A.aaa new-model command
B.secret password for the root user
C.usernames and passwords
D.multiple privilege levels
您可能感興趣的試卷
你可能感興趣的試題
A.Performing end-user training on the use of antispyware software
B.Performing virus scans
C.Scanning a network for active IP addresses and open ports on those IP addresses
D.Using password-cracking utilities
A.Top-secret
B.Confidential
C.SBU
D.Secret
A.Host-based IPS can work in promiscuous mode or inline mode.
B.Network-based IPS can provide protection to desktops and servers without the need of installing specialized software on the end hosts and servers.
C.Network-based IPS is better suited for inspection of SSL and TLS encrypted data flows.
D.Host-based IPS deployment requires less planning than network-based IPS.
A.HMAC
B.RSA
C.MD5
D.SHA-1
A.MD65
B.SHA-135
C.XR12
D.MD5
最新試題
If you click the Configure button along the top of Cisco SDM is graphical interface,which Tasks buttonpermits you to configure such features as SSH, NTP, SNMP, and syslog?()
During role-based CLI configuration, what must be enabled before any user views can be created?()
Refer to the exhibit. Which statement is correct based on the show login command output shown?()
What will be disabled as a result of the no service password-recovery command?()
Which type of MAC address is dynamically learned by a switch port and then added to the switch’s runningconfiguration?()
Refer to the exhibit. You are the network security administrator responsible for router security.Your networkuses internal IP addressing according to RFC 1918 specifications.From the default rules shown,whichaccess control list would prevent IP address spoofing of these internal networks?()
Which one of the Cisco IOS commands can be used to verify that either the Cisco IOS image, theconfiguration files,or both have been properly backed up and secured?()
How do you define the authentication method that will be used with AAA?()
Please choose the correct description about Cisco Self-Defending Network characteristics.()
Which key method is used to detect and prevent attacks by use of IDS and/or IPS technologies?()