Which security mechanism can be directed through the  elemen

题目
单选题
Which security mechanism can be directed through the  element in a web deployment descriptor()?
A

 authorization

B

 data integrity

C

 confidentiality

D

 authentication

参考答案和解析
正确答案: A
解析: 暂无解析
如果没有搜索结果或未解决您的问题,请直接 联系老师 获取答案。
相似问题和答案

第1题:

assuming the default switch configuration which vlan range can be added modified and removed on a cisco switch?()

A.2 through 1001

B.1 through 1001

C.1 through 1002

D.2 through 1005


参考答案:A

第2题:

Which Cisco security tool can best determine it a Cisco ISR router is properly secured? ()

  • A、 Cisco SDM Security Audit
  • B、 Cisco Security MARS
  • C、 Cisco Security Agent MC
  • D、 Cisco Security IntelliShield
  • E、 CAN

正确答案:A

第3题:

Which statement describes a security zone?()

A. A security zone can contain one or more interfaces.

B. A security zone can contain interfaces in multiple routing instances.

C. A security zone must contain two or more interfaces.

D. A security zone must contain bridge groups.


参考答案:A

第4题:

Which two protocols can have their headers compressed through MQC?()

  • A、RTP
  • B、RTSP
  • C、HTTP
  • D、TCP
  • E、UDP

正确答案:A,D

第5题:

Which security mechanism is employed only on the server-side to limit access to resources or components?()

  • A、 authorization
  • B、 data integrity
  • C、 confidentiality
  • D、 authentication

正确答案:A

第6题:

Which of the following is NOT true of security attacks?

[A] Employees will keep up with security polices and awareness if they are highly-trained.

[B] The rate of security attacks appears faster than the growth of the Internet.

[C] One's computer system will never be secure.

[D] Vulnerabilities can go through phones, wireless devices, and network appliances


正确答案:A
依据是"Employees will never keep up with security polices and awareness. It doesn't matter how much you train and educate your employees.

第7题:

Which two statements about the Wired Equivalent Privacy (WEP) encryption mechanism are true? ()

  • A、the two methods of authentication using the WEP encryption are open and shared key
  • B、the 802.11 standard defines WEP security using 128-bit keys
  • C、WEP can provide stronger authentication through the use of LEAP, PEAP, or EAP-FAST
  • D、WEP is a scalable encryption solution that uses static keys for authentication
  • E、WEP security provides only one-way authentication
  • F、WEPv2 offers improved encryption by replacing the RC4 encryption mechanism with the AES (symmetric block cipher) mechanism

正确答案:A,E

第8题:

Which of the following security threats are MOST likely prevented through user training?()

A. Network Intrusion

B. Adware Popups

C. Social Engineering

D. Spam Messages


参考答案:C

第9题:

assuming the default switch configuration which vlan range can be added modified and removed on a cisco switch?()

  • A、2 through 1001
  • B、1 through 1001
  • C、1 through 1002
  • D、2 through 1005

正确答案:A

第10题:

Which QoS mechanism can help classify different kinds of Citrix traffic print job versus real-time terminalcontrol?()

  • A、qos-group
  • B、DSCP
  • C、LFI
  • D、NBAR

正确答案:D

更多相关问题