A.aaa new-model command
B.secret password for the root user
C.usernames and passwords
D.multiple privilege levels
您可能感興趣的試卷
你可能感興趣的試題
A.Performing end-user training on the use of antispyware software
B.Performing virus scans
C.Scanning a network for active IP addresses and open ports on those IP addresses
D.Using password-cracking utilities
A.Top-secret
B.Confidential
C.SBU
D.Secret
A.Host-based IPS can work in promiscuous mode or inline mode.
B.Network-based IPS can provide protection to desktops and servers without the need of installing specialized software on the end hosts and servers.
C.Network-based IPS is better suited for inspection of SSL and TLS encrypted data flows.
D.Host-based IPS deployment requires less planning than network-based IPS.
A.HMAC
B.RSA
C.MD5
D.SHA-1
A.MD65
B.SHA-135
C.XR12
D.MD5
最新試題
Which two primary port authentication protocols are used with VSANs?()
When configuring SSH, which is the Cisco minimum recommended modulus value?()
Which three are distinctions between asymmetric and symmetric algorithms? ()
Regarding constructing a good encryption algorithm, what does creating an avalanche effect indicate?()
Refer to the exhibit. You are the network security administrator responsible for router security.Your networkuses internal IP addressing according to RFC 1918 specifications.From the default rules shown,whichaccess control list would prevent IP address spoofing of these internal networks?()
What is a static packet-filtering firewall used for ?()
For the following items, which one acts as a VPN termination device and is located at a primary networklocation?()
Which information is stored in the stateful session flow table while using a stateful firewall?()
As a network engineer at Certpaper.com, you are responsible for Certpaper network. Which will benecessarily taken into consideration when implementing Syslogging in your network?()
In an IEEE 802.1x deployment,between which two devices EAPOL messages typically are sent?()