the Web site properties.C、To achieve the goal, the Forms Authentication Settings should be configured to Require SSL.D、To achieve the goal, the Name property of the Cookie Settings should be configured to the userlogin.aspx filename.

考题 Which two statements are true regarding firewall user authentication?() (Choose two.)A、When configured for pass-through firewall user authentication, the user must first open a connection to the Junos security remote network resource.B、When configured for Web firewall user authentication only, the user must first open a connection to the Junos security remote network resource.C、If a Junos security device is configured for pass-through firewall user authentication, new sessions are automatically intercepted .D、If a Junos security device is configured for Web firewall user authentication, new sessions are automatically intercepted.

考题 In the wireless Advanced Feature Set using lightweight access points, a virtual interface is used when supporting which of the following features?()A、PSK authenticationB、EAP authenticationC、WPA authenticationD、Web authentication

考题 Which two authentication mechanisms provide weaker protection than other mechanisms?()A、 HTTP Basic AuthenticationB、 Form Based AuthenticationC、 HTTP Digest AuthenticationD、 HTTPS Client Authentication

考题 Which activity supports the data integrity requirements of an application?()A、Using HTTPS as a protocolB、Using an LDAP security realmC、Using HTTP Basic authenticationD、Using forms-based authentication

考题 Which basic authentication type is optional for a J2EE 1.4 compliant web container?()A、HTTP Basic AuthenticationB、Form Based AuthenticationC、HTTP Digest AuthenticationD、HTTPS Client Authentication

考题 When using a form-based authentication, which action must be used in the login form?()A、 j_loginB、 j_get_userC、 j_login_checkD、 j_get_securityE、 j_security_check

考题 Which two statements are true about using the isUserInRole method to implement security in a Java EEapplication?()A、It can be invoked only from the doGet or doPost methods.B、It can be used independently of the getRemoteUser method.C、Can return "true" even when its argument is NOT defined as a valid role name in the deployment descriptor.D、Using the isUserInRole method overrides any declarative authentication related to the method in which it is invoked.

考题 Which two statements regarding external authentication servers for firewall userauthentication are true?()A、Up to three external authentication server types can be used simultaneously.B、Only one external authentication server type can be used simultaneously.C、If the local password database is not configured in the authentication order, and the configured authentication server is unreachable, authentication is not performed.D、If the local password database is not configured in the authentication order, and the configured authentication server rejects the authentication request, authentication is not performed

考题 Which two statements regarding external authentication servers for firewall user authentication are true?() (Choose two.)A、Up to three external authentication server types can be used simultaneously.B、Only one external authentication server type can be used simultaneously.C、If the local password database is not configured in the authentication order, and the configured authentication server bypassed.D、If the local password database is not configured in the authentication order, and the configured authentication server authentication is rejected.

考题 Which two statements are true regarding firewall user authentication?()A、When configured for pass-through firewall user authentication, the user must first open a connection to the JUNOS security platform before connecting to a remote network resource.B、When configured for Web firewall user authentication only, the user must first open a connection to the JUNOS security platform before connecting to a remote network resource.C、If a JUNOS security device is configured for pass-through firewall user authentication, new sessions are automatically intercepted to perform authentication.D、If a JUNOS security device is configured for Web firewall user authentication, new sessions are automatically intercepted to perform authentication.

考题 Your company has a server that runs Windows Server 2008. The server has the Web Server (IIS) role installed.  You need to activate SSL for the default Web site.  Which two actions should you perform?()A、Obtain and import a server certificate by using the IIS Manager console.B、Select the Generate Key option in the Machine Key dialog box for the default Web site.C、Add bindings for the HTTPS protocol to the default Web site by using the IIS Manager console.D、Install the Digest Authentication component for the Web server role by using the Server Manager console.

考题 You are the network administrator for your company. The network consists of a single Active Directory domain. All servers run Windows Server 2003. The network contains a Web server that runs IIS 6.0 and hosts a secure intranet site. All users are required to connect to the intranet site by authenticating and using HTTPS. However, because an automated Web application must connect to the Web site by using HTTP, you cannot configure the intranet site to require HTTPS.  You need to collect information about which users are connecting to the Web site by using HTTPS.   What should you do?()A、Check the application log on the Web server.B、Use Network Monitor to capture network traffic on the Web server.C、Review the log files created by IIS on the Web server.D、Configure a performance log to capture all Web service counters. Review the performance log data.

考题 You work as the IT professional in an international company which is named Wiikigo. You are experiencedin implementing and administering a network operating system. You are specialized in deploying servers,configuring Windows Server 2008 Terminal services and network application services, and configuring aweb services infrastructure. You are in charge of a server that runs Windows Server 2008. The server hasthe Web Server (IIS) server role installed. The Web developer at your company creates a new Web sitethat runs an ASP.NET 3.0 Web application. The ASP.NET Web application must run under a securitycontext that is separate from any other ASP.NET application on the Web server. You create a local useraccount and grant account rights and permissions to run the ASP.NET Web application. Authentication forthe new Web site should be configured to support the Web application. What action should you perform?()A、The ASP.NET Impersonation setting should be configured to Enabled. Edit the ASP.NET Impersonation setting by specifying the new local user account.B、The Windows Authentication setting should be configured to Enabled.C、The Forms Authentication setting should be configured to Enabled by using all the default settings.D、The ASP.NET State Service should be configured to log on to the new local user account by using the Services console.

考题 You need to design an access control strategy for the external and intranet Web sites. Which two actions should you perform?()A、Enable SSL on the external Web site by using a Microsoft cryptographic service provider (CSP)B、Enable Microsoft .NET Passport authentication on the external Web site. Use Passport Level 0 with SSL on the external Web siteC、Enable SSL on the external Web site by using a commercial digital certificateD、Enable SSL on the intranet Web site by using an internal server certificateE、Enable SSL on the external Web site by using an internal server certificate

考题 You manage a server that runs Windows Server 2008. The server has the Web Server (IIS) role installed. The Web developer at your company creates a new Web site that runs an ASP.NET 3.0 Web application.  The ASP.NET Web application must run under a security context that is separate from any other ASP.NET application on the Web server.  You create a local user account and grant account rights and permissions to run the ASP.NET Web application.  You need to configure authentication for the new Web site to support the Web application. What should you do?()A、Configure the Windows Authentication setting to Enabled.B、Configure the Forms Authentication setting to Enabled by using all the default settings.C、Configure the ASP.NET State service to log on to the new local user account by using the Services console.D、Configure the ASP.NET Impersonation setting to Enabled. Edit the ASP.NET Impersonation setting by specifying the new local user account.

考题 You are an IIS Web server administrator implementing authentication settings for a new Web site.According to the requirements for the Human Resources Web site, users should be prompted forauthentication information when they attempt to access the site. The site will be accessed only by userswho have accounts in your organization’s Active Directory domain. You have already configured the filesystem permissions for the content based on the appropriate settings. You also want to maximize securityof the site. Which two actions should you take to meet these requirements?()A、Enable Windows authentication.B、Enable basic authentication.C、Disable anonymous authentication.D、Enable anonymous authentication.

考题 You manage a server that runs Windows Server 2008. The server has the Web Server (IIS) role installed. The server hosts an Internet-accessible Web site that has a virtual directory named /orders/. A Web server certificate is installed and an SSL listener has been configured for the Web site. The /orders/ virtual directory must meet the following company policy requirements: Be accessible to authenticated users only. Allow authentication types to support all browsers. Encrypt all authentication traffic by using HTTPS.  All other directories of the Web site must be accessible to anonymous users and be available withoutSSL.  You need to configure the /orders/ virtual directory to meet the company policy requirements.  Which two actions should you perform?()A、Configure the Web site to the Require SSL setting.B、Configure the /orders/ virtual directory to the Require SSL setting.C、Configure the Digest Authentication setting to Enabled for the /orders/ virtual directory.D、Configure the Basic Authentication setting to Enabled and the Anonymous Authentication setting to Disabled for the Web site.E、Configure the Basic Authentication setting to Enabled and the Anonymous Authentication setting to Disabled for the /orders/ virtual directory.

考题 You administer a SQL Server 2008 Reporting Services (SSRS) instance. You plan to design an authentication method for SSRS reports that use SQL Server data connections. You need to ensure that all SSRS reports communicate to the SQL Server instance by using the Kerberos authentication protocol. What should you do?()A、Configure the default Web site on the instance to use the Integrated Security type.B、Configure the application pool used by the default Web site to use a domain account. C、Configure the default Web site on the instance to use the Secure Sockets Layer (SSL) protocol.D、Register a service principal name (SPN) in the Active Directory directory service for the SSRSinstance.

考题 多选题Which two are true about authentication?()AForm-based logins should NOT be used with HTTPS.BWhen using Basic Authentication the target server is NOT authenticated.CJ2EE compliant web containers are NOT required to support the HTTPS protocol.DWeb containers are required to support unauthenticated access to unprotected web resources.

考题 多选题Which two pieces of information are needed when declaring the web resource collection in the deployment descriptor?()Athe URL pattern that requires authorizationBthe HTTP methods that require authorizationCthe users allowed access to the web resourceDthe J2EE roles allowed access to the web resourceEthe authentication mechanism required by the web resource

考题 多选题Which two statements about using the CHAP authentication mechanism in a PPP link are true?()ACHAP uses a two-way handshakeBCHAP authentication periodically occurs after link establishmentCCHAP has no protection from playback attacksDCHAP authentication is performed only upon link establishmentECHAP uses a three-way handshakeFCHAP authentication passwords are sent in plaintext

考题 单选题Which basic authentication type is optional for a J2EE 1.4 compliant web container?()A HTTP Basic AuthenticationB Form Based AuthenticationC HTTP Digest AuthenticationD HTTPS Client Authentication

考题 单选题Which the basic authentication type is optional for a J2EE 1.4 compliant web container?()A  HTTP Basic AuthenticationB  Form Based AuthenticationC  HTTP Digest AuthenticationD  HTTPS Client Authentication