网友您好, 请在下方输入框内输入要搜索的题目:

题目内容 (请给出正确答案)

Which security token may carry user attribute information as part of the defined token format?()

  • A、Kerberos
  • B、RACF Token
  • C、SAML Assertion
  • D、Username Token

参考答案

更多 “Which security token may carry user attribute information as part of the defined token format?()A、KerberosB、RACF TokenC、SAML AssertionD、Username Token” 相关考题
考题 One solution to major security problems is ______, which are frequently installed to fix known security holes.A.patchesB.compensationsC.complementsD.additions

考题 You are developing a Windows Communication Foundation (WCF) service. The service operation takes a customer number as the only argument and returns information about the customer. The service requires a security token in the header of the message. You need to create a message contract for the service.Which code segment should you use?()A.B.C.D.

考题 _______means the level for which appropriate additional protective security measures shall be maintained for a period of time as a result of heightened risk of a security incident.A.Security level 1B.Security level 2C.Security level 3D.Security level 4

考题 Which statement describes a security zone?() A. A security zone can contain one or more interfaces.B. A security zone can contain interfaces in multiple routing instances.C. A security zone must contain two or more interfaces.D. A security zone must contain bridge groups.

考题 In which of the following topologies could the failure of one machine cause the entire network tostop functioning?() A. MeshB. Token ringC. StarD. Spanning tree

考题 Which of the following does a star ring topology use for data transfer?() A.CSMA/CDB.CSMA/CAC.CHAPD.Token passing

考题 ( )is the popular LAN developed under the direction of the IEEE 802.5.( )is the popular backbone technology for transmitting information at high speed with a high level of fault tolerance which is developed under the direction of ANSI.A.Ethernet,FDDI B.Token Bus,Ethernet C.Token Ring,FDDI D.DQDB,QinQ

考题 Which Cisco security tool can best determine it a Cisco ISR router is properly secured? ()A、 Cisco SDM Security AuditB、 Cisco Security MARSC、 Cisco Security Agent MCD、 Cisco Security IntelliShieldE、 CAN

考题 You are developing a Windows Communication Foundation (WCF) service. One of the parameters used with the service operations is a security token. The security token is not sensitive. The monitoring software tracks security tokens and can read tokens in clear text only.The company security policy requires that you validate all clear text data passed over the corporate network.You need to ensure that the service verifies that the security token is not changed during transit. What should you do?()A、For all the security-sensitive members, set the ProtectionLevel parameter of the MessageBodyMember or MessageHeader attribute to EncryptAndSign.B、Implement IEndpointldentityProvider in the message contract class.C、Implement ISecureConversationSession in the message contract class.D、For all the security-sensitive members, set the ProtectionLevel parameter of the MessageBodyMember or MessageHeader attribute to Sign.

考题 During which phase of the Steps to Success methodology for Cisco SMB Security Solutions would the Security Technology Requirements document be used to determine a customer’s security requirements?()A、PerformB、PositionC、DevelopD、PrepareE、PlanF、Design

考题 Which three Layer 2 encapsulation types would be used on a WAN rather than a LAN? ()A、HDLCB、EthernetC、Token RingD、PPPE、FDDIF、Frame Relay

考题 In which of the following topologies could the failure of one machine cause the entire network tostop functioning?()A、MeshB、Token ringC、StarD、Spanning tree

考题 Which of the following connectivity issues is likely to occur within a token ring network?()A、CrosstalkB、Broadcast stormC、Duplex mismatchD、Collision

考题 Which of the following are examples of physical security measures?()A、Policies and proceduresB、EncryptionC、Locked doorsD、Security personnelE、Backup tapes

考题 Which of the following would be used to test out the security of a specific network by allowing it toreceive security attacks?()A、HoneynetB、HoneypotC、Vulnerability scannerD、Network based IDS

考题 Which menu option must be used to grant a user the authority to add or remove users to one or more Security Groups?()A、 Security ControlsB、 Database AccessC、 Set Security ProfileD、 Authorize Group Reassignment

考题 Which file contains the attributes used to setup a new user account when executing ‘mkuser’ without any flags?()A、/etc/security/userB、/etc/security/passwdC、/etc/security/mkuser.sysD、/etc/security/mkuser.default

考题 Which of the following options should be used to obtain the latest security patches for AIX?()A、FixDistB、The Bonus Pack CDC、OPSD、The Security Maintenance CD

考题 A System p administrator needs to set the default password length for all users to six characters.  Which of the following files needs to be edited to accomplish this ()A、/etc/security/limitsB、/etc/security/mkuser.sysC、/etc/security/privD、/etc/security/user

考题 At which two levels of the Junos CLI hierarchy is the host-inbound-traffic command configured? ()(Choose two.)A、[edit security idp]B、[edit security zones security-zone trust interfaces ge-0/0/0.0]C、[edit security zones security-zone trust]D、[edit security screen]

考题 单选题Which menu option must be used to grant a user the authority to add or remove users to one or more Security Groups?()A  Security ControlsB  Database AccessC  Set Security ProfileD  Authorize Group Reassignment

考题 多选题You are designing a service that will use the Windows Azure AppFabric Service Bus.  You need to recommend an approach for controlling access to the service by using the Windows Azure AppFabric Access Control Service. Which two actions should you recommend?()AConfigure the service to not require authentication.BConfigure the service to require a relay access token.CSpecify message security for all communications between clients and the service.DSpecify transport security for allcommunications between clients and the service.

考题 单选题You are developing a Windows Communication Foundation (WCF) service. One of the parameters used with the service operations is a security token. The security token is not sensitive. The monitoring software tracks security tokens and can read tokens in clear text only.The company security policy requires that you validate all clear text data passed over the corporate network.You need to ensure that the service verifies that the security token is not changed during transit. What should you do?()A For all the security-sensitive members, set the ProtectionLevel parameter of the MessageBodyMember or MessageHeader attribute to EncryptAndSign.B Implement IEndpointldentityProvider in the message contract class.C Implement ISecureConversationSession in the message contract class.D For all the security-sensitive members, set the ProtectionLevel parameter of the MessageBodyMember or MessageHeader attribute to Sign.

考题 单选题The configuration of a Web Services Security management (WSSM) Partner allows for the specification of XSL mapping rules. What is the input and output of these XSL mapping rules?()A The input to the XSL mapping rules of a WSSM Partner is the binary security token as received on the Web Service request. The output of the mapping rules is a new security token ready for use by the Web Service application. B The input to the XSL mapping rules of a WSSM Partner is an STSUniveralUser XML document created from the security token received on the Web Service request. The output of the mapping rules is an arbitrary collection of attributes that will be made available to the Web Services application. C The input to the XSL mapping rules of a WSSM Partner is an STSUniveralUser XML document created from the security token received on the Web Service request. The output of the mapping rules is a new STSUniversalUser XML document that represents the security token required by the application. D The input to the XSL mapping rules of a WSSM Partner is an STSUniveralUser XML document created from the security token received on the Web Service request. The output of the mapping rules is an IBM Tivoli Access Manager for e-business credential that will be used to authorize the partner's access to the Web Service application.

考题 单选题Which operational mode command displays all active IPsec phase 2 security associations?()A show ike security-associationsB show ipsec security-associationsC show security ike security-associationsD show security ipsec security-associations

考题 单选题Which Cisco security tool can best determine it a Cisco ISR router is properly secured? ()A  Cisco SDM Security AuditB  Cisco Security MARSC  Cisco Security Agent MCD  Cisco Security IntelliShieldE  CAN

考题 单选题Which CLI command provides a summary of what the content-filtering engine has blocked?()A show security utm content-filtering statisticsB show security flow sessionC show security flow statisticsD show security utm content-filtering summary