niusouti.com

单选题A "trusted" client needs to communicate with a server that has been configured to use CLIENT authentication. Which of the following will be used to verify passwords?()A User ID/password fileB Communications layerC Client applicationsD Operating system

题目
单选题
A "trusted" client needs to communicate with a server that has been configured to use CLIENT authentication. Which of the following will be used to verify passwords?()
A

User ID/password file

B

Communications layer

C

Client applications

D

Operating system


相似考题

2.The File Transfer Protocol (FTP) is a standard network protocol used for the transfer of computer ( ) between a client and server on a computer network.FTP is built on a ( ) model architecture using separate control and data connections between the client and the server. FTP users may authenticate themselves with a ( ) sign-in protocol, normally in the form of a username and password, but can connect anonymously if the server is configured to allow it. For secure transmission that protects the username and password, and encrypts the content, FTP is often secured with SSL/TLS (FTPS) or replaced with SSH File Transfer Protocol (SFTP).The first FTP client applications were (请作答此空) programs developed before operating systems had graphical user interfaces, and are still shipped with most Windows, Unix, and Linux operating systems. Many FTP clients and automation utilities have since been developed for desktops, servers, mobile devices, and hardware, and FTP has been incorporated into productivity applications, such as HTML editors.FTP may run in ( ) mode, which determines how the data connection is established. In both cases, the client creates a TCP control connection from a random, usually an unprivileged, port N to the FTP server command port 21.In active mode, the client starts listening for incoming data connections from the server on port M. It sends the FTP command PORT M to inform the server on which port it is listening. The server then initiates a data channel to the client from its port 20, the FTP server data port.In situations where the client is behind a firewall and unable to accept incoming TCP connections, passive mode may be used. In this mode, the client uses the control connection to send a PASV command to the server and then receives a server IP address and server port number from the server, which the client then uses to open a data connection from an arbitrary client port to the server IP address and server port number received.Both modes were updated in September 1998 to support IPv6. Further changes were introduced to the passive mode at that time, updating it to extended passive mode.A.command-line B.graphical C.automation D.productivity

4.The File Transfer Protocol (FTP) is a standard network protocol used for the transfer of computer ( ) between a client and server on a computer network.FTP is built on a (请作答此空) model architecture using separate control and data connections between the client and the server. FTP users may authenticate themselves with a ( ) sign-in protocol, normally in the form of a username and password, but can connect anonymously if the server is configured to allow it. For secure transmission that protects the username and password, and encrypts the content, FTP is often secured with SSL/TLS (FTPS) or replaced with SSH File Transfer Protocol (SFTP).The first FTP client applications were ( ) programs developed before operating systems had graphical user interfaces, and are still shipped with most Windows, Unix, and Linux operating systems. Many FTP clients and automation utilities have since been developed for desktops, servers, mobile devices, and hardware, and FTP has been incorporated into productivity applications, such as HTML editors.FTP may run in ( ) mode, which determines how the data connection is established. In both cases, the client creates a TCP control connection from a random, usually an unprivileged, port N to the FTP server command port 21.In active mode, the client starts listening for incoming data connections from the server on port M. It sends the FTP command PORT M to inform the server on which port it is listening. The server then initiates a data channel to the client from its port 20, the FTP server data port.In situations where the client is behind a firewall and unable to accept incoming TCP connections, passive mode may be used. In this mode, the client uses the control connection to send a PASV command to the server and then receives a server IP address and server port number from the server, which the client then uses to open a data connection from an arbitrary client port to the server IP address and server port number received.Both modes were updated in September 1998 to support IPv6. Further changes were introduced to the passive mode at that time, updating it to extended passive mode.A.browser-server B.user- server C.client-server D.business -customer

更多“单选题A "trusted" client needs to communicate with a server that has been configured to use CLIENT authentication. Which of the following will be used to verify passwords?()A User ID/password fileB Communications layerC Client applicationsD Operating system”相关问题
  • 第1题:

    A developer is designing a web application that must verify for each request: The originating request is froma trusted network. The client has a valid session.The client has been authenticated. Which design pattern provides a solution in this situation?()

    • A、Transfer Object
    • B、Session Facade
    • C、Intercepting Filter
    • D、Template Method
    • E、Model-View-Controller

    正确答案:C

  • 第2题:

    A user would like to have a roaming profile configured. Which of the following is necessary when setting up a roaming profile? ()(Select TWO).

    • A、The user must configure the settings.
    • B、Roaming profile must be stored on every client.
    • C、The user must be on a domain.
    • D、Roaming profile has to be stored on a network server.
    • E、The user must have an IP address on their client.

    正确答案:C,D

  • 第3题:

    A "trusted" client needs to communicate with a server that has been configured to use CLIENT authentication. Which of the following will be used to verify passwords?()

    • A、User ID/password file
    • B、Communications layer
    • C、Client applications
    • D、Operating system

    正确答案:D

  • 第4题:

    Which two statements regarding firewall user authentication client groups are true?()

    • A、Individual clients are configured under client groups in the configuration hierarchy.
    • B、Client groups are configured under individual clients in the configuration hierarchy.
    • C、Client groups are referenced in security policy in the same manner in which individual clients are referenced.
    • D、Client groups are used to simplify configuration by enabling firewall user authentication without security policy.

    正确答案:B,C

  • 第5题:

    You are designing a plan for maintaining the WINS infrastructure on the new Windows Server 2003 Active Directory environment.  Which factor or factors necessitate the need to maintain the WINS infrastructure?()

    • A、 Client operating systems in use.
    • B、 Server operating systems in use.
    • C、 VPN client access by using PPTP.
    • D、 Installation of Active Directory client software.

    正确答案:A,B

  • 第6题:

    单选题
    A client has a need to look at and add many image files but has no need to change them. Which of the following media types would BEST meet the client’s needs?()
    A

    CD-RW

    B

    Disk

    C

    Flash

    D

    WORM


    正确答案: A
    解析: 暂无解析

  • 第7题:

    单选题
    Refer to the exhibit. A Cisco Aironet Wireless LAN Client Adapter has been installed and configured  through the ADU on the PC. The Aironet System Tray Utility (ASTU) has been enabled during the  installation and the icon appears in the system tray area in the lower right of the desktop. What is the  significance of the icon?()
    A

     It indicates that the radio of the client adapter is disabled.

    B

     It indicates that the client adapter is not associated to an access point or another client. 

    C

     It indicates that the client adapter is associated to an access point or another client, but the user is not  EAP authenticated.

    D

     It indicates that the client adapter is associated to an access point or another client, that the user is  authenticated if the client adapter is configured for EAP authentication, and that the signal strength is  excellent or good.

    E

     It indicates that the client adapter is associated to an access point or another client, that the user is  authenticated if the client adapter is configured for EAP authentication, and that the signal strength is fair.

    F

     It indicates that the client adapter is associated to an access point or another client, that the user is  authenticated if the client adapter is configured for EAP authentication, and that the signal strength is poor.


    正确答案: F
    解析: 暂无解析

  • 第8题:

    单选题
    Your company’s network has client computers that run Windows 7.    When a user attempts to log on to the domain from a computer named Client1,she receives the following message:   The system cannot log you on to this domain because the system’s computer account in its primary domain is missing or the password on that account is incorrect.  You need to ensure that the user can log on to the domain from Client1.   What should you do?()
    A

    Disjoin and rejoin Client1 to the domain.

    B

    Add the computer account for Client1 to the Domain Computers Active Directory group.

    C

    Reset the account password for Client1 through Active Directory Users and Computers.

    D

    Reset the account password for the user through Active Directory Users and Computers.


    正确答案: B
    解析: 暂无解析

  • 第9题:

    多选题
    A user would like to have a roaming profile configured. Which of the following is necessary when setting up a roaming profile? ()(Select TWO).
    A

    The user must configure the settings.

    B

    Roaming profile must be stored on every client.

    C

    The user must be on a domain.

    D

    Roaming profile has to be stored on a network server.

    E

    The user must have an IP address on their client.


    正确答案: A,B
    解析: 暂无解析

  • 第10题:

    单选题
    You review the Failed Attempts logs on an AAA server and find: "unknown network access servererror."  Which failure could produce this error?()
    A

    failure of the wireless client and AAA server handshake

    B

    supplicant authentication failure

    C

    AAA client and AAA server handshake

    D

    Wrong password used by the supplicant


    正确答案: A
    解析: 暂无解析

  • 第11题:

    单选题
    A developer is designing a web application that must verify for each request: The originating request is froma trusted network. The client has a valid session.The client has been authenticated. Which design pattern provides a solution in this situation?()
    A

    Transfer Object

    B

    Session Facade

    C

    Intercepting Filter

    D

    Template Method

    E

    Model-View-Controller


    正确答案: C
    解析: 暂无解析

  • 第12题:

    单选题
    An administrator is trying to diagnose as to why a new VIO client (vio_client1) cannot see an allocated disk (hdisk4) from a VIO server (VIOS-A). The client virtual SCSI adapter has a slot ID of 5 and the corresponding VIO server virtual SCSI adapter has a slot ID of 3. The administrator checks the virtual SCSI configuration from the HMC using the following lshwres command.  lshwres –r virtualio --rsubtype scsi -m 9117-570*65ABCDE  --level lpar -F / lpar_name,slot_num,remote_lpar_name,remote_slot_num,backing_device VIOS A,5,vio_client2,2,hdisk3 VIOS-A,4,vio_client1,4,hdisk4 VIOS-A,3,vio_client1,6,hdisk5 VIOS-A,2,vio_client3,2,hdisk6 vio_client2,2,VIOS-A,5,hdisk0 vio_client1,4,VIOS-A,4,hdisk0  vio_client1,5,VIOS-A,3,null vio_client3,2,VIOS-A,2,hdisk0 From the output above,  what is the most likely reason why the client cannot see the mapped storage?()
    A

     The hard disk has been inccorectly mapped on the VIO server.

    B

     The hard disk has been incorrectly addressed on the VIO client.

    C

     The client SCSI adapter has been mapped to the incorrect server SCSI adapter.

    D

     The server SCSI adapter has been mapped to the incorrect client server adapter.


    正确答案: A
    解析: 暂无解析

  • 第13题:

    Your company has client computers that run Windows XP Professional.   You are planning to install Windows 7 Enterprise on the existing client computers.   You have the following requirements:   Migrate user data and operating system components.  Encrypt and password-protect the migration store.   You need to design a user state migration strategy that supports the requirements. What should you do?()

    • A、Use a hard-link migration store
    • B、Use a compressed migration store
    • C、Perform an offline migration by using Windowsold
    • D、Perform an offline migration by using Windows PE

    正确答案:B

  • 第14题:

    A user reports being occasionally disconnected from the server. Which of the following tools couldthe technician use to determine if it is the client or the server that is dropping the connection?()

    • A、Packet sniffer
    • B、Multimeter
    • C、Load balancer
    • D、Throughput tester

    正确答案:A

  • 第15题:

    An administrator is trying to diagnose as to why a new VIO client (vio_client1) cannot see an allocated disk (hdisk4) from a VIO server (VIOS-A). The client virtual SCSI adapter has a slot ID of 5 and the corresponding VIO server virtual SCSI adapter has a slot ID of 3. The administrator checks the virtual SCSI configuration from the HMC using the following lshwres command.  lshwres –r virtualio --rsubtype scsi -m 9117-570*65ABCDE  --level lpar -F / lpar_name,slot_num,remote_lpar_name,remote_slot_num,backing_device VIOS A,5,vio_client2,2,hdisk3 VIOS-A,4,vio_client1,4,hdisk4 VIOS-A,3,vio_client1,6,hdisk5 VIOS-A,2,vio_client3,2,hdisk6 vio_client2,2,VIOS-A,5,hdisk0 vio_client1,4,VIOS-A,4,hdisk0  vio_client1,5,VIOS-A,3,null vio_client3,2,VIOS-A,2,hdisk0 From the output above,  what is the most likely reason why the client cannot see the mapped storage?()

    • A、 The hard disk has been inccorectly mapped on the VIO server.
    • B、 The hard disk has been incorrectly addressed on the VIO client.
    • C、 The client SCSI adapter has been mapped to the incorrect server SCSI adapter.
    • D、 The server SCSI adapter has been mapped to the incorrect client server adapter.

    正确答案:D

  • 第16题:

    A client/server application has been configured to use local naming. The client and server run on separate machines. When the client tries to connect, it receives a TNS error. By carefully examining the environment, a tnsnames.ora is found only on the Oracle server machine, among other things. After copying this tnsnames.ora onto the client machine, the client is able to connect to the server.  Which statement is true?()

    • A、tnsnames.ora must be on the client machine for local naming. 
    • B、tnsnames.ora must be removed from the server for the connection to work. 
    • C、tnsnames.ora must be on both the client and server machines for local naming. 
    • D、tnsnames.ora is not required for local naming; the problem was not fixed by copying the file to the client.

    正确答案:A

  • 第17题:

    Your company’s network has client computers that run Windows 7.    When a user attempts to log on to the domain from a computer named Client1,she receives the following message:   The system cannot log you on to this domain because the system’s computer account in its primary domain is missing or the password on that account is incorrect.  You need to ensure that the user can log on to the domain from Client1.   What should you do?()

    • A、Disjoin and rejoin Client1 to the domain.
    • B、Add the computer account for Client1 to the Domain Computers Active Directory group.
    • C、Reset the account password for Client1 through Active Directory Users and Computers.
    • D、Reset the account password for the user through Active Directory Users and Computers.

    正确答案:A

  • 第18题:

    单选题
    Refer to the exhibit. A Cisco Aironet Wireless LAN Client Adapter has been installed and configured through the ADU on the PC. The Aironet System Tray Utility (ASTU) has been enabled during the installation and the icon appears in the system tray area in the lower right of the desktop. What is thesignificance of the icon?()
    A

    It indicates that the radio of the client adapter is disabled

    B

    It indicates that the client adapter is not associated to an access point or another client

    C

    It indicates that the client adapter is associated to an access point or another client, but the user is not EAP authenticated

    D

    It indicates that the client adapter is associated to an access point or another client, that the user is authenticated if the client adapter is configured for EAP authentication, and that the signal strength is excellent or good

    E

    It indicates that the client adapter is associated to an access point or another client, that the user is authenticated if the client adapter is configured for EAP authentication, and that the signal strength is fair

    F

    It indicates that the client adapter is associated to an access point or another client, that the user is authenticated if the client adapter is configured for EAP authentication, and that the signal strength is poor


    正确答案: F
    解析: 暂无解析

  • 第19题:

    单选题
    A client/server application has been configured to use local naming. The client and server run on separate machines. When the client tries to connect, it receives a TNS error. By carefully examining the environment, a tnsnames.ora is found only on the Oracle server machine, among other things. After copying this tnsnames.ora onto the client machine, the client is able to connect to the server.  Which statement is true?()
    A

    tnsnames.ora must be on the client machine for local naming. 

    B

    tnsnames.ora must be removed from the server for the connection to work. 

    C

    tnsnames.ora must be on both the client and server machines for local naming. 

    D

    tnsnames.ora is not required for local naming; the problem was not fixed by copying the file to the client.


    正确答案: D
    解析: 暂无解析

  • 第20题:

    单选题
    You review the failed attempts logs on an aaa server and find: "unknown network access server error." Which failure could produce this error?()
    A

    failure of the wireless client and aaa server handshake

    B

    supplicant authentication failure

    C

    aaa client and aaa server handshake

    D

    wrong password used by the supplicant


    正确答案: C
    解析: 暂无解析

  • 第21题:

    单选题
    You review the Failed Attempts logs on an AAA server and find: "unknown network access servererror." Which failure could produce this error?()
    A

    AAA client and AAA server handshake failure

    B

    supplicant authentication failure

    C

    wrong password used by the supplicant

    D

    failure of the wireless client and AAA server handshake


    正确答案: A
    解析: 暂无解析

  • 第22题:

    单选题
    You review the failed attempts logs on an aaa server and find: "unknown network access server error."  Which failure could produce this error?()
    A

    aaa client and aaa server handshake failure

    B

    supplicant authentication failure

    C

    wrong password used by the supplicant

    D

    failure of the wireless client and aaa server handshake


    正确答案: C
    解析: 暂无解析

  • 第23题:

    单选题
    A user reports being occasionally disconnected from the server. Which of the following tools couldthe technician use to determine if it is the client or the server that is dropping the connection?()
    A

    Packet sniffer

    B

    Multimeter

    C

    Load balancer

    D

    Throughput tester


    正确答案: B
    解析: 暂无解析

  • 第24题:

    单选题
    A "trusted" client needs to communicate with a server that has been configured to use CLIENT authentication. Which of the following will be used to verify passwords?()
    A

    User ID/password file

    B

    Communications layer

    C

    Client applications

    D

    Operating system


    正确答案: A
    解析: 暂无解析