SCDCD(310-081)

多选题Which two authentication mechanisms provide weaker protection than other mechanisms?()AHTTP Basic AuthenticationBForm Based AuthenticationCHTTP Digest AuthenticationDHTTPS Client Authentication

题目
多选题
Which two authentication mechanisms provide weaker protection than other mechanisms?()
A

HTTP Basic Authentication

B

Form Based Authentication

C

HTTP Digest Authentication

D

HTTPS Client Authentication

如果没有搜索结果,请直接 联系老师 获取答案。
如果没有搜索结果,请直接 联系老师 获取答案。
相似问题和答案

第1题:

Which two statements regarding firewall user authentication client groups are true?() (Choose two.)

  • A、A client group is a list of clients associated with a group.
  • B、A client group is a list of groups associated with a client.
  • C、Client groups are referenced in security policy in the same manner in which individual clients are referenced.
  • D、Client groups are used to simplify configuration by enabling firewall user authentication without security policy.

正确答案:B,C

第2题:

Which IS-IS authentication method is supported on the ERX Edge Router?()

  • A、simple password
  • B、HMAC message digest 5
  • C、Password Authentication Protocol
  • D、Challenge Handshake Authentication Protocol

正确答案:B

第3题:

Which two statements regarding firewall user authentication client groups are true?() (Choose two.)

A. A client group is a list of clients associated with a group.

B. A client group is a list of groups associated with a client.

C. Client groups are referenced in security policy in the same manner in which individual clients are referenced.

D. Client groups are used to simplify configuration by enabling firewall user authentication without security policy.


参考答案:B, C

第4题:

Which two statements about the open and shared key wireless-authentication methods are true?()

  • A、shared key authentication is considered more secure than open authentication
  • B、shared key authentication is considered less secure than open authentication
  • C、if the WEP keys do not match using the open authentication method, the client will not authenticate, associate, and transfer data
  • D、if the WEP keys do not match using the open authentication method, the client will still be able to authenticate and associate, but will not transfer data
  • E、if the WEP keys do not match using the open authentication method, the client will still be able to authenticate, associate, and transfer data

正确答案:B,D

第5题:

Which two are true about authentication?()

  • A、Form-based logins should NOT be used with HTTPS.
  • B、When using Basic Authentication the target server is NOT authenticated.
  • C、J2EE compliant web containers are NOT required to support the HTTPS protocol.
  • D、Web containers are required to support unauthenticated access to unprotected web resources.

正确答案:B,D

第6题:

Which two statements about the open and shared key wireless-authentication methods are true? ()

  • A、 Shared key authentication is considered more secure than open authentication.
  • B、 Shared key authentication is considered less secure than open authentication.
  • C、 If the WEP keys do not match using the open authentication method, the client will not authenticate, associate, and transfer data.
  • D、 If the WEP keys do not match using the open authentication method, the client will still be able to authenticate and associate, but will not transfer data.
  • E、 If the WEP keys do not match using the open authentication method, the client will still be able to authenticate, associate, and transfer data.

正确答案:B,D

第7题:

Which two security mechanisms protect the response stream?()

  • A、 authorization
  • B、 data integrity
  • C、 confidentiality
  • D、 authentication

正确答案:B,C

第8题:

Which two statements about using the CHAP authentication mechanism in a PPP link are true?()

A.CHAP uses a two-way handshake

B.CHAP authentication periodically occurs after link establishment

C.CHAP has no protection from playback attacks

D.CHAP authentication is performed only upon link establishment

E.CHAP uses a three-way handshake

F.CHAP authentication passwords are sent in plaintext


参考答案:B, E

第9题:

Which two statements about using the CHAP authentication mechanism in a PPP link are true?()

  • A、CHAP uses a two-way handshake
  • B、CHAP authentication periodically occurs after link establishment
  • C、CHAP has no protection from playback attacks
  • D、CHAP authentication is performed only upon link establishment
  • E、CHAP uses a three-way handshake
  • F、CHAP authentication passwords are sent in plaintext

正确答案:B,E

第10题:

Which two authentication mechanisms provide weaker protection than other mechanisms?()

  • A、 HTTP Basic Authentication
  • B、 Form Based Authentication
  • C、 HTTP Digest Authentication
  • D、 HTTPS Client Authentication

正确答案:A,B

更多相关问题