单选题Which of the following is the MOST secure method to authenticate users?()A User ID, a strong password, and a fingerprint scannerB User ID, a strong password, and a token based deviceC User ID and two levels of strong password requirementsD User ID, a s

题目
单选题
Which of the following is the MOST secure method to authenticate users?()
A

User ID, a strong password, and a fingerprint scanner

B

User ID, a strong password, and a token based device

C

User ID and two levels of strong password requirements

D

User ID, a strong password, and a smart card


相似考题
更多“单选题Which of the following is the MOST secure method to authenticate users?()A User ID, a strong password, and a fingerprint scannerB User ID, a strong password, and a token based deviceC User ID and two levels of strong password requirementsD User ID, a s”相关问题
  • 第1题:

    "在连接数据库的过程中,数据库连接字符串为:  Data Source=localhost; Initial Catalog= Haier; user id=sa; password=123456;  Data Source代表什么含义:()  Initial Catalog代表什么含义:() user id代表什么含义:() password代表什么含义:()"
    服务器;数据库;用户;密码

  • 第2题:

    An organization has decided to deploy an IBM Tivoli Access Manager for Enterprise Single-on solution to help address security and productivity issues. Per their corporate security policy, the organization has detailed requirements related to password management for their enterprise applications.  Which password requirements need to be captured?()

    • A、details related to application user ID requirements
    • B、policy requirements related to the number of applications that a user can access
    • C、policy requirements for application and user initiated password resets and password complexity
    • D、do nothing as password policy requirements are best addressed within the application space rather than in an Enterprise Single Sign-On project

    正确答案:C

  • 第3题:

    Which of the following is the MOST secure method to authenticate users?()

    • A、User ID, a strong password, and a fingerprint scanner
    • B、User ID, a strong password, and a token based device
    • C、User ID and two levels of strong password requirements
    • D、User ID, a strong password, and a smart card

    正确答案:A

  • 第4题:

    A "trusted" client needs to communicate with a server that has been configured to use CLIENT authentication. Which of the following will be used to verify passwords?()

    • A、User ID/password file
    • B、Communications layer
    • C、Client applications
    • D、Operating system

    正确答案:D

  • 第5题:

    From the DX WebUI Dashboard, which steps are used for creating a new admin user? ()

    • A、Click Admin > Users. Enter username, password, role, account status, and email.
    • B、Click Admin > Users. Enter username, password, role, account status, and user class.
    • C、Click Users > Manage Users. Enter username, password, role, account status, and user class.
    • D、Click Users > Manage Users. Enter username, password, ActiveDirectory domain, account status, and role.

    正确答案:B

  • 第6题:

    Examine the command: SQL> ALTER USER skd ACCOUNT LOCK; Which two statements are true after the command is executed()

    • A、The SKD user cannot log in to the database instance.
    • B、The objects owned by the SKD user are not accessible to any user.
    • C、The other users can access the objects owned by the SKD user, on which they have access.
    • D、The password for the SKD user expires and the user is forced to change the password at the next log in

    正确答案:A,C

  • 第7题:

    You are designing a strategy for migrating the UNIX user accounts to Active Directory.  Which three actions should you perform?()

    • A、 Import the user accounts as inetOrgPerson objects.
    • B、 Import the user accounts into Active Directory by using the Ldifde command-line tool.
    • C、 Export all user accounts from the UNIX servers to a text file.
    • D、 Export all user accounts and their passwords from the UNIX servers to a text file. Encrypt this file to achieve extra security.
    • E、 Assign random passwords to each user object, and securely distribute the password to the users.
    • F、 Create the same strong password for each user object, and require users to change their passwords at first logon.
    • G、 Instruct users to use the same name and password as they used on the UNIX servers.

    正确答案:B,C,F

  • 第8题:

    You are implementing an ASP.NET Web application. Users will authenticate to the application with an ID. The application will allow new users to register for an account. The application will generate an ID for the user based on the users full name. You need to implement this registration functionality. Which two actions should you perform?()

    • A、Configure the SqlMembershipProvider in the web.config file.
    • B、Configure the SqlProfileProvider in the web.config file.
    • C、Create an ASP.NET page that contains a default CreateUserWizard control to create a new user account.
    • D、Create an ASP.NET page that contains a custom form that collects the user information and then uses the Membership.CreateUser method to create a new user account.

    正确答案:A,D

  • 第9题:

    单选题
    From the DX WebUI Dashboard, which steps are used for creating a new admin user? ()
    A

    Click Admin > Users. Enter username, password, role, account status, and email.

    B

    Click Admin > Users. Enter username, password, role, account status, and user class.

    C

    Click Users > Manage Users. Enter username, password, role, account status, and user class.

    D

    Click Users > Manage Users. Enter username, password, ActiveDirectory domain, account status, and role.


    正确答案: B
    解析: 暂无解析

  • 第10题:

    单选题
    Which user authentication method is supported by the Junos OS as a last resort alternative?()
    A

    TACACS+

    B

    RADIUS

    C

    local user database

    D

    enable password


    正确答案: B
    解析: 暂无解析

  • 第11题:

    多选题
    Examine the command: SQL> ALTER USER skd ACCOUNT LOCK; Which two statements are true after the command is executed()
    A

    The SKD user cannot log in to the database instance.

    B

    The objects owned by the SKD user are not accessible to any user.

    C

    The other users can access the objects owned by the SKD user, on which they have access.

    D

    The password for the SKD user expires and the user is forced to change the password at the next log in.


    正确答案: B,A
    解析: 暂无解析

  • 第12题:

    单选题
    A user has forgotten their BIOS password on their computer. Which of the following would atechnician use to allow the user access to their PC?()
    A

    Remove the BIOS chip on the PC

    B

    Re-flash the BIOS

    C

    Run password cracking software on the users PC

    D

    Set the password clear jumper on the motherboard


    正确答案: B
    解析: 暂无解析

  • 第13题:

    You are designing a strategy for migrating the UNIX user accounts to Active Directory. Which three actions should you perform?()

    • A、Import the user accounts as inetOrgPerson objects.  
    • B、Import the user accounts into Active Directory by using the Ldifde command-line tool. 
    • C、Export all user accounts from the UNIX servers to a text file.  
    • D、Export all user accounts and their passwords from the UNIX servers to a text file. Encrypt this file to achieve extra security.  
    • E、Assign random passwords to each user object, and securely distribute the password to the users.  
    • F、Create the same strong password for each user object, and require users to change their passwords at first logon. 

    正确答案:B,C,F

  • 第14题:

    Upon a user’s first visit to the website, which two operations are always performed when the getSession method is called with no arguments in a servlet?()

    • A、 All URLs returned by the server are rewritten.
    • B、 An HttpSession object is created if necessary.
    • C、 The user name and password of the user are checked.
    • D、 The session ID is stored in the HTTP response as a cookie.

    正确答案:B,D

  • 第15题:

    A user has forgotten their BIOS password on their computer. Which of the following would atechnician use to allow the user access to their PC?()

    • A、Remove the BIOS chip on the PC
    • B、Re-flash the BIOS
    • C、Run password cracking software on the users PC
    • D、Set the password clear jumper on the motherboard

    正确答案:D

  • 第16题:

    When using Form Based Authentication, which pair of fields must be used in the login form?()  

    • A、 j_user and j_id
    • B、 j_id and j_password
    • C、 j_users and j_password
    • D、 j_user and j_password
    • E、 j_login and j_password
    • F、 j_username and j_password

    正确答案:F

  • 第17题:

    You want to restrict access to a role based on the client machine from which the user is accessing the network.Which two role restrictions accomplish this goal? ()

    • A、user name
    • B、password length
    • C、certificate
    • D、Host Checker

    正确答案:C,D

  • 第18题:

    Examine the command: SQL> ALTER USER skd ACCOUNT LOCK; Which two statements are true after the command is executed()

    • A、The SKD user cannot log in to the database instance.
    • B、The objects owned by the SKD user are not accessible to any user.
    • C、The other users can access the objects owned by the SKD user, on which they have access.
    • D、The password for the SKD user expires and the user is forced to change the password at the next log in.

    正确答案:A,C

  • 第19题:

    You are the administrator of an Active Directory domain named A user reports that he forgot his password and cannot log on to the domain. You discover that yesterday morning the user reset his password and successfully logged on to the domain. You need to enable the user to log on to the domain. What should you do? ()(Choose two)

    • A、Use Active Directory Users and Computers to move the account to the default organizational unit (OU) named Users. Instruct the user to restart his computer.
    • B、Use Active Directory Users and Computers to open the account properties for the user's user account. Clear the Account is locked out check box, and select the User must change password at next logon check box.
    • C、Use Active Directory Users and Computers to reset the user's password. Give the user the new password.
    • D、Use Computer Management to reset the password for the local Administrator account.

    正确答案:B,C

  • 第20题:

    填空题
    "在连接数据库的过程中,数据库连接字符串为:  Data Source=localhost; Initial Catalog= Haier; user id=sa; password=123456;  Data Source代表什么含义:()  Initial Catalog代表什么含义:() user id代表什么含义:() password代表什么含义:()"

    正确答案: 服务器,数据库,用户,密码
    解析: 暂无解析

  • 第21题:

    单选题
    When using Form Based Authentication, which pair of fields must be used in the login form?()
    A

     j_user and j_id

    B

     j_id and j_password

    C

     j_users and j_password

    D

     j_user and j_password

    E

     j_login and j_password

    F

     j_username and j_password


    正确答案: C
    解析: 暂无解析

  • 第22题:

    多选题
    Upon a user’s first visit to the website, which two operations are always performed when the getSession method is called with no arguments in a servlet?()
    A

    All URLs returned by the server are rewritten.

    B

    An HttpSession object is created if necessary.

    C

    The user name and password of the user are checked.

    D

    The session ID is stored in the HTTP response as a cookie.


    正确答案: C,D
    解析: 暂无解析

  • 第23题:

    单选题
    An organization has decided to deploy an IBM Tivoli Access Manager for Enterprise Single-on solution to help address security and productivity issues. Per their corporate security policy, the organization has detailed requirements related to password management for their enterprise applications.  Which password requirements need to be captured?()
    A

    details related to application user ID requirements

    B

    policy requirements related to the number of applications that a user can access

    C

    policy requirements for application and user initiated password resets and password complexity

    D

    do nothing as password policy requirements are best addressed within the application space rather than in an Enterprise Single Sign-On project


    正确答案: D
    解析: 暂无解析