SCDCD(310-081)

多选题Which two security mechanisms protect the response stream?()AauthorizationBdata integrityCconfidentialityDauthentication

题目
多选题
Which two security mechanisms protect the response stream?()
A

authorization

B

data integrity

C

confidentiality

D

authentication

参考答案和解析
正确答案: B,C
解析: 暂无解析
如果没有搜索结果,请直接 联系老师 获取答案。
相似问题和答案

第1题:

Cisco provides two enhancements to 802.11 security which protect a WEP key from exploits. Which two technologies provide these security enhancements? ()

  • A、802.1X
  • B、Cisco Temporal Key Integrity Protocol (CKIP)
  • C、Extensible Authentication Protocol-Flexible Authentication via Secure Tunneling (EAP-FAST)
  • D、Cisco Message Integrity Check (CMIC)
  • E、One-Time Passwords (OTP)
  • F、Advanced Encryption Standard (AES)

正确答案:B,D

第2题:

For a given Servlet Response response, which retrieves an object for writing binary data? ()

  • A、 response.get writer ()
  • B、 response.get Output Stream ()
  • C、 response.getOutput Writer()
  • D、 response.get Writer ().get Output Stream ()
  • E、 response.get Writer (Writer.OUTPUT_BINARY)

正确答案:A,B

第3题:

Which two statements are correct regarding MPLS LSP establishment methods?() (Choose two.)

A. LDP uses Down Stream On Demand.

B. RSVP uses Down Stream On Demand.

C. LDP uses Down Stream Unsolicited.

D. RSVP uses Down Stream Unsolicited.


参考答案:B, C

第4题:

Which two authentication mechanisms provide weaker protection than other mechanisms?()

  • A、 HTTP Basic Authentication
  • B、 Form Based Authentication
  • C、 HTTP Digest Authentication
  • D、 HTTPS Client Authentication

正确答案:A,B

第5题:

Which two statements are correct regarding MPLS LSP establishment methods?() (Choose two.)

  • A、LDP uses Down Stream On Demand.
  • B、RSVP uses Down Stream On Demand.
  • C、LDP uses Down Stream Unsolicited.
  • D、RSVP uses Down Stream Unsolicited.

正确答案:B,C

第6题:

A datacenter director implements a new security measure in response to multiple equipment thefts from the datacenter. The new security measure requires people entering or leaving the data center to go through an extra secure area. Once entering the area people must present two forms of authentication to leave. Which of the following security measures does this describe?()

  • A、Mantrap
  • B、RFID cards
  • C、Defense in depth
  • D、Biometrics

正确答案:A

第7题:

Which two security mechanisms protect the response stream?()

  • A、 authorization
  • B、 data integrity
  • C、 confidentiality
  • D、 authentication

正确答案:B,C

第8题:

What are two ways in which the Cisco Security Monitoring, Analysis, and Response System provides superior network protection? ()

  • A、 reports financial losses from attacks
  • B、 providessecutiy command and control
  • C、 provides VPN connectivity to clients
  • D、 expedites reporting of incidents
  • E、 manage rogue wireless signals

正确答案:B,D

第9题:

Which two are needed components when designing and implementing a security solution?()

  • A、detailed VLAN information
  • B、an incident response plan
  • C、results of testing the new network configuration
  • D、an existing hierarchical network topology
  • E、a security policy for your organization

正确答案:B,E

第10题:

Which two security mechanisms can be directed through a sub-element of the element in a web application deployment descriptor?()

  • A、Authorization
  • B、Data integrity
  • C、Confidentiality
  • D、Authentication

正确答案:B,C

更多相关问题