可学答题网 > 问答 > SCWCD(310-083)题库
目录: 标题| 题干| 答案| 搜索| 相关
问题

Given the security con


Given the security constraint in a DD: 101.<security-constraint> 102.<web-resource-collection> 103.<web-resource-name>Foo</web-resource-name> 104.<url-pattern>/Bar/Baz/*</url-pattern> 105.<http-method>POST</http-method> 106.</web-resource-collection> 107.<auth-constraint> 108.<role-name>DEVELOPER</role-name> 109.</auth-constraint> 110.</security-constraint> And given that "MANAGER" is a valid role-name,which four are true for this security constraint?()

  • AMANAGER can do a GET on resources in the /Bar/Baz directory.
  • BMANAGER can do a POST on any resource in the /Bar/Baz directory.
  • CMANAGER can do a TRACE on any resource in the /Bar/Baz directory.
  • DDEVELOPER can do a GET on resources in the /Bar/Baz directory.
  • EDEVELOPER can do only a POST on resources in the /Bar/Baz directory.
  • FDEVELOPER can do a TRACE on any resource in the /Bar/Baz directory.
参考答案
参考解析:
分类:SCWCD(310-083)题库
相关推荐

1、Given the formula: (Fi

Given&ensp;the&ensp;formula:&ensp;(Fiber&ensp;Attenuation&ensp;*&ensp;Km)&ensp;+&ensp;(Splice&ensp;Attenuation&ensp;*&ensp;#&ensp;of&ensp;Splices)&ensp;+&ensp;...

2、The Company security a

The&ensp;Company&ensp;security&ensp;administrator&ensp;is&ensp;concerned&ensp;with&ensp;layer&ensp;2&ensp;network&ensp;attacks.&ensp;Which&ensp;two&ensp;&ensp;statem...

3、Given the following sc

Given&ensp;the&ensp;following&ensp;scripts,&ensp;both&ensp;found&ensp;in&ensp;/usr/local/bin,&ensp;what&ensp;would&ensp;the&ensp;output&ensp;be&ensp;when&ensp;exec...

4、Given the following in

Given&ensp;the&ensp;following&ensp;interface&ensp;definition,&ensp;which&ensp;definitions&ensp;are&ensp;valid?()&ensp;&ensp;interface&ensp;I&ensp;{&ensp;&ensp;vo...

5、Given the following on

Given&ensp;the&ensp;following&ensp;on&ensp;a&ensp;system&ensp;that&ensp;is&ensp;not&ensp;a&ensp;name&ensp;server,&ensp;which&ensp;will&ensp;be&ensp;the&ensp;first&e...

6、The Company security a

The&ensp;Company&ensp;security&ensp;administrator&ensp;is&ensp;concerned&ensp;with&ensp;VLAN&ensp;hopping&ensp;based&ensp;attacks.Which&ensp;two&ensp;&ensp;statement...