Using an LDAP authentication server, what do you configure to validate certificate attributes?()A、Use the "is exactly" or "contains" operators.B、Create a user filter matching the dn of the certificate.C、Verify that the certificate is issued by a publicly

题目

Using an LDAP authentication server, what do you configure to validate certificate attributes?()

  • A、Use the "is exactly" or "contains" operators.
  • B、Create a user filter matching the dn of the certificate.
  • C、Verify that the certificate is issued by a publicly trusted cs.
  • D、Match the certificate type and value with an attribute from the ldap server.

相似考题
参考答案和解析
正确答案:D
更多“Using an LDAP authentication ser”相关问题
  • 第1题:

    Which two statements about the open and shared key wireless-authentication methods are true? ()

    • A、 Shared key authentication is considered more secure than open authentication.
    • B、 Shared key authentication is considered less secure than open authentication.
    • C、 If the WEP keys do not match using the open authentication method, the client will not authenticate, associate, and transfer data.
    • D、 If the WEP keys do not match using the open authentication method, the client will still be able to authenticate and associate, but will not transfer data.
    • E、 If the WEP keys do not match using the open authentication method, the client will still be able to authenticate, associate, and transfer data.

    正确答案:B,D

  • 第2题:

    Company.com network consists of a single Active Directory domain named  Company.com.Company.com has an Exchange Server 2010 organization.The Company.com employees use Microsoft Office Outlook 2007 to connect to their mailboxes.RPC over HTTP and Auto discover are configured on Microsoft Office Outlook 2007. A new Company.com security policy requires that the employees connected to the domain does not need authentication when using Outlook Anywhere.However, those not connected t the domain needs to be authentication when using Outlook Anywhere.The employees need to comply with the new Company.com security policy.  What should you do?()

    • A、You should consider using Basic authentication on Outlook Anywhere and set up only Basic authentication on the RPC virtual directory.
    • B、You should consider using NTLM authentication on Outlook Anywhere and set up Basic authentication and NTLM authentication on the RPC virtual directory.
    • C、You should consider using NTLM authentication on Outlook Anywhere and set up only Basic authentication on the RPC virtual directory.
    • D、You should consider using Basic authentication on Outlook Anywhere and set up Basic authentication and NTLM authentication on the RPC virtual directory.

    正确答案:B

  • 第3题:

    A company is using RADIUS to authenticate login requests to its Juniper Networks routers. Usersshould still be able to authenticate using the local password database but only if the RADIUS server is unreachable. Which JUNOS software configuration accomplishes this goal?()

    • A、authentication-order radius;
    • B、authentication-order password;
    • C、authentication-order [radius password];
    • D、authentication-order [password radius];

    正确答案:A

  • 第4题:

    Which statement about WSA user authentication is true?() 

    • A、 a single WSA can have multiple LDAP realms
    • B、 WSA supports LDAP but not NTLM
    • C、 WSA supports NTLM but not LDAP
    • D、 a single WSA can have up to two authentication realms: one for LDAP and for NTLM

    正确答案:A

  • 第5题:

    Which two statements about the open and shared key wireless-authentication methods are true?()

    • A、shared key authentication is considered more secure than open authentication
    • B、shared key authentication is considered less secure than open authentication
    • C、if the WEP keys do not match using the open authentication method, the client will not authenticate, associate, and transfer data
    • D、if the WEP keys do not match using the open authentication method, the client will still be able to authenticate and associate, but will not transfer data
    • E、if the WEP keys do not match using the open authentication method, the client will still be able to authenticate, associate, and transfer data

    正确答案:B,D

  • 第6题:

    You work as a network administrator at, You have been asked to configure 802.1x port-based authentication. You notice that the client workstation is not compatible with 802.1x port-based authentication.  What supported authentication server should be chosen?()

    • A、TACACS with LEAP extensions
    • B、RADIUS with EAP extensions
    • C、TACACS+
    • D、LDAP

    正确答案:B

  • 第7题:

    Which activity supports the data integrity requirements of an application?()

    • A、Using HTTPS as a protocol
    • B、Using an LDAP security realm
    • C、Using HTTP Basic authentication
    • D、Using forms-based authentication

    正确答案:A

  • 第8题:

    In your database,the LDAP_DIRECTORY_SYSAUTH initialization parameter has been set to YES and the users who need to access the database as DBAs have been granted SYSDBA enterprise role in Oracle Internet Directory (OID). SSL and the password file have been configured. A user SCOTT with the SYSDBA privilege tries to connect to the database instance from a remote machine using the command:$ SQLPLUS scott/tiger@DB01 AS SYSDBA   where DB01 is the net service name.   Which authentication method would be used first?()  

    • A、 authentication by password file
    • B、 authentication by using certificates over SSL
    • C、 authentication by using the Oracle Internet Directory
    • D、 authentication by using the local OS of the database server

    正确答案:A

  • 第9题:

    单选题
    Which activity supports the data integrity requirements of an application?()
    A

    Using HTTPS as a protocol

    B

    Using an LDAP security realm

    C

    Using HTTP Basic authentication

    D

    Using forms-based authentication


    正确答案: B
    解析: 暂无解析

  • 第10题:

    单选题
    What is the objective of the aaa authentication login console-in local command?()
    A

    It specifies the login authentication method list named console-in using the local user database on the router

    B

    It specifies the login authorization method list named console-in using the local RADIUS username-password data base

    C

    It specifies the login authentication list named console-in using the local username- password data base on the router

    D

    It specifies the login authorization method list named console-in using the local username- password data base on the router


    正确答案: C
    解析: 暂无解析

  • 第11题:

    单选题
    In a network using cisco autonomous access points running wds. What port is used for authentication by the local authentication service on an access point?()
    A

    1813

    B

    1645

    C

    1646

    D

    1812


    正确答案: D
    解析: 暂无解析

  • 第12题:

    多选题
    Which two statements about the open and shared key wireless-authentication methods are true? ()
    A

    Shared key authentication is considered more secure than open authentication.

    B

    Shared key authentication is considered less secure than open authentication.

    C

    If the WEP keys do not match using the open authentication method, the client will not authenticate, associate, and transfer data.

    D

    If the WEP keys do not match using the open authentication method, the client will still be able to authenticate and associate, but will not transfer data.

    E

    If the WEP keys do not match using the open authentication method, the client will still be able to authenticate, associate, and transfer data.


    正确答案: C,B
    解析: 暂无解析

  • 第13题:

    When a client using the SERVER_ENCRYPT authentication type connects to a server using the SERVER authentication type, what happens?()

    • A、An error will occur.
    • B、Data passed between the client and the server is encrypted.
    • C、User IDs and passwords are passed to the server unencrypted.
    • D、User IDs and passwords are encrypted before they are passed to the server.

    正确答案:A

  • 第14题:

    What is the objective of the aaa authentication login console-in local command?()

    • A、It specifies the login authentication method list named console-in using the local user database on the router
    • B、It specifies the login authorization method list named console-in using the local RADIUS username-password data base
    • C、It specifies the login authentication list named console-in using the local username- password data base on the router
    • D、It specifies the login authorization method list named console-in using the local username- password data base on the router

    正确答案:A

  • 第15题:

    In a network using cisco autonomous access points running wds. What port is used for authentication by the local authentication service on an access point?()

    • A、1813
    • B、1645
    • C、1646
    • D、1812

    正确答案:D

  • 第16题:

    In a network using Cisco autonomous access points running WDS, what port is used for authentication by the local authentication service on an access point?()

    • A、1813
    • B、1645
    • C、1646
    • D、1812

    正确答案:D

  • 第17题:

    On a standalone access point, client association using EAP-Cisco Wireless (Cisco-LEAP) isfailing, but association using EAP-PEAP is functioning. What needs to be enabled on the standalone accesspoint to correct this issue?()

    • A、network EAP
    • B、open authentication plus MAC
    • C、open authentication plus EAP
    • D、a shared key

    正确答案:A

  • 第18题:

    An administrator is planning for a six node cluster but is concerned about the administration needed tomanage user accounts throughout the cluster. What PowerHA feature could the administrator use to reducethe administration overhead?()

    • A、LDAP Authentication Module
    • B、Smart Assist for Active Directory
    • C、C-SPOC for user and password management
    • D、File Collections designating one node as the primary authentication node

    正确答案:C

  • 第19题:

    You are configuring an LDAP authentication server, and you want to configure role-mapping rules based on group membership. When you attempt to search for groups in the server catalog, no groups appear.Assuming the LDAP server is reachable and functioning properly, in the admin GUI. Which two parts of the configuration should you verify are correct?()

    • A、Finding user entries
    • B、Authentication required
    • C、LDAP Server Type
    • D、Determining group membership

    正确答案:B,D

  • 第20题:

    单选题
    Which additional configuration must be completed when setting up role restrictions using certificates? ()
    A

    Set up a certificate authentication server.

    B

    Configure the authentication realm to remember certificate information.

    C

    Configure the authentication realm to use a certificate server for authentication.

    D

    Configure a role mapping rule requiring certification information to map user to role.


    正确答案: D
    解析: 暂无解析

  • 第21题:

    多选题
    You are configuring an LDAP authentication server, and you want to configure role-mapping rules based on group membership. When you attempt to search for groups in the server catalog, no groups appear.Assuming the LDAP server is reachable and functioning properly, in the admin GUI. Which two parts of the configuration should you verify are correct?()
    A

    Finding user entries

    B

    Authentication required

    C

    LDAP Server Type

    D

    Determining group membership


    正确答案: D,B
    解析: 暂无解析

  • 第22题:

    单选题
    On a standalone access point, client association using EAP-Cisco Wireless (Cisco-LEAP) is failing, butassociation using EAP-PEAP is functioning. What needs to be enabled on the standalone access point tocorrect this issue?()
    A

    a shared key

    B

    network EAP

    C

    open authentication plus EAP

    D

    open authentication plus MAC


    正确答案: B
    解析: 暂无解析

  • 第23题:

    单选题
    Which statement about WSA user authentication is true?()
    A

     a single WSA can have multiple LDAP realms

    B

     WSA supports LDAP but not NTLM

    C

     WSA supports NTLM but not LDAP

    D

     a single WSA can have up to two authentication realms: one for LDAP and for NTLM


    正确答案: C
    解析: 暂无解析

  • 第24题:

    单选题
    Using an LDAP authentication server, what do you configure to validate certificate attributes?()
    A

    Use the is exactly or contains operators.

    B

    Create a user filter matching the dn of the certificate.

    C

    Verify that the certificate is issued by a publicly trusted cs.

    D

    Match the certificate type and value with an attribute from the ldap server.


    正确答案: B
    解析: 暂无解析