A.aaa new-model command
B.secret password for the root user
C.usernames and passwords
D.multiple privilege levels
您可能感興趣的試卷
你可能感興趣的試題
A.Performing end-user training on the use of antispyware software
B.Performing virus scans
C.Scanning a network for active IP addresses and open ports on those IP addresses
D.Using password-cracking utilities
A.Top-secret
B.Confidential
C.SBU
D.Secret
A.Host-based IPS can work in promiscuous mode or inline mode.
B.Network-based IPS can provide protection to desktops and servers without the need of installing specialized software on the end hosts and servers.
C.Network-based IPS is better suited for inspection of SSL and TLS encrypted data flows.
D.Host-based IPS deployment requires less planning than network-based IPS.
A.HMAC
B.RSA
C.MD5
D.SHA-1
A.MD65
B.SHA-135
C.XR12
D.MD5
最新試題
Which method is of gaining access to a system that bypasses normal security measures?()
If you click the Configure button along the top of Cisco SDM is graphical interface,which Tasks buttonpermits you to configure such features as SSH, NTP, SNMP, and syslog?()
When configuring SSH, which is the Cisco minimum recommended modulus value?()
What is the objective of Diffie-Hellman?()
What will be disabled as a result of the no service password-recovery command?()
Which statement is correct regarding the aaa configurations based on the exhibit provided?()
Which name is of the e-mail traffic monitoring service that underlies that architecture of IronPort?()
Refer to the exhibit. Based on the VPN connection shown, which statement is true?()
Which two primary port authentication protocols are used with VSANs?()
Regarding constructing a good encryption algorithm, what does creating an avalanche effect indicate?()