You are perfoming security testing on an existing asp.net web page.You notice that you are able to issue unauthorised postback requests to the page. You need to prevent unauthorised post back requests. which page directive you use?()
相似题目
-
You are designing an authentication solution to meet the security needs of the network administrators. You install an enterprise certification authority (CA). Which three additional actions should you take?()
-
You are tasked with designing a security solution for your network. What information should be gathered prior to designing the solution?()
-
You are designing a strategy of enforce the corporate security policy. Which action or actions should you perform?()
-
You need to design a strategy to ensure that all servers are in compliance with the business requirements for maintaining security patches. What should you do?()
-
You are planning to deploy two Windows Server 2008 R2 Hyper-V servers. You need to design the storage of VHD files for maximum security. What should you do?()
-
You are developing a Windows Communication Foundation (WCF) service. You need to enable security auditing for all events. What should you do?()
-
You are designing the security for dial-up remote access to meet the business and technical requirements. Which two mechanisms should you use? ()
-
You are designing a security strategy for the infrastructure servers at the resorts.Which two actions should you perform?(Each correct answer presents part of the solution. Choose two)()
-
You are responsible for increasing the security within the Company LAN. Of the following choices listed below, which is true regarding layer 2 security and mitigation techniques? ()
-
You are designing a strategy to meet the security and financial requirements related to the Manifest application. What should you do? ()
-
You are tasked with designing a security solution for your network. What information should be gathered prior to designing the solution?()
-
You are designing an authentication solution to meet the security needs of the network administrators. You install an enterprise certification authority (CA). Which three additional actions should you take?()
-
You are at a client site. It is a medium-sized business and needs a Cisco Catalyst switch that offers high availability and security. What type of Catalyst switches would you recommend?()
-
You are attempting to secure a MySQL server by using SSL encryption. On starting MySQL, you get this error: 130123 10:38:02 [ERROR] mysqld: unknown option '—ssl' What is the cause of the error?()
-
You are developing an application to create a new file on the local file system.You need to define specific security settings for the file. You must deny the file inheritance of any default security settings during creation.What should you do?()
-
You are implementing basic switch security best practices. Which of these is a tactic that you can use to mitigate compromises from being launched through the switch?()
-
You are planning to deploy two Windows Server 2008 R2 Hyper-V servers. You need to design the storage of VHD files for maximum security. What should you do?()
-
You are designing a security strategy for users who need remote access to the corporate network. What should you do?()
-
You need to configure port security on switch R1. Which two statements are true about this technology? ()
-
You are designing the wireless networks for the three warehouses. Your design must support the inventory and shipping management solution, and it must meet security requirements. What should you do?()
-
You are designing the security for dial-up remote access to meet the business and technical requirements. Which two mechanisms should you use?()
-
You need to design a method to log changes that are made to servers and domain controllers. You also need to track when administrators modify local security account manager objects on servers. What should you do?()
-
&8226;You are the Manager of Market Development Division, and are about to hold a monthly meeting to discuss a teamwork approach to secure a larger market share.
推荐题目
- 在处理期间可以进行其他工作,不必监护在操作台。
- ()是导致建筑火灾人员伤亡的最主要原因。
- 虽然船舶技术的不断进步,船舶的安全性、可靠性不断提高,但也不能可以减少求生知识技能方面的学习。()
- 肝硬化腹水应用利尿剂治疗无效,可用()
- 在辩论中幽默风趣往往取得良好的效果。
- 如果使用3m及以上的长绳时必须要加(),各部件不得任意拆除。
- 历史没有给清政府改革的机会,导致了清政府走向灭亡
- 档案管理不包括行政档案。()
- 由一国或地区(特别行政区或者几个国家)的政府主管部门或机构,根据发明人(设计人)就其发明创造(invention-creations)所提出的专利申请,经审查认为其专利申请符合法律规定,授予该发明人对其发明创造享有的专有权,叫做()
- 根据招议标管理实施细则2018版:-分包合同管理:劳务分包、专业分包合同起草及评审由法务/商务部门负责具体组织 等管理部门参与评审()