IBM认证考试

You have successfully configured EchoClient and EchoApplication secured by Web Services Security Management (WSSM). You want to test that authorization is correctly being performed on the request. Which technique would allow you to do this?()A、stop all r

题目

You have successfully configured EchoClient and EchoApplication secured by Web Services Security Management (WSSM). You want to test that authorization is correctly being performed on the request. Which technique would allow you to do this?()

  • A、stop all running instances of PDACLD
  • B、log in to the EchoClient as a different IBM Tivoli Access Manager for e-business (TAMeb) user
  • C、change the TAMeb ACL policy applying to the Web Services namespace
  • D、update the authorization module configuration in the Trust Service using the IBM Tivoli Federated Identity Manager Console
如果没有搜索结果,请直接 联系老师 获取答案。
如果没有搜索结果,请直接 联系老师 获取答案。
相似问题和答案

第1题:

You work as the IT professional in an international company which is named Wiikigo. You are experiencedin implementing and administering a network operating system. You are specialized in deploying servers,configuring Windows Server 2008 Terminal services and network application services, and configuring aweb services infrastructure. You manage a server that runs Windows Server 2008. The TS Gateway roleservice is installed on this server. You have to provide a security group access to the TS Gateway server. So what action should you perform?()

  • A、A Terminal Services Resource Authorization Policy should be created and configured.
  • B、A Terminal Services Connection Authorization Policy should be created and configured.
  • C、The security group should be added to the Remote Desktop Users group.
  • D、The security group should be added to the TS Web Access Computers group.

正确答案:B

第2题:

You want to allow all hosts on interface ge-0/0/0.0 to be able to ping the device’s ge-0/0/0.0 IP address.Where do you configure this functionality?()

  • A、[edit interfaces]
  • B、[edit security zones]
  • C、[edit system services]
  • D、[edit security interfaces]

正确答案:B

第3题:

Every morning, you inspect your company‘s development and staging servers. You do this to ensure that the servers have the same versions of all files in your Web application.For security reasons, you can only access the staging server through FTP.You need to synchronize files from the staging server so that the staging server matches the development server.You want to achieve this goal by using the minimum amount of administrative effort.Which tool should you use?()

A. FTP

B. XCOPY

C. the Publish Web tool

D. the Copy Web tool


参考答案:D

第4题:

You upgrade 11 computers in the accounting department from Windows NT Workstation 4.0 to Windows 2000 Professional. All of the upgraded computers are configured to have the default security settings.   After the upgrade, users in the accounting department report that they can no longer run any financial or credit applications on their computers.   You want all accounting department users to be able to run these applications. You want to allow only the rights that allow users to run the applications.   What should you do?()

  • A、Add each user account to the Power Users group on that user’s computer.
  • B、Configure the financial and credit applications to run as services on the computers in the accounting department.
  • C、Apply the Compatws.inf security template to the local security policy of the computers in the accounting department.
  • D、Use the Computer Management console to configure separate memory spaces for each financial and credit application on the accounting department computers.

正确答案:C

第5题:

Your company has an Active Directory domain. A server named Server2 runs Windows Server 2008. All client computers run Windows Vista.  You install the Terminal Services role,Terminal Services Web Access role service,and Terminal Services Gateway role service on Server2.  You need to ensure that all client computers have compliant firewall, antivirus software,and antispyware. Which two actions should you perform?()

  • A、Configure Network Access Protection (NAP) on a server in the domain.
  • B、Add the Terminal Services servers to the Windows Authorization Access domain local security group.
  • C、Add the Terminal Services client computers to the Windows Authorization Access domain local security group.
  • D、Enable the Request clients to send a statement of health option in the Terminal Services client access policy.

正确答案:A,D

第6题:

You work as the IT professional in an international company which is named Wiikigo. You are experiencedin implementing and administering a network operating system. You are specialized in deploying servers,configuring Windows Server 2008 Terminal services and network application services, and configuring aweb services infrastructure. A Windows Server 2008 server is contained by your company and the WebServer (IIS) server role is installed on the server. A Web site is included by the server. Since you are thetechnical report, you are required to encrypt the cookies sent from the Web site on users computers. Which Web site feature should be configured to achieve the goal?()

  • A、To achieve the goal, Authorization Rules should be configured.
  • B、To achieve the goal, Pages And Controls should be configured.
  • C、To achieve the goal, SSL Settings should be configured.
  • D、To achieve the goal, Machine Key should be configured.

正确答案:D

第7题:

You work as a database administrator for Supportcenter.cn. You want to administer your database servers, which are running on different host machines, using the Web-enabled grid control interface. You have configured the agent on the host machines. You have started the Oracle Database 10g Grid Control utility on your machine. Which two additional components would you configure to achieve this objective?()

  • A、Application Server Control
  • B、Oracle Management Service
  • C、Oracle Enterprise Manager Repository
  • D、Oracle Enterprise Manager Database Control

正确答案:C,D

第8题:

You deploy your companys Internet Web site. You need to deny anonymous access to the Web site, allowing only authenticated users. Which code segment should you use?()

  • A、<authorization> <allow users="?"/> </authorization>
  • B、<authorization> <deny users="?"/> </authorization>
  • C、<authorization> <deny users="*"/></authorization>
  • D、<authorization> <allow users="*"/> </authorization>

正确答案:B

第9题:

Every morning, you inspect your company's development and staging servers. You do this to ensure that the servers have the same versions of all files in your Web application.For security reasons, you can only access the staging server through FTP.You need to synchronize files from the staging server so that the staging server matches the development server.You want to achieve this goal by using the minimum amount of administrative effort. Which tool should you use?()

  • A、FTP
  • B、XCOPY
  • C、the Publish Web tool
  • D、the Copy Web tool

正确答案:D

第10题:

You work as the IT professional in an international company which is named Wiikigo. You are experiencedin implementing and administering a network operating system. You are specialized in deploying servers,configuring Windows Server 2008 Terminal services and network application services, and configuring aweb services infrastructure. You are in charge of a server that runs Windows Server 2008. The server hasthe Web Server (IIS) server role installed. The server contains a Web site that is configured to use onlyWindows Authentication. You have a security group named Group1 that contains several user accounts.Now you receive an order from the company management. According to the company requirement, youhave to prevent the members of Group1 from accessing a Web site. But you are not allowed prevent otherusers from accessing the Web site. Which Web site feature should you configure?()

  • A、You should configure SSL Settings
  • B、You should configure Authentication
  • C、You should configure Authorization Rules
  • D、You should configure IIS Manager Permissions

正确答案:C

更多相关问题