SCWCD(310-083)

单选题Which security mechanism uses the concept of a realm?()A AuthorizationB Data integrityC ConfidentialityD Authentication

题目
单选题
Which security mechanism uses the concept of a realm?()
A

Authorization

B

Data integrity

C

Confidentiality

D

Authentication

如果没有搜索结果,请直接 联系老师 获取答案。
如果没有搜索结果,请直接 联系老师 获取答案。
相似问题和答案

第1题:

Whichsecuritymechanismisemployedonlyontheserver-sidetolimitaccesstoresourcesorcomponents?()

A.authorization

B.dataintegrity

C.confidentiality

D.authentication


参考答案:A

第2题:

All three types of cryptography schemes have unique function mapping to specific applications. For example, the symmetric key( ) approach is typically used for the encryption of data providing ( ) , whereas asymmetric key cryptography is mainly used in key ( ) and nonrepudiation , thereby providing confidentiality and authentication. The hash ( ) (noncryptic), on the other hand, does not provide confidentiality but provides message integrity, and cryptographic hash algorithms provide message ( ) and identity of peers during transport over insecure channels.

A.Cryptography

B.decode

C.privacy

D.security@@@SXB@@@A.Conduction

B.confidence

C.confidentiality

D.connection@@@SXB@@@A.Authentication

B.structure

C.encryption

D.exchange@@@SXB@@@A.Algorithm

B.Secure

C.structure

D.encryption@@@SXB@@@A.Confidentiality

B.integrity

C.service

D.robustness


正确答案:D,C,C,A,C

第3题:

Whichthe securitymechanismusestheconceptofarealm?()

A.authorization

B.dataintegrity

C.confidentiality

D.authentication


参考答案:D

第4题:

Which security mechanism is employed only on the server-side to limit access to resources or components?()

  • A、 authorization
  • B、 data integrity
  • C、 confidentiality
  • D、 authentication

正确答案:A

第5题:

Which option ensures that data is not modified in transit?()

  • A、Authorization
  • B、Confidentiality
  • C、Authentication
  • D、Integrity

正确答案:D

第6题:

An authentication realm consists of which three authentication resources?()

A. Authentication server

B. Session options

C. Authentication policy

D. End-point security policy

E. Role-mapping rules


参考答案:A, C, E

第7题:

Which two statements about using the CHAP authentication mechanism in a PPP link are true?()

A.CHAP uses a two-way handshake

B.CHAP authentication periodically occurs after link establishment

C.CHAP has no protection from playback attacks

D.CHAP authentication is performed only upon link establishment

E.CHAP uses a three-way handshake

F.CHAP authentication passwords are sent in plaintext


参考答案:B, E

第8题:

Whichsecuritymechanismcanbedirectedthroughtheelementinawebdeploymentdescriptor()?

A.authorization

B.dataintegrity

C.confidentiality

D.authentication


参考答案:D

第9题:

Which two statements about the Wired Equivalent Privacy (WEP) encryption mechanism are true? ()

  • A、the two methods of authentication using the WEP encryption are open and shared key
  • B、the 802.11 standard defines WEP security using 128-bit keys
  • C、WEP can provide stronger authentication through the use of LEAP, PEAP, or EAP-FAST
  • D、WEP is a scalable encryption solution that uses static keys for authentication
  • E、WEP security provides only one-way authentication
  • F、WEPv2 offers improved encryption by replacing the RC4 encryption mechanism with the AES (symmetric block cipher) mechanism

正确答案:A,E

第10题:

Which two pieces of information are needed when declaring the web resource collection in the deployment descriptor?()

  • A、 the URL pattern that requires authorization
  • B、 the HTTP methods that require authorization
  • C、 the users allowed access to the web resource
  • D、 the J2EE roles allowed access to the web resource
  • E、 the authentication mechanism required by the web resource

正确答案:A,B

更多相关问题