Which two are true about authentication?()
第1题:
Which two statements are true regarding firewall user authentication?() (Choose two.)
第2题:
Which two authentication mechanisms provide weaker protection than other mechanisms?()
第3题:
Which basic authentication type is optional for a J2EE 1.4 compliant web container?()
第4题:
Which two statements are true about using the isUserInRole method to implement security in a Java EEapplication?()
第5题:
Which two statements regarding external authentication servers for firewall user authentication are true?() (Choose two.)
第6题:
Your company has a server that runs Windows Server 2008. The server has the Web Server (IIS) role installed. You need to activate SSL for the default Web site. Which two actions should you perform?()
第7题:
You work as the IT professional in an international company which is named Wiikigo. You are experiencedin implementing and administering a network operating system. You are specialized in deploying servers,configuring Windows Server 2008 Terminal services and network application services, and configuring aweb services infrastructure. You are in charge of a server that runs Windows Server 2008. The server hasthe Web Server (IIS) server role installed. The Web developer at your company creates a new Web sitethat runs an ASP.NET 3.0 Web application. The ASP.NET Web application must run under a securitycontext that is separate from any other ASP.NET application on the Web server. You create a local useraccount and grant account rights and permissions to run the ASP.NET Web application. Authentication forthe new Web site should be configured to support the Web application. What action should you perform?()
第8题:
You manage a server that runs Windows Server 2008. The server has the Web Server (IIS) role installed. The Web developer at your company creates a new Web site that runs an ASP.NET 3.0 Web application. The ASP.NET Web application must run under a security context that is separate from any other ASP.NET application on the Web server. You create a local user account and grant account rights and permissions to run the ASP.NET Web application. You need to configure authentication for the new Web site to support the Web application. What should you do?()
第9题:
You manage a server that runs Windows Server 2008. The server has the Web Server (IIS) role installed. The server hosts an Internet-accessible Web site that has a virtual directory named /orders/. A Web server certificate is installed and an SSL listener has been configured for the Web site. The /orders/ virtual directory must meet the following company policy requirements: Be accessible to authenticated users only. Allow authentication types to support all browsers. Encrypt all authentication traffic by using HTTPS. All other directories of the Web site must be accessible to anonymous users and be available withoutSSL. You need to configure the /orders/ virtual directory to meet the company policy requirements. Which two actions should you perform?()
第10题:
Form-based logins should NOT be used with HTTPS.
When using Basic Authentication the target server is NOT authenticated.
J2EE compliant web containers are NOT required to support the HTTPS protocol.
Web containers are required to support unauthenticated access to unprotected web resources.
第11题:
CHAP uses a two-way handshake
CHAP authentication periodically occurs after link establishment
CHAP has no protection from playback attacks
CHAP authentication is performed only upon link establishment
CHAP uses a three-way handshake
CHAP authentication passwords are sent in plaintext
第12题:
HTTP Basic Authentication
Form Based Authentication
HTTP Digest Authentication
HTTPS Client Authentication
第13题:
In the wireless Advanced Feature Set using lightweight access points, a virtual interface is used when supporting which of the following features?()
第14题:
Which activity supports the data integrity requirements of an application?()
第15题:
When using a form-based authentication, which action must be used in the login form?()
第16题:
Which two statements regarding external authentication servers for firewall userauthentication are true?()
第17题:
Which two statements are true regarding firewall user authentication?()
第18题:
You are the network administrator for your company. The network consists of a single Active Directory domain. All servers run Windows Server 2003. The network contains a Web server that runs IIS 6.0 and hosts a secure intranet site. All users are required to connect to the intranet site by authenticating and using HTTPS. However, because an automated Web application must connect to the Web site by using HTTP, you cannot configure the intranet site to require HTTPS. You need to collect information about which users are connecting to the Web site by using HTTPS. What should you do?()
第19题:
You need to design an access control strategy for the external and intranet Web sites. Which two actions should you perform?()
第20题:
You are an IIS Web server administrator implementing authentication settings for a new Web site.According to the requirements for the Human Resources Web site, users should be prompted forauthentication information when they attempt to access the site. The site will be accessed only by userswho have accounts in your organization’s Active Directory domain. You have already configured the filesystem permissions for the content based on the appropriate settings. You also want to maximize securityof the site. Which two actions should you take to meet these requirements?()
第21题:
You administer a SQL Server 2008 Reporting Services (SSRS) instance. You plan to design an authentication method for SSRS reports that use SQL Server data connections. You need to ensure that all SSRS reports communicate to the SQL Server instance by using the Kerberos authentication protocol. What should you do?()
第22题:
the URL pattern that requires authorization
the HTTP methods that require authorization
the users allowed access to the web resource
the J2EE roles allowed access to the web resource
the authentication mechanism required by the web resource
第23题:
HTTP Basic Authentication
Form Based Authentication
HTTP Digest Authentication
HTTPS Client Authentication