單項選擇題What should be enabled before any user views can be created during role-based CLI configuration ?()

A.aaa new-model command
B.secret password for the root user
C.usernames and passwords
D.multiple privilege levels


您可能感興趣的試卷

你可能感興趣的試題

1.多項選擇題Which three options are network evaluation techniques? ()

A.Performing end-user training on the use of antispyware software
B.Performing virus scans
C.Scanning a network for active IP addresses and open ports on those IP addresses
D.Using password-cracking utilities

3.單項選擇題Which is the main difference between host-based and network-based intrusion prevention?()

A.Host-based IPS can work in promiscuous mode or inline mode.
B.Network-based IPS can provide protection to desktops and servers without the need of installing specialized software on the end hosts and servers.
C.Network-based IPS is better suited for inspection of SSL and TLS encrypted data flows.
D.Host-based IPS deployment requires less planning than network-based IPS.

最新試題

Which method is of gaining access to a system that bypasses normal security measures?()

題型:單項選擇題

If you click the Configure button along the top of Cisco SDM is graphical interface,which Tasks buttonpermits you to configure such features as SSH, NTP, SNMP, and syslog?()

題型:單項選擇題

When configuring SSH, which is the Cisco minimum recommended modulus value?()

題型:單項選擇題

What is the objective of Diffie-Hellman?()

題型:單項選擇題

What will be disabled as a result of the no service password-recovery command?()

題型:單項選擇題

Which statement is correct regarding the aaa configurations based on the exhibit provided?()

題型:單項選擇題

Which name is of the e-mail traffic monitoring service that underlies that architecture of IronPort?()

題型:單項選擇題

Refer to the exhibit. Based on the VPN connection shown, which statement is true?()

題型:單項選擇題

Which two primary port authentication protocols are used with VSANs?()

題型:多項選擇題

Regarding constructing a good encryption algorithm, what does creating an avalanche effect indicate?()

題型:單項選擇題