单选题You have successfully configured EchoClient and EchoApplication secured by Web Services Security Management (WSSM). You want to test that authorization is correctly being performed on the request. Which technique would allow you to do this?()A stop all

题目
单选题
You have successfully configured EchoClient and EchoApplication secured by Web Services Security Management (WSSM). You want to test that authorization is correctly being performed on the request. Which technique would allow you to do this?()
A

stop all running instances of PDACLD

B

log in to the EchoClient as a different IBM Tivoli Access Manager for e-business (TAMeb) user

C

change the TAMeb ACL policy applying to the Web Services namespace

D

update the authorization module configuration in the Trust Service using the IBM Tivoli Federated Identity Manager Console

参考答案和解析
正确答案: C
解析: 暂无解析
如果没有搜索结果或未解决您的问题,请直接 联系老师 获取答案。
相似问题和答案

第1题:

You work as the IT professional in an international company which is named Wiikigo. You are experiencedin implementing and administering a network operating system. You are specialized in deploying servers,configuring Windows Server 2008 Terminal services and network application services, and configuring aweb services infrastructure. You manage a server that runs Windows Server 2008. The TS Gateway roleservice is installed on this server. You have to provide a security group access to the TS Gateway server. So what action should you perform?()

  • A、A Terminal Services Resource Authorization Policy should be created and configured.
  • B、A Terminal Services Connection Authorization Policy should be created and configured.
  • C、The security group should be added to the Remote Desktop Users group.
  • D、The security group should be added to the TS Web Access Computers group.

正确答案:B

第2题:

You work as a database administrator for Supportcenter.cn. You want to administer your database servers, which are running on different host machines, using the Web-enabled grid control interface. You have configured the agent on the host machines. You have started the Oracle Database 10g Grid Control utility on your machine. Which two additional components would you configure to achieve this objective?()

  • A、Application Server Control
  • B、Oracle Management Service
  • C、Oracle Enterprise Manager Repository
  • D、Oracle Enterprise Manager Database Control

正确答案:C,D

第3题:

Every morning, you inspect your company‘s development and staging servers. You do this to ensure that the servers have the same versions of all files in your Web application.For security reasons, you can only access the staging server through FTP.You need to synchronize files from the staging server so that the staging server matches the development server.You want to achieve this goal by using the minimum amount of administrative effort.Which tool should you use?()

A. FTP

B. XCOPY

C. the Publish Web tool

D. the Copy Web tool


参考答案:D

第4题:

You work as the IT professional in an international company which is named Wiikigo. You are experiencedin implementing and administering a network operating system. You are specialized in deploying servers,configuring Windows Server 2008 Terminal services and network application services, and configuring aweb services infrastructure. You are in charge of a server that runs Windows Server 2008. The server hasthe Web Server (IIS) server role installed. The server contains a Web site that is configured to use onlyWindows Authentication. You have a security group named Group1 that contains several user accounts.Now you receive an order from the company management. According to the company requirement, youhave to prevent the members of Group1 from accessing a Web site. But you are not allowed prevent otherusers from accessing the Web site. Which Web site feature should you configure?()

  • A、You should configure SSL Settings
  • B、You should configure Authentication
  • C、You should configure Authorization Rules
  • D、You should configure IIS Manager Permissions

正确答案:C

第5题:

Every morning, you inspect your company's development and staging servers. You do this to ensure that the servers have the same versions of all files in your Web application.For security reasons, you can only access the staging server through FTP.You need to synchronize files from the staging server so that the staging server matches the development server.You want to achieve this goal by using the minimum amount of administrative effort. Which tool should you use?()

  • A、FTP
  • B、XCOPY
  • C、the Publish Web tool
  • D、the Copy Web tool

正确答案:D

第6题:

You want to allow all hosts on interface ge-0/0/0.0 to be able to ping the device’s ge-0/0/0.0 IP address.Where do you configure this functionality?()

  • A、[edit interfaces]
  • B、[edit security zones]
  • C、[edit system services]
  • D、[edit security interfaces]

正确答案:B

第7题:

Your company has an Active Directory domain. A server named Server2 runs Windows Server 2008. All client computers run Windows Vista.  You install the Terminal Services role,Terminal Services Web Access role service,and Terminal Services Gateway role service on Server2.  You need to ensure that all client computers have compliant firewall, antivirus software,and antispyware. Which two actions should you perform?()

  • A、Configure Network Access Protection (NAP) on a server in the domain.
  • B、Add the Terminal Services servers to the Windows Authorization Access domain local security group.
  • C、Add the Terminal Services client computers to the Windows Authorization Access domain local security group.
  • D、Enable the Request clients to send a statement of health option in the Terminal Services client access policy.

正确答案:A,D

第8题:

You deploy your companys Internet Web site. You need to deny anonymous access to the Web site, allowing only authenticated users. Which code segment should you use?()

  • A、<authorization> <allow users="?"/> </authorization>
  • B、<authorization> <deny users="?"/> </authorization>
  • C、<authorization> <deny users="*"/></authorization>
  • D、<authorization> <allow users="*"/> </authorization>

正确答案:B

第9题:

You upgrade 11 computers in the accounting department from Windows NT Workstation 4.0 to Windows 2000 Professional. All of the upgraded computers are configured to have the default security settings.   After the upgrade, users in the accounting department report that they can no longer run any financial or credit applications on their computers.   You want all accounting department users to be able to run these applications. You want to allow only the rights that allow users to run the applications.   What should you do?()

  • A、Add each user account to the Power Users group on that user’s computer.
  • B、Configure the financial and credit applications to run as services on the computers in the accounting department.
  • C、Apply the Compatws.inf security template to the local security policy of the computers in the accounting department.
  • D、Use the Computer Management console to configure separate memory spaces for each financial and credit application on the accounting department computers.

正确答案:C

第10题:

You work as the IT professional in an international company which is named Wiikigo. You are experiencedin implementing and administering a network operating system. You are specialized in deploying servers,configuring Windows Server 2008 Terminal services and network application services, and configuring aweb services infrastructure. There is an Active Directory domain in your company. Windows Server 2008 isrun by a server named S02. All client computers run Windows Vista. You perform the installation of theTerminal Services server role, TS Web Access role service, and TS Gateway role service on S02. Youhave to make sure that all client computers have compliant firewall, antivirus software,and antispyware. What should you do to make sure of this?()

  • A、The Request clients should be enabled to send a statement of health option in the Terminal Servicesclient access policy.
  • B、Network Access Protection (NAP) should be configured on a server in the domain.
  • C、The Terminal Services servers should be added to the Windows Authorization Access domain localsecurity group.
  • D、The Terminal Services client computers should be added to the Windows Authorization Access domainlocal security group.

正确答案:A,B

更多相关问题