单选题What is a benefit of NTLMSSP over basic authentication?()Abasic cannot be used in transparent proxy modeBbasic requiresreauthentication with every new domainCNTLMSSP is compatible with open LDAPDNTLMSSP is more secure than basic

题目
单选题
What is a benefit of NTLMSSP over basic authentication?()
A

 basic cannot be used in transparent proxy mode

B

 basic requiresreauthentication with every new domain

C

 NTLMSSP is compatible with open LDAP

D

 NTLMSSP is more secure than basic


相似考题
更多“What is a benefit of NTLMSSP over basic authentication?() ”相关问题
  • 第1题:

    What are three basic parameters to configure on a wireless access point?()

    A.SSID

    B.RTS/CTS

    C.AES-CCMP

    D.TKIP/MIC

    E.RF channel

    F.authentication method


    参考答案:A, E, F

  • 第2题:

    Which the basic authentication type is optional for a J2EE 1.4 compliant web container?()

    • A、 HTTP Basic Authentication
    • B、 Form Based Authentication
    • C、 HTTP Digest Authentication
    • D、 HTTPS Client Authentication

    正确答案:C

  • 第3题:

    What is a key benefit of using a GRE tunnel to provide connectivity bet ween branch offices and headquarters?()

    • A、authentication, integrity checking, and confidentiality
    • B、less overhead
    • C、dynamic routing over the tunnel
    • D、granular QoS support
    • E、open standard
    • F、scalability

    正确答案:C

  • 第4题:

    Which statement about the Link Control Protocol (LCP) is true?()

    • A、LCP is used for basic PPP link setup and operation.
    • B、LCP is used for PPP CHAP authentication.
    • C、LCP is used for PPP over ATM (PPPoA) setup.
    • D、LCP is used for PPP over Ethernet (PPPoE) setup.
    • E、LCP is used for PPP over Frame Relay (PPPoFR) setup

    正确答案:A

  • 第5题:

    Identity authentication, protocol encryption, secure guest access, voice over WLAN features, and a small device footprint are all highlights of what product in the wireless technology market?()

    • A、wireless monitoring device
    • B、wireless LAN controller
    • C、wireless bridge
    • D、wireless management device
    • E、access point

    正确答案:B

  • 第6题:

    You need to recommend a security strategy for WebApp2 that meets the company’s applicaton  requirements.What should you include in the recommendation?()

    • A、Basic authentication and connection security rules
    • B、Basic authentication and SSL
    • C、Digest authentication and connection security rules
    • D、Digest authentication and SSL

    正确答案:B

  • 第7题:

    单选题
    You are developing a Web application. Your code restricts access to some pages based on the users credentials. You need to configure IIS to supply the user's Windows credentials to your Web application. These credentials must be encrypted. What should you do? ()
    A

    Enable Anonymous access. Enable Integrated Windows authentication.

    B

    Enable Anonymous access. Enable Basic authentication.

    C

    Disable Anonymous access. Enable Integrated Windows authentication.

    D

    Disable Anonymous access. Enable Basic authentication.


    正确答案: A
    解析: 暂无解析

  • 第8题:

    单选题
    You work as the enterprise exchange administrator at Xxx .The Xxx network consists of a domain named xxx . Xxx has three Exchange Server 2007 mail servers named XXX-EX01, XXX-EX02 and XXX-EX03 that has the following implementation: records.What action must you take to make sure of the availability of the mailboxes on XXX-EX03 if the employees utilize the Exchange ActiveSync after the instrallation of XXX-EX04?()
    A

    You should use Basic authentication on Exchange ActiveSync and set up only Basic authentication on the RPC virtual directory.

    B

    You should use NTLM authentication on the RPC virtual directory.

    C

    You should use Microsoft Challenge Handshake Authentication Protocol version 2 (MS-CHAP v2) on XXX-EX01.

    D

    You should use the anonymous setting in the authentication type for the Microsoft-Server-ActiveSync virtual directory on XXX-EX01.


    正确答案: C
    解析: 暂无解析

  • 第9题:

    单选题
    You need to recommend a disk configuration for the planned SQL Server deployment.The solution must ensure that the servers can fail over automatically. What should you include in the recommendation?()
    A

    GPT disks and basic disks

    B

    GPT disks and dynamic disks

    C

    MBR disks and basic disks

    D

    MBR disks and dynamic disks


    正确答案: B
    解析: 暂无解析

  • 第10题:

    单选题
    What is a benefit of NTLMSSP over basic authentication?()
    A

     basic cannot be used in transparent proxy mode

    B

     basic requiresreauthentication with every new domain

    C

     NTLMSSP is compatible with open LDAP

    D

     NTLMSSP is more secure than basic


    正确答案: B
    解析: 暂无解析

  • 第11题:

    多选题
    Which three statements about NetFlow are true? ()
    A

    LCP is used for PPP over ATM (PPPoA) setup.

    B

    LCP is used for PPP over Ethernet (PPPoE) setup.

    C

    LCP is used for PPP over Ethernet (PPPoPR) setup.

    D

    LCP is used for PPP CHAP authentication.

    E

    LCP is used for basic PPP link setup and operation.


    正确答案: D,C
    解析: 暂无解析

  • 第12题:

    单选题
    What is a key benefit of using a GRE tunnel to provide connectivity bet ween branch offices and headquarters?()
    A

    authentication, integrity checking, and confidentiality

    B

    less overhead

    C

    dynamic routing over the tunnel

    D

    granular QoS support

    E

    open standard

    F

    scalability


    正确答案: D
    解析: 暂无解析

  • 第13题:

    What is a benefit of NTLMSSP over basic authentication?() 

    • A、 basic cannot be used in transparent proxy mode
    • B、 basic requiresreauthentication with every new domain
    • C、 NTLMSSP is compatible with open LDAP
    • D、 NTLMSSP is more secure than basic

    正确答案:D

  • 第14题:

    Company.com network consists of a single Active Directory domain named  Company.com.Company.com has an Exchange Server 2010 organization.The Company.com employees use Microsoft Office Outlook 2007 to connect to their mailboxes.RPC over HTTP and Auto discover are configured on Microsoft Office Outlook 2007. A new Company.com security policy requires that the employees connected to the domain does not need authentication when using Outlook Anywhere.However, those not connected t the domain needs to be authentication when using Outlook Anywhere.The employees need to comply with the new Company.com security policy.  What should you do?()

    • A、You should consider using Basic authentication on Outlook Anywhere and set up only Basic authentication on the RPC virtual directory.
    • B、You should consider using NTLM authentication on Outlook Anywhere and set up Basic authentication and NTLM authentication on the RPC virtual directory.
    • C、You should consider using NTLM authentication on Outlook Anywhere and set up only Basic authentication on the RPC virtual directory.
    • D、You should consider using Basic authentication on Outlook Anywhere and set up Basic authentication and NTLM authentication on the RPC virtual directory.

    正确答案:B

  • 第15题:

    You are an administrator of a network that uses PPP for CHAP authentication over ever WAN link. What command would you enter to display the CHAP authentication as it occurs in real time?()

    • A、show ppp authentication
    • B、debug PAP authentication
    • C、debug PPP authentication
    • D、show interface serial0
    • E、show CHAP authentication

    正确答案:C

  • 第16题:

    What are three basic parameters to configure on a wireless access point?()

    • A、SSID
    • B、RTS/CTS
    • C、AES-CCMP
    • D、TKIP/MIC
    • E、RF channel
    • F、authentication method

    正确答案:A,E,F

  • 第17题:

    When configuring PPP over ATM interfaces, what does the profile utility accomplish?()

    • A、It binds an interface to a virtual router.
    • B、It allows for dynamic interface creation.
    • C、It assigns a Domain Name Server for a session.
    • D、It identifies the RADIUS server to use for authentication

    正确答案:B

  • 第18题:

    单选题
    Which statement about the Link Control Protocol (LCP) is true?()
    A

    LCP is used for basic PPP link setup and operation.

    B

    LCP is used for PPP CHAP authentication.

    C

    LCP is used for PPP over ATM (PPPoA) setup.

    D

    LCP is used for PPP over Ethernet (PPPoE) setup.

    E

    LCP is used for PPP over Frame Relay (PPPoFR) setup


    正确答案: A
    解析: 暂无解析

  • 第19题:

    多选题
    Which two authentication mechanisms provide weaker protection than other mechanisms?()
    A

    HTTP Basic Authentication

    B

    Form Based Authentication

    C

    HTTP Digest Authentication

    D

    HTTPS Client Authentication


    正确答案: C,A
    解析: 暂无解析

  • 第20题:

    单选题
    Identity authentication, protocol encryption, secure guest access, voice over WLAN features, and a small device footprint are all highlights of what product in the wireless technology market?()
    A

    wireless monitoring device

    B

    wireless LAN controller

    C

    wireless bridge

    D

    wireless management device

    E

    access point


    正确答案: B
    解析: 暂无解析

  • 第21题:

    单选题
    You develop a Windows Communication Foundation (WCF) service that uses basic authentication for client credentials. This service is currently configured to use message security. The service is hosted on a server in workgroup mode.Users report that their passwords are stolen when they use public computers.You need to ensure that messages are secure and users are authenticated.You prevent the service from being called over HTTP through Microsoft Internet Information Services (IIS) configuration. What should you do next?()
    A

    Use the transport security mode and specify None for transport client credential type.

    B

    Use the transportWithMessageCredential security mode and specify Basic for the transport client credential type.

    C

    Use the message security mode and specify Basic for the transport client credential type.

    D

    Use the transportWithMessageCredential security mode and specify None for the transport client credential type.


    正确答案: B
    解析: 暂无解析

  • 第22题:

    单选题
    When configuring PPP over ATM interfaces, what does the profile utility accomplish?()
    A

    It binds an interface to a virtual router.

    B

    It allows for dynamic interface creation.

    C

    It assigns a Domain Name Server for a session.

    D

    It identifies the RADIUS server to use for authentication


    正确答案: A
    解析: 暂无解析

  • 第23题:

    单选题
    An Enterprise decides to implement Authentication Proxy for per-user authentication for home offices. Each home office also supports an IP Phone. What should you do?()
    A

    Configure Access Control Lists to ensure Voice over IP traffic is checked by Auth Proxy.

    B

    Configure pNAT to ensure Voice over IP packets are properly translated.

    C

    Configure IOS firewall to permit RTP port numbers through the firewall via VPN. 

    D

    Configure Access Control Lists to allow Voice over IP traffic to bypass Auth Proxy checking.


    正确答案: C
    解析: 暂无解析

  • 第24题:

    单选题
    Which the basic authentication type is optional for a J2EE 1.4 compliant web container?()
    A

     HTTP Basic Authentication

    B

     Form Based Authentication

    C

     HTTP Digest Authentication

    D

     HTTPS Client Authentication


    正确答案: A
    解析: 暂无解析