多选题Given the two security constraints in a deployment descriptor: 101. 102.  103.SALES 104.SALES 105. 106. 107. 108.  109. 110. If the two security constraints have the same url-pattern and http-method which two inserted independentlyat line 109,will allo

题目
多选题
Given the two security constraints in a deployment descriptor: 101. 102.  103.SALES 104.SALES 105. 106. 107. 108.  109. 110. If the two security constraints have the same url-pattern and http-method which two inserted independentlyat line 109,will allow users with role names of either SALES or MARKETING to access this resource?()
A

<auth-constraint/>

B

<auth-constraint><role-name>*</role-name></auth-constraint>

C

<auth-constraint><role-name>ANY</role-name></auth-constraint>

D

<auth-constraint><role-name>MARKETING</role-name></auth-constraint>


相似考题
更多“多选题Given the two security constraints in a deployment descriptor: 101. 102.  103.SALES 104.SALES 105. 106. 107. 108.  109. 110. If the two security constraints have the same url-pattern and http-method which two inserted independentlyat line 109,will allo”相关问题
  • 第1题:

    Given the two security constraints in a deployment descriptor: 101. 102.  103.SALES 104.SALES 105. 106. 107. 108.  109. 110. If the two security constraints have the same url-pattern and http-method which two inserted independentlyat line 109,will allow users with role names of either SALES or MARKETING to access this resource?()

    • A、<auth-constraint/>
    • B、<auth-constraint><role-name>*</role-name></auth-constraint>
    • C、<auth-constraint><role-name>ANY</role-name></auth-constraint>
    • D、<auth-constraint><role-name>MARKETING</role-name></auth-constraint>

    正确答案:B,D

  • 第2题:

    Which two are valid values for the  element inside a  element ofa web application deployment descriptor?()

    • A、NULL
    • B、SECURE
    • C、INTEGRAL
    • D、ENCRYPTED
    • E、CONFIDENTIAL

    正确答案:C,E

  • 第3题:

    Which two parameters are configured in IPsec policy? ()(Choose two.)

    • A、mode
    • B、IKE gateway
    • C、security proposal
    • D、Perfect Forward Secrecy

    正确答案:C,D

  • 第4题:

    Which two statements about creating constraints are true? ()

    • A、Constraint names must start with SYS_C
    • B、All constraints must be defines at the column level
    • C、Constraints can be created after the table is created
    • D、Constraints can be created at the same time the table is created
    • E、Information about constraints is found in the VIEW_CONSTRAINTS dictionary view

    正确答案:C,D

  • 第5题:

    多选题
    Which two are components of the enhanced services software architecture?() (Choose two.)
    A

    Linux kernel

    B

    routing protocol daemon

    C

    session-based forwarding module

    D

    separate routing and security planes


    正确答案: C,A
    解析: 暂无解析

  • 第6题:

    多选题
    Given the two security constraints in a deployment descriptor: 101. 102.  103.SALES 104.SALES 105. 106. 107. 108.  109. 110. If the two security constraints have the same url-pattern and http-method which two inserted independentlyat line 109,will allow users with role names of either SALES or MARKETING to access this resource?()
    A

    <auth-constraint/>

    B

    <auth-constraint><role-name>*</role-name></auth-constraint>

    C

    <auth-constraint><role-name>ANY</role-name></auth-constraint>

    D

    <auth-constraint><role-name>MARKETING</role-name></auth-constraint>


    正确答案: C,D
    解析: 暂无解析

  • 第7题:

    多选题
    Which two statements are true about the security-related tags in a valid Java EE deployment descriptor?()
    A

    Every  tag must have at least one  tag.

    B

    A  tag can have many  tags.

    C

    A given  tag can apply to only one  tag.

    D

    A given  tag can contain from zero to many  tags.

    E

    It is possible to construct a valid  tag such that,for a given resource,no user rolescan access that resource.


    正确答案: D,A
    解析: 暂无解析

  • 第8题:

    多选题
    Which two statements regarding firewall user authentication client groups are true?() (Choose two.)
    A

    A client group is a list of clients associated with a group.

    B

    A client group is a list of groups associated with a client.

    C

    Client groups are referenced in security policy in the same manner in which individual clients are referenced.

    D

    Client groups are used to simplify configuration by enabling firewall user authentication without security policy.


    正确答案: D,A
    解析: 暂无解析

  • 第9题:

    多选题
    At which two levels of the Junos CLI hierarchy is the host-inbound-traffic command configured? ()(Choose two.)
    A

    [edit security idp]

    B

    [edit security zones security-zone trust interfaces ge-0/0/0.0]

    C

    [edit security zones security-zone trust]

    D

    [edit security screen]


    正确答案: B,D
    解析: 暂无解析

  • 第10题:

    多选题
    Which two statements about creating constraints are true?()
    A

    Constraint names must start with SYS_C

    B

    All constraints must be defines at the column level.

    C

    Constraints can be created after the table is created.

    D

    Constraints can be created at the same time the table is created.

    E

    Information about constraints is found in the VIEW_CONSTRAINTS dictionary view.


    正确答案: A,E
    解析: 暂无解析

  • 第11题:

    多选题
    Which two security mechanisms protect the response stream?()
    A

    authorization

    B

    data integrity

    C

    confidentiality

    D

    authentication


    正确答案: B,C
    解析: 暂无解析

  • 第12题:

    多选题
    The PIX Security Appliance feature set is a subset of the ASA Security Appliance feature set. Which two of these features are only supported by an ASA Security Appliance? (Choose two.)()
    A

    security contexts

    B

    - transparent firewall

    C

    WebVPN

    D

    Active/Active failover

    E

    low latency queuing

    F

    AIP-SSM intrusion prevention


    正确答案: D,A
    解析: 暂无解析

  • 第13题:

    Which two security mechanisms can be directed through a sub-element of the element in a web application deployment descriptor?()

    • A、Authorization
    • B、Data integrity
    • C、Confidentiality
    • D、Authentication

    正确答案:B,C

  • 第14题:

    At which two levels of the Junos CLI hierarchy is the host-inbound-traffic command configured? ()(Choose two.)

    • A、[edit security idp]
    • B、[edit security zones security-zone trust interfaces ge-0/0/0.0]
    • C、[edit security zones security-zone trust]
    • D、[edit security screen]

    正确答案:B,C

  • 第15题:

    For which two constraints does the Oracle Server implicitly create a unique index?()

    • A、NOT NULL
    • B、PRIMARY KEY
    • C、FOREIGN KEY
    • D、CHECK
    • E、UNIQUE

    正确答案:B,E

  • 第16题:

    Which two statements about creating constraints are true?()

    • A、Constraint names must start with SYS_C
    • B、All constraints must be defines at the column level.
    • C、Constraints can be created after the table is created.
    • D、Constraints can be created at the same time the table is created.
    • E、Information about constraints is found in the VIEW_CONSTRAINTS dictionary view.

    正确答案:C,D

  • 第17题:

    多选题
    Which two security mechanisms can be directed through a sub-element of the element in a web application deployment descriptor?()
    A

    Authorization

    B

    Data integrity

    C

    Confidentiality

    D

    Authentication


    正确答案: A,C
    解析: 暂无解析

  • 第18题:

    多选题
    Which two security policy actions are valid?()
    A

    deny

    B

    discard

    C

    reject

    D

    close


    正确答案: A,D
    解析: 暂无解析

  • 第19题:

    多选题
    Which two are valid values for the  element inside a  element ofa web application deployment descriptor?()
    A

    NULL

    B

    SECURE

    C

    INTEGRAL

    D

    ENCRYPTED

    E

    CONFIDENTIAL


    正确答案: D,C
    解析: 暂无解析

  • 第20题:

    多选题
    Given the security constraint in a DD:// 101. 102. 103.Foo 104./Bar/Baz/* 105.POST 106. 107. 108.DEVELOPER 109. 110. And given that "MANAGER" is a valid role-name,which four are true for this security constraint?()
    A

    MANAGER can do a GET on resources in the /Bar/Baz directory.

    B

    MANAGER can do a POST on any resource in the /Bar/Baz directory.

    C

    MANAGER can do a TRACE on any resource in the /Bar/Baz directory.

    D

    DEVELOPER can do a GET on resources in the /Bar/Baz directory.

    E

    DEVELOPER can do only a POST on resources in the /Bar/Baz directory.

    F

    DEVELOPER can do a TRACE on any resource in the /Bar/Baz directory.


    正确答案: A,C,D,F
    解析: 暂无解析

  • 第21题:

    多选题
    Which two statements about creating constraints are true?()
    A

    Constraint names must start with SYS_C

    B

    All constraints must be defines at the column level

    C

    Constraints can be created after the table is created

    D

    Constraints can be created at the same time the table is created

    E

    Information about constraints is found in the VIEW_CONSTRAINTS dictionary view


    正确答案: C,D
    解析: 暂无解析

  • 第22题:

    多选题
    Which two are valid values for the  element inside a  element of a web application deployment descriptor?()
    A

    NULL

    B

    SECURE

    C

    INTEGRAL

    D

    ENCRYPTED

    E

    CONFIDENTIAL


    正确答案: C,E
    解析: 暂无解析

  • 第23题:

    多选题
    For which two constraints does the Oracle Server implicitly create a unique index? ()
    A

    NOT NULL

    B

    PRIMARY KEY

    C

    FOREIGN KEY

    D

    CHECK

    E

    UNIQUE


    正确答案: A,D
    解析: 暂无解析