网友您好, 请在下方输入框内输入要搜索的题目:

题目内容 (请给出正确答案)
单选题
Which security mechanism is employed only on the server-side to limit access to resources or components?()
A

 authorization

B

 data integrity

C

 confidentiality

D

 authentication


参考答案

参考解析
解析: 暂无解析
更多 “单选题Which security mechanism is employed only on the server-side to limit access to resources or components?()A  authorizationB  data integrityC  confidentialityD  authentication” 相关考题
考题 Firewall is a (74) mechanism used by organizations to protect their LANs from the Internet.(74)A. reliableB. stableC. peacefulD. security

考题 When adding a new user and assigning a role, which user role has "read only" rights to theconfiguration and operational states? () A.userB.read_onlyC.target_operatorD.security_operator

考题 Firewall is a(74) mechanism used by organizations to protect their LANs from the Internet.A.reliableB.stableC.peacefulD.security

考题 Which of the following is true about Outbound Malware Scanning?() A、 It has its own policy table.B、 It is configured as part of Access Policies.C、 It is configured as part ofIronPort data Security.D、 It only has global configuration.

考题 Which two statements about queuing mechanisms are true? ()A、FIFO queuing is only appropriate for slower serial interfacesB、weighted fair queuing is the default queuing mechanism used for all but slower than E1 rate interfacesC、only one queuing mechanism type can be applied to an interfaceD、weighted fair queuing does not require the configuration of access lists to classify traffic  E、flow-based weighted fair queuing provides for queues to be serviced in a round-robin fashion

考题 The PIX Security Appliance feature set is a subset of the ASA Security Appliance feature set. Which two of these features are only supported by an ASA Security Appliance? (Choose two.)()A、 security contextsB、- transparent firewallC、 WebVPND、 Active/Active failoverE、 low latency queuingF、 AIP-SSM intrusion prevention

考题 Which of these statements accurately identifies how Unicast Reverse Path Forwarding can be employed to prevent the use of malformed or forged IP sources addresses?()A、It is applied only on the input interface of a router.B、It is applied only on the output interface of a router.C、It can be configured either on the input or output interface of a router.D、It cannot be configured on a router interface.E、It is configured under any routing protocol process.

考题 Which of the following is true when considering the Server load-balancing design within the E-Commerce Module of the Enterprise Campus network?()A、 Routed mode requires the ACE run OSPF or EIGRPB、 Bridged mode switches a packet between the public and the private subnets when it sees itsMAC address as the destinationC、 Two-armed mode will place the SLB inline to the servers, with different client-side and a server-side VLANsD、 One-armed mode, which uses the same VLAN for the client, the ACE, and the servers, requiresa traffic-diversion mechanism to ensure the traffic return from the server passes though the ACE

考题 Which statement is true about the components of a queuing mechanism?()A、Each subinterface has its own hardware queue and can experience congestion just like its main interfaceB、Hardware queuing is only used if the software queues are experiencing congestion.C、Hardware queues and software queues are not used concurrently.D、The hardware queuing system always uses the FIFO queuing mechanism.

考题 Which two statements about the Wired Equivalent Privacy (WEP) encryption mechanism are true? ()A、the two methods of authentication using the WEP encryption are open and shared keyB、the 802.11 standard defines WEP security using 128-bit keysC、WEP can provide stronger authentication through the use of LEAP, PEAP, or EAP-FASTD、WEP is a scalable encryption solution that uses static keys for authenticationE、WEP security provides only one-way authenticationF、WEPv2 offers improved encryption by replacing the RC4 encryption mechanism with the AES (symmetric block cipher) mechanism

考题 Which security mechanism is employed only on the server-side to limit access to resources or components?()A、 authorizationB、 data integrityC、 confidentialityD、 authentication

考题 When adding a new user and assigning a role, which user role has "read only" rights to theconfiguration and operational states? ()A、userB、read_onlyC、target_operatorD、security_operator

考题 You are employed as a DBA in an organization. You are informed that the record of EMP_NO 1000 is missing from the SCOTT.EMP table. You are required to identify the user who deleted the record, the SQL statement that will undo the deletion, and the transaction ID of the transaction that deleted the employee record. Which feature will you use to perform the tasks?()A、 Only the Flashback TableB、 Both the Flashback Transaction Query and the Flashback Version QueryC、 Only the Flashback DropD、 Only the Flashback Version

考题 Which two actions can be configured to allow traffic to traverse an interface when zone-based security isbeing employed?()A、PassB、FlowC、AllowD、Inspect

考题 You need to configure port security on switch R1.  Which two statements are true about this  technology? ()A、 Port security can be configured for ports supporting VoIP.B、 With port security configured, four MAC addresses are allowed by default.C、 The network administrator must manually enter the MAC address for each device in order for  the switch to allow connectivity.D、Withsecurity configured, only one MAC addresses is allowed by default.  E、 Port security cannot be configured for ports supporting VoIP.

考题 An administrator needs to update the anti-virus, security patches, BIOS, and the web server software on a production system. Which of the following is the BEST method to accomplish this?()A、Update anti-virus, security patches, BIOS software, and then the web software.B、Update the web software, security patches, anti-virus, and then the BIOS.C、Update security patches, BIOS, web software, and then the anti-virus.D、The order does not matter, only one change at a time should be done.

考题 Which security mechanism can be directed through the  element in a web deployment descriptor()?A、 authorizationB、 data integrityC、 confidentialityD、 authentication

考题 You need to design a security strategy for the DHCP servers in the Seattle office. Which two actions should you perform?()A、Disable all unnecessary services on each DHCP serverB、Modify the discretionary access control lists (DACLs) in Active Directory so that only members of the Enterprise Admins security group can authorize additional DHCP serversC、Use an IPSec policy that allows only the packets necessary for DHCP and domain membership for each DHCP serverD、Install a digital certificate for SSL on each DHCP server

考题 单选题Which the security mechanism uses the concept of a realm?()A  authorizationB  data integrityC  confidentialityD  authentication

考题 单选题You are employed as a DBA in an organization. You are informed that the record of EMP_NO 1000 is missing from the SCOTT.EMP table. You are required to identify the user who deleted the record, the SQL statement that will undo the deletion, and the transaction ID of the transaction that deleted the employee record. Which feature will you use to perform the tasks?()A  Only the Flashback TableB  Both the Flashback Transaction Query and the Flashback Version QueryC  Only the Flashback DropD  Only the Flashback Version

考题 单选题Which statement is true about the components of a queuing mechanism?()A Each subinterface has its own hardware queue and can experience congestion just like its main interfaceB Hardware queuing is only used if the software queues are experiencing congestion.C Hardware queues and software queues are not used concurrently.D The hardware queuing system always uses the FIFO queuing mechanism.

考题 单选题Which of the following is true when considering the Server load-balancing design within the E-Commerce Module of the Enterprise Campus network?()A  Routed mode requires the ACE run OSPF or EIGRPB  Bridged mode switches a packet between the public and the private subnets when it sees itsMAC address as the destinationC  Two-armed mode will place the SLB inline to the servers, with different client-side and a server-side VLANsD  One-armed mode, which uses the same VLAN for the client, the ACE, and the servers, requiresa traffic-diversion mechanism to ensure the traffic return from the server passes though the ACE

考题 多选题The PIX Security Appliance feature set is a subset of the ASA Security Appliance feature set. Which two of these features are only supported by an ASA Security Appliance? (Choose two.)()Asecurity contextsB- transparent firewallCWebVPNDActive/Active failoverElow latency queuingFAIP-SSM intrusion prevention

考题 多选题Which two statements about queuing mechanisms are true? ()AFIFO queuing is only appropriate for slower serial interfacesBweighted fair queuing is the default queuing mechanism used for all but slower than E1 rate interfacesConly one queuing mechanism type can be applied to an interfaceDweighted fair queuing does not require the configuration of access lists to classify trafficEflow-based weighted fair queuing provides for queues to be serviced in a round-robin fashion

考题 单选题Which security mechanism can be directed through the  element in a web deployment descriptor()?A  authorizationB  data integrityC  confidentialityD  authentication

考题 单选题Which security mechanism is employed only on the server-side to limit access to resources or components?()A  authorizationB  data integrityC  confidentialityD  authentication

考题 单选题Which security mechanism uses the concept of a realm?()A AuthorizationB Data integrityC ConfidentialityD Authentication

考题 单选题Which of these statements accurately identifies how Unicast Reverse Path Forwarding can be employed to prevent the use of malformed or forged IP sources addresses?()A It is applied only on the input interface of a router.B It is applied only on the output interface of a router.C It can be configured either on the input or output interface of a router.D It cannot be configured on a router interface.E It is configured under any routing protocol process.