单选题Which mechanism requires the client to provide its public key certificate?()A HTTP Basic AuthenticationB Form Based AuthenticationC HTTP Digest AuthenticationD HTTPS Client Authentication

题目
单选题
Which mechanism requires the client to provide its public key certificate?()
A

HTTP Basic Authentication

B

Form Based Authentication

C

HTTP Digest Authentication

D

HTTPS Client Authentication


相似考题
更多“单选题Which mechanism requires the client to provide its public key certificate?()A HTTP Basic AuthenticationB Form Based AuthenticationC HTTP Digest AuthenticationD HTTPS Client Authentication”相关问题
  • 第1题:

    属于IEEE802.11的用户认证机制有:()。

    A.Open authentication

    B.Pre-Shared Key authentication

    C.Shared Key authentication

    D.MAC authentication


    参考答案:A, C

  • 第2题:

    You develop a Windows Communication Foundation (WCF) service that uses basic authentication for client credentials. This service is currently configured to use message security. The service is hosted on a server in workgroup mode.Users report that their passwords are stolen when they use public computers.You need to ensure that messages are secure and users are authenticated.You prevent the service from being called over HTTP through Microsoft Internet Information Services (IIS) configuration. What should you do next?()

    • A、Use the transport security mode and specify None for transport client credential type.
    • B、Use the transportWithMessageCredential security mode and specify Basic for the transport client credential type.
    • C、Use the message security mode and specify Basic for the transport client credential type.
    • D、Use the transportWithMessageCredential security mode and specify None for the transport client credential type.

    正确答案:B

  • 第3题:

    In the wireless Advanced Feature Set using lightweight access points, a virtual interface is used when supporting which of the following features?()

    • A、PSK authentication
    • B、EAP authentication
    • C、WPA authentication
    • D、Web authentication

    正确答案:D

  • 第4题:

    If a certificate authority trustpoint is not configured when enabling HTTPS and the remote HTTPS server requires client authentication, connections to the secure HTTP client will fail. Which command must be enabled for correct operation?()

    • A、ip http client secure-ciphersuite 3des-ede-cbc-sha
    • B、ip https max-connections 10
    • C、ip http timeout-policy idle 30 life 120 requests 100
    • D、ip http client secure-trustpoint trustpoint-name

    正确答案:D

  • 第5题:

    Which description of BGP authentication is true?()

    • A、MD5 has been used by BGP to encrypt BGP update packets.
    • B、BGP uses a message-digest algorithm to authenticate BGP peers
    • C、A plain-text password authentication is an option of BGP authentication
    • D、EBGP peers authentication is faster than IBGP peers authentication
    • E、BGP uses public key and private key to authenticate BGP peers.

    正确答案:B

  • 第6题:

    Which activity supports the data integrity requirements of an application?()

    • A、Using HTTPS as a protocol
    • B、Using an LDAP security realm
    • C、Using HTTP Basic authentication
    • D、Using forms-based authentication

    正确答案:A

  • 第7题:

    Which mechanism requires the client to provide its public key certificate?()

    • A、HTTP Basic Authentication
    • B、Form Based Authentication
    • C、HTTP Digest Authentication
    • D、HTTPS Client Authentication

    正确答案:D

  • 第8题:

    You need to recommend a strategy to ensure that the administration of AD LDS is encrypted.  What should you include in the recommendation?()

    • A、a server authentication certificate
    • B、client authentication certificates
    • C、Digest authentication
    • D、Windows Integrated authentication

    正确答案:A

  • 第9题:

    多选题
    Which two authentication mechanisms provide weaker protection than other mechanisms?()
    A

    HTTP Basic Authentication

    B

    Form Based Authentication

    C

    HTTP Digest Authentication

    D

    HTTPS Client Authentication


    正确答案: A,B
    解析: 暂无解析

  • 第10题:

    单选题
    You develop a Windows Communication Foundation (WCF) service that uses basic authentication for client credentials. This service is currently configured to use message security. The service is hosted on a server in workgroup mode.Users report that their passwords are stolen when they use public computers.You need to ensure that messages are secure and users are authenticated.You prevent the service from being called over HTTP through Microsoft Internet Information Services (IIS) configuration. What should you do next?()
    A

    Use the transport security mode and specify None for transport client credential type.

    B

    Use the transportWithMessageCredential security mode and specify Basic for the transport client credential type.

    C

    Use the message security mode and specify Basic for the transport client credential type.

    D

    Use the transportWithMessageCredential security mode and specify None for the transport client credential type.


    正确答案: C
    解析: 暂无解析

  • 第11题:

    单选题
    Which mechanism requires the client to provide its public key certificate?()
    A

    HTTP Basic Authentication

    B

    Form Based Authentication

    C

    HTTP Digest Authentication

    D

    HTTPS Client Authentication


    正确答案: C
    解析: 暂无解析

  • 第12题:

    单选题
    Which the basic authentication type is optional for a J2EE 1.4 compliant web container?()
    A

     HTTP Basic Authentication

    B

     Form Based Authentication

    C

     HTTP Digest Authentication

    D

     HTTPS Client Authentication


    正确答案: A
    解析: 暂无解析

  • 第13题:

    Which two are true about authentication?()

    • A、Form-based logins should NOT be used with HTTPS.
    • B、When using Basic Authentication the target server is NOT authenticated.
    • C、J2EE compliant web containers are NOT required to support the HTTPS protocol.
    • D、Web containers are required to support unauthenticated access to unprotected web resources.

    正确答案:B,D

  • 第14题:

    属于IEEE802.11的用户认证机制有:()。

    • A、Open authentication
    • B、Pre-Shared Key authentication
    • C、Shared Key authentication
    • D、MAC authentication

    正确答案:A,C

  • 第15题:

    If authentication is enabled,which statement is true?()

    • A、client reports will display authenticated usernames
    • B、client reports will display both the username and IP address of the clients
    • C、client reports are not affected by authentication
    • D、client reports will display the IP address of the authentication server

    正确答案:A

  • 第16题:

    Which two statements about the open and shared key wireless-authentication methods are true?()

    • A、shared key authentication is considered more secure than open authentication
    • B、shared key authentication is considered less secure than open authentication
    • C、if the WEP keys do not match using the open authentication method, the client will not authenticate, associate, and transfer data
    • D、if the WEP keys do not match using the open authentication method, the client will still be able to authenticate and associate, but will not transfer data
    • E、if the WEP keys do not match using the open authentication method, the client will still be able to authenticate, associate, and transfer data

    正确答案:B,D

  • 第17题:

    Which two authentication mechanisms provide weaker protection than other mechanisms?()

    • A、 HTTP Basic Authentication
    • B、 Form Based Authentication
    • C、 HTTP Digest Authentication
    • D、 HTTPS Client Authentication

    正确答案:A,B

  • 第18题:

    Which basic authentication type is optional for a J2EE 1.4 compliant web container?()

    • A、HTTP Basic Authentication
    • B、Form Based Authentication
    • C、HTTP Digest Authentication
    • D、HTTPS Client Authentication

    正确答案:C

  • 第19题:

    Which statement is correct about HTTP trickling?()

    • A、It prevents the HTTP client or server from timing-out during an antivirus update
    • B、It prevents the HTTP client or server from timing-out during antivirus scanning.
    • C、It is an attack.
    • D、It is used to bypass antivirus scanners.

    正确答案:B

  • 第20题:

    You have an Exchange Server 2003 organization.  All users connect to their mailboxes by using Microsoft Office Outlook.  You start to transition the organization to new Exchange Server 2010 servers. The new servers are on a secured subnet that is separated by a firewall. You will move half of the mailboxes to the new servers.  Client Access servers and Mailbox servers are on the secured subnet. Client computers on the network can access the Client Access servers.  You need to recommend a solution that allows users to connect to Public Folders by using Outlook orOutlook Web App (OWA).  What should you include in the solution?()

    • A、Public Folder referrals and forms-based authentication
    • B、Public Folder referrals and HTTP connections to the Mailbox servers
    • C、Public Folder replicas and MAPI connections to the Mailbox servers
    • D、Public Folder replicas and WebReady Document Viewing

    正确答案:C

  • 第21题:

    单选题
    Which statement is correct about HTTP trickling?()
    A

    It prevents the HTTP client or server from timing-out during an antivirus update

    B

    It prevents the HTTP client or server from timing-out during antivirus scanning.

    C

    It is an attack.

    D

    It is used to bypass antivirus scanners.


    正确答案: D
    解析: 暂无解析

  • 第22题:

    单选题
    Which basic authentication type is optional for a J2EE 1.4 compliant web container?()
    A

    HTTP Basic Authentication

    B

    Form Based Authentication

    C

    HTTP Digest Authentication

    D

    HTTPS Client Authentication


    正确答案: B
    解析: 暂无解析

  • 第23题:

    单选题
    If a certificate authority trustpoint is not configured when enabling HTTPS and the remote HTTPS server requires client authentication, connections to the secure HTTP client will fail. Which command must be enabled for correct operation?()
    A

    ip http client secure-ciphersuite 3des-ede-cbc-sha

    B

    ip https max-connections 10

    C

    ip http timeout-policy idle 30 life 120 requests 100

    D

    ip http client secure-trustpoint trustpoint-name


    正确答案: C
    解析: 暂无解析

  • 第24题:

    单选题
    Which activity supports the data integrity requirements of an application?()
    A

    Using HTTPS as a protocol

    B

    Using an LDAP security realm

    C

    Using HTTP Basic authentication

    D

    Using forms-based authentication


    正确答案: C
    解析: 暂无解析