网友您好, 请在下方输入框内输入要搜索的题目:

题目内容 (请给出正确答案)
单选题
In form-based authentication, what must be included in the HTML returned from the URL specified by the  element?()
A

 a base-64 encoded user name and password

B

 a form that POSTs to the j_security_check URL

C

 an applet that requests the user name and password from the user

D

 a hidden field that supplies the login-constraint used by the application


参考答案

参考解析
解析: 暂无解析
更多 “单选题In form-based authentication, what must be included in the HTML returned from the URL specified by the  element?()A  a base-64 encoded user name and passwordB  a form that POSTs to the j_security_check URLC  an applet that requests the user name and password from the userD  a hidden field that supplies the login-constraint used by the application” 相关考题
考题 All people must go through security check, _____ airport staff.A: to includeB: includingC: includesD: included

考题 When using RADIUS as an external authentication method for 802.1X authentication for the Junos Pulse Access Control Service, what must you do to ensure that the RADIUS authentication works properly?() A. Configure IP helper to forward the authentication requests from the clients to the external RADIUS serverB. Configure the supplicant as anexternal authentication serverC. Configure RADIUS proxy on the realmD. Specify the correct RADIUS port 389 on the Junos Pulse Access Control Service

考题 Refer to the exhibit. What is required to complete the IPv6 routing configurations shown?() A. Interface authentication must be configuredB. The routing processes must be configured with an area IDC. IP unicast routing must be enabledD. IPv4 ad dresses must be applied to the interfaces

考题 What are two steps that must be taken when mitigating a worm attack?()A、Inoculate systems by applying update patches. B、Limit traffic rate. C、Apply authentication. D、Quarantine infected machines. E、Enable anti-spoof measures.

考题 When configuring the Cisco VPN Client,what action is required prior to installing Mutual Group Authentication?()A、Transparent tunneling must be enabled.B、A valid root certificate must be installed.C、A group pre-shared secret must be properly configured.D、The option to "Allow Local LAN Access" must be selected.

考题 What are the three OSPF authentication methods supported on the ERX Edge Router?()A、 null passwordB、 simple passwordC、 message digest 5D、 Password Authentication ProtocolE、 Challenge Handshake Authentication Protocol

考题 Which two are true about authentication?()A、Form-based logins should NOT be used with HTTPS.B、When using Basic Authentication the target server is NOT authenticated.C、J2EE compliant web containers are NOT required to support the HTTPS protocol.D、Web containers are required to support unauthenticated access to unprotected web resources.

考题 In the Company wireless LAN,  what is the function of the Service Set Identifier (SSID)?()A、 The SSID must match on both the Company client and the Company access point and provides  MAC Address Authentication to authenticate the client to the access point.B、 The SSID should be configured on the Company client site only and provides data-privacy  functions and authentication to the access point.C、 The SSID must match on both the Company client and the Company access point and provides encryption keys for authentication to the access point.D、 The SSID must match on both the Company client and the Company access point. The SSID is  advertised in plain-text in the access point beacon messages.  E、 None of the other alternatives apply

考题 What must be included in a SOAP fault message when an error occurs due to a value in the message Body element?()A、 A detail elementB、 A Body fault codeC、 An application-specific fault codeD、 A fault string element with a value of "Body"

考题 In form-based authentication, what must be included in the HTML returned from the URL specified by the  element?()A、 a base-64 encoded user name and passwordB、 a form that POSTs to the j_security_check URLC、 an applet that requests the user name and password from the userD、 a hidden field that supplies the login-constraint used by the application

考题 When using a form-based authentication, which action must be used in the login form?()A、 j_loginB、 j_get_userC、 j_login_checkD、 j_get_securityE、 j_security_check

考题 Which routers must be configured with the same authentication string when configuring OSPF authentication?()A、all routers on a linkB、all routers in an areaC、all external OSPF peersD、all routers in an OSPF domain

考题 Which two statements are true regarding firewall user authentication?()A、When configured for pass-through firewall user authentication, the user must first open a connection to the JUNOS security platform before connecting to a remote network resource.B、When configured for Web firewall user authentication only, the user must first open a connection to the JUNOS security platform before connecting to a remote network resource.C、If a JUNOS security device is configured for pass-through firewall user authentication, new sessions are automatically intercepted to perform authentication.D、If a JUNOS security device is configured for Web firewall user authentication, new sessions are automatically intercepted to perform authentication.

考题 our company has a main office and 15 branch offices. The company has a single active directory domain. All servers run windows server 2008.You need to ensure that the VPN connections between the office and the branch offices meet the following requirements:All data must be encrypted by using end-to-end encryption.The vpn connection must use computer-level authentication.User names and passwords cannot be used for authentication.What should do?()A、Configure an ipsec connection to use tunnel mode and preshared key authentication.B、Configure a PPTP connection to use version 2 of the MS-CHAP v2 authentication.C、Configure a L2TP/IPsec connection to use the EAP-TLS authentication.D、Configure a L2TP/IPsec connection to use version 2 of the MS-CHAP v2 authentication.

考题 You need to design an authentication solution for the wireless network. Your solution must meet the security requirements. What should you do?()A、Create wireless VPNs using L2TP/IPSec between the client computers to the wireless access pointB、Configure IEEE 802.1x authentication with smart cardsC、Configure the wireless network to use Wired Equivalent Privacy (WEP)D、Install and configure an Internet Authentication Service (IAS) server

考题 Your company has a main office and 15 branch offices. The company has a single Active Directory domain. All servers run Windows Server 2008. You need to ensure that the VPN connections between the main office and the branch offices meet the following requirements:All data must be encrypted by using end-to-end encryption. The VPN connection must use computer-level authentication User names and passwords cannot be used for authentication. What should you do?()A、 Configure an IPsec connection to use tunnel mode and preshared key authentication.B、 Configure a PPTP connection to use version 2 of the MS-CHAP v2 authentication.C、 Configure a L2TP/IPsec connection to use the EAP-TLS authenticationD、 Configure a L2TP/IPsec connection to use version 2 of the MS-CHAP v2 authentication.

考题 You are designing a plan for migrating an application to the Windows Azure platform.   All users authenticate by using their Active Directory Domain Services (AD DS) credentials.  The Windows Azure application must provide single sign-on (SSO) for domain-authenticated users.   You need to recommend an authentication type for the service endpoint behavior.  What should you recommend?()A、 SAML credentialB、 Windows authenticationC、 Shared secret credentialD、 Microsoft Challenge Handshake Authentication Protocol (MSCHAP)

考题 单选题In the Company wireless LAN,  what is the function of the Service Set Identifier (SSID)?()A  The SSID must match on both the Company client and the Company access point and provides  MAC Address Authentication to authenticate the client to the access point.B  The SSID should be configured on the Company client site only and provides data-privacy  functions and authentication to the access point.C  The SSID must match on both the Company client and the Company access point and provides encryption keys for authentication to the access point.D  The SSID must match on both the Company client and the Company access point. The SSID is  advertised in plain-text in the access point beacon messages.  E  None of the other alternatives apply

考题 单选题When using a form-based authentication, which action must be used in the login form?()A  j_loginB  j_get_userC  j_login_checkD  j_get_securityE  j_security_check

考题 单选题You are developing a Web application. Your code restricts access to some pages based on the users credentials. You need to configure IIS to supply the user's Windows credentials to your Web application. These credentials must be encrypted. What should you do? ()A Enable Anonymous access. Enable Integrated Windows authentication.B Enable Anonymous access. Enable Basic authentication.C Disable Anonymous access. Enable Integrated Windows authentication.D Disable Anonymous access. Enable Basic authentication.

考题 单选题What must be included in a SOAP fault message when an error occurs due to a value in the message Body element?()A  A detail elementB  A Body fault codeC  An application-specific fault codeD  A fault string element with a value of Body

考题 多选题Which two statements are true regarding firewall user authentication?()AWhen configured for pass-through firewall user authentication, the user must first open a connection to the JUNOS security platform before connecting to a remote network resource.BWhen configured for Web firewall user authentication only, the user must first open a connection to the JUNOS security platform before connecting to a remote network resource.CIf a JUNOS security device is configured for pass-through firewall user authentication, new sessions are automatically intercepted to perform authentication.DIf a JUNOS security device is configured for Web firewall user authentication, new sessions are automatically intercepted to perform authentication.

考题 单选题When using RADIUS as an external authentication method for 802.1X authentication for the Junos Pulse Access Control Service, what must you do to ensure that the RADIUS authentication works properly?()A Configure IP helper to forward the authentication requests from the clients to the external RADIUS serverB Configure the supplicant as anexternal authentication serverC Configure RADIUS proxy on the realmD Specify the correct RADIUS port 389 on the Junos Pulse Access Control Service

考题 多选题What are the three OSPF authentication methods supported on the ERX Edge Router?()Anull passwordBsimple passwordCmessage digest 5DPassword Authentication ProtocolEChallenge Handshake Authentication Protocol

考题 多选题What are two steps that must be taken when mitigating a worm attack?()AInoculate systems by applying update patches.BLimit traffic rate.CApply authentication.DQuarantine infected machines.EEnable anti-spoof measures.

考题 单选题When configuring the Cisco VPN Client,what action is required prior to installing Mutual Group Authentication?()A Transparent tunneling must be enabled.B A valid root certificate must be installed.C A group pre-shared secret must be properly configured.D The option to Allow Local LAN Access must be selected.

考题 单选题You are a network administrator for your company. The company has a main office and one branch office. The network consists of a single Active Directory domain. All servers run Windows Server 2003.   The company needs to connect the main office network and the branch office network by using Routing and Remote Access servers at each office. The networks will be connected by a VPN connection over the Internet.   The company’s written security policy includes the following requirements for VPN connections over the Internet:  All data must be encrypted with end-to-end encryption.  VPN connection authentication must be at the computer level.   Credential information must not be transmitted over the Internet as part of the authentication process.   You need to configure security for VPN connection between the main office and the branch office. You need to comply with the written security policy.   What should you do?  ()A  Use a PPTP connection with EAP-TLS authentication.B  Use a PPTP connection with MS-CHAP v2 authentication.C  Use an L2TP connection with EAP-TLS authentication.D  Use an L2TP connection with MS-CHAP v2 authentication.