Which the security mechanism uses the concept of a realm?()

题目
单选题
Which the security mechanism uses the concept of a realm?()
A

 authorization

B

 data integrity

C

 confidentiality

D

 authentication

如果没有搜索结果或未解决您的问题,请直接 联系老师 获取答案。
相似问题和答案

第1题:

Which cisco security product line uses deep inspection to identify and prevent malicious attacks, resource misuse, and unauthorized access?()

A.MARS

B.NAC

C.VPN

D.IPS


参考答案:D

第2题:

Which statement is true about the components of a queuing mechanism?()

  • A、Each subinterface has its own hardware queue and can experience congestion just like its main interface
  • B、Hardware queuing is only used if the software queues are experiencing congestion.
  • C、Hardware queues and software queues are not used concurrently.
  • D、The hardware queuing system always uses the FIFO queuing mechanism.

正确答案:D

第3题:

Whichelementofawebapplicationdeploymentdescriptorelementisrequired?()

A.<realm-name>

B.<auth-method>

C.<security-role>

D.<transport-guarantee>

E.<web-resource-collection>


参考答案:E

第4题:

Which element of a web application deployment descriptor  element is required?()

  • A、<realm-name>
  • B、<auth-method>
  • C、<security-role>
  • D、<transport-guarantee>
  • E、<web-resource-collection>

正确答案:E

第5题:

Which security mechanism is employed only on the server-side to limit access to resources or components?()

  • A、 authorization
  • B、 data integrity
  • C、 confidentiality
  • D、 authentication

正确答案:A

第6题:

When creating a network security solution, which two pieces of information should you have previously obtained to assist in designing the solution? ()

  • A、a list of existing network applications currently in use on the network
  • B、network audit results to uncover any potential security holes
  • C、a planned Layer 2 design solution
  • D、a proof-of-concept plan
  • E、device configuration templates

正确答案:A,B

第7题:

Which two statements about the Wired Equivalent Privacy (WEP) encryption mechanism are true? ()

  • A、the two methods of authentication using the WEP encryption are open and shared key
  • B、the 802.11 standard defines WEP security using 128-bit keys
  • C、WEP can provide stronger authentication through the use of LEAP, PEAP, or EAP-FAST
  • D、WEP is a scalable encryption solution that uses static keys for authentication
  • E、WEP security provides only one-way authentication
  • F、WEPv2 offers improved encryption by replacing the RC4 encryption mechanism with the AES (symmetric block cipher) mechanism

正确答案:A,E

第8题:

An authentication realm consists of which three authentication resources?()

A. Authentication server

B. Session options

C. Authentication policy

D. End-point security policy

E. Role-mapping rules


参考答案:A, C, E

第9题:

Which element of a web application deployment descriptor  element is required()?

  • A、 <realm-name> 
  • B、 <auth-method> 
  • C、 <security-role> 
  • D、 <transport-guarantee> 
  • E、 <web-resource-collection>

正确答案:E

第10题:

An authentication realm consists of which three authentication resources?()

  • A、Authentication server
  • B、Session options
  • C、Authentication policy
  • D、End-point security policy
  • E、Role-mapping rules

正确答案:A,C,E

更多相关问题