单选题By default, what type of SSH server key is generated by Cisco NX-OS Software?()A DSA key generated with 512 bitsB RSA key generated with 768 bitsC RSA key generated with 1024 bitsD DSA key generated with 1024 bitsE RSA key generated with 2048 bits

单选题
By default, what type of SSH server key is generated by Cisco NX-OS Software?()
A

 DSA key generated with 512 bits

B

 RSA key generated with 768 bits

C

 RSA key generated with 1024 bits

D

 DSA key generated with 1024 bits

E

 RSA key generated with 2048 bits


参考解析

解析: 暂无解析

相关考题:

By default, what type of SSH server key is generated by Cisco NX-OS Software?()A、 DSA key generated with 512 bitsB、 RSA key generated with 768 bitsC、 RSA key generated with 1024 bitsD、 DSA key generated with 1024 bitsE、 RSA key generated with 2048 bits

If the default VDC is configured to limit resources to a specific module type, what happens when a module that does not match the resource type is installed?()     A、 The module is powered up, and interfaces are in an "admin down" state.B、 The module is denied power, and a syslog message is generated.C、 The module is powered up, and interfaces are allocated to VDC0.D、 The module is powered up, and interfaces are allocated to VDC100.

You are a network technician at Certpaper.com. Which description is correct when you have generated RSA keys on your Cisco router to prepare for secure device management?()A、You must then specify the general-purpose key size used for authentication with the crypto key generaters a general-keys modulus command.B、You must then zeroize the keys to reset secure shell before configuring other parameters.C、All vty ports are automatically enabled for SSH to provide secure management.D、The SSH protocol is automatically enabled.

What is the minimum key size to enable SSH v2?()A、512 bitsB、768 bitsC、1024 bitsD、2048 bits

When a client using the SERVER_ENCRYPT authentication type connects to a server using the SERVER authentication type, what happens?()A、An error will occur.B、Data passed between the client and the server is encrypted.C、User IDs and passwords are passed to the server unencrypted.D、User IDs and passwords are encrypted before they are passed to the server.

switch (i)  {  default:  System.out.printIn(“Hello”);  }  What is the acceptable type for the variable i?()  A、 ByteB、 LongC、 FloatD、 DoubleE、 ObjectF、 A and BG、 C and D

You have a Windows Server 2008 R2 computer that has an IP address of 172.16.45.9/21.The server is configured to use IPv6 addressing.You need to test IPv6 communication to a server that has an IP address of 172.16.40.18/21. What should you do from a command prompt?()A、Type ping 172.16.45.9:::::.B、Type ping ::9.45.16.172.C、Type ping followed by the Link-local address of the server.D、Type ping followed by the Site-local address of the server.

Which two of these elements need to be configured prior to enabling SSH?()A、hostnameB、loopback addressC、default gatewayD、domain nameE、SSH peer address

When a Cisco router is configured for SSH, it acts as an ()?A、SSH clientB、SSH proxyC、SSH serverD、SSH and SSL server

You are trying to initiate an SSH connection to a remote router and are getting rejected with an error code of 0. Which of these might be the cause of the error?()A、The routers are using different SSH versions.B、You are trying to log in using invalid credentials.C、The RSA key pair is not properly configured on the SSH client.D、The RSA key pair is not properly configured on the SSH server.

With Xorg 7.0, what is the name of the default font server?()A、 xfservB、 xfsC、 fontsD、 xfsttE、 fserv

By default what is the interval for synchronization of the wallet with the IMS Server?()A、once a dayB、once a weekC、every minuteD、every 30 minutes

Given the following requirements: Create a table to contain employee data, with a unique numeric identifier automatically assigned when a row is added, has an EDLEVEL column that permits only the values 'C', 'H' and 'N', and permits inserts only when a corresponding value for the employee's department exists in the DEPARTMENT table. Which of the following CREATE statements will successfully create this table?()A、CREATE TABLE emp ( empno SMALLINT NEXTVAL GENERATED ALWAYS AS IDENTITY, firstname VARCHAR(30) NOT NULL, lastname VARCHAR(30) NOT NULL, workdept CHAR(3) NOT NULL, edlevel CHAR(1), PRIMARY KEY emp_pk (empno), FOREIGN KEY emp_workdept_fk ON (workdept) REFERENCES department (deptno), CHECK edlevel_ck VALUES (edlevel IN ('C','H','N')), );B、CREATE TABLE emp ( empno SMALLINT NOT NULL GENERATED BY DEFAULT AS IDENTITY, firstname VARCHAR(30) NOT NULL, lastname VARCHAR(30) NOT NULL, workdept CHAR(3), edlevel CHAR(1), CONSTRAINT emp_pk PRIMARY KEY (empno), CONSTRAINT emp_workdept_fk FOREIGN KEY (workdept) REFERENCES department (deptno), CONSTRAINT edlevel_ck CHECK edlevel VALUES ('C','H','N') );C、CREATE TABLE emp ( empno SMALLINT NEXTVAL GENERATED BY DEFAULT AS IDENTITY, firstname VARCHAR(30) NOT NULL, lastname VARCHAR(30) NOT NULL, workdept CHAR(3) NOT NULL, edlevel CHAR(1) CHECK IN ('C','H','N')), CONSTRAINT emp_pk PRIMARY KEY (empno), CONSTRAINT emp_workdept_fk FOREIGN KEY department (deptno) REFERENCES (workdept) );D、CREATE TABLE emp ( empno SMALLINT NOT NULL GENERATED BY DEFAULT AS IDENTITY, firstname VARCHAR(30) NOT NULL, lastname VARCHAR(30) NOT NULL, workdept CHAR(3), edlevel CHAR(1), CONSTRAINT emp_pk PRIMARY KEY (empno), CONSTRAINT emp_workdept_fk FOREIGN KEY (workdept) REFERENCES department (deptno), CONSTRAINT edlevel_ck CHECK (edlevel IN ('C','H','N')) );

ou have a Windows Server 2008 computer that has an IP address of 172.16.45.9/21. The server is configured to use IPv6 addressing.You need to test IPv6 communication to a server that has an IP address of 172.16.40.18/21. What should you do from a command prompt?()A、Type ping 172.16.45.9:::::.B、Type ping ::9.45.16.172.C、Type ping followed by the Link-local address of the server.D、Type ping followed by the Site-local address of the server.

Your company has a server that runs Windows Server 2008. The server has the Web Server (IIS) role installed.  You need to activate SSL for the default Web site.  Which two actions should you perform?()A、Obtain and import a server certificate by using the IIS Manager console.B、Select the Generate Key option in the Machine Key dialog box for the default Web site.C、Add bindings for the HTTPS protocol to the default Web site by using the IIS Manager console.D、Install the Digest Authentication component for the Web server role by using the Server Manager console.

You are an enterprise administrator for Cer-tech .com. The company runs Windows Server 2008 on all theservers on the network. One of the servers, Server01 has the Web Server (IIS) role installed on it. Which of the following options would you choose to activate SSL for the default Web site on the server? ()A、Select the Generate Key option in the Machine Key dialog box for the default Web Site.B、Create an HTTPS binding on the default Web site.C、Install the Digest Authentication component for the Web server.D、Obtain an appropriate server certificate.

单选题You are trying to initiate an SSH connection to a remote router and are getting rejected with an error code of 0. Which of these might be the cause of the error?()AThe routers are using different SSH versions.BYou are trying to log in using invalid credentials.CThe RSA key pair is not properly configured on the SSH client.DThe RSA key pair is not properly configured on the SSH server.

单选题The RSA algorithm is an example of what type of cryptography?RSA算法是下面哪种算法的典型例子?()APrivate Key.私钥BSymmetric Key对称密钥CSecret Key秘密密钥DAsymmetric Key.非对称密钥

单选题What is the minimum key size to enable SSH v2?()A512 bitsB768 bitsC1024 bitsD2048 bits

单选题With Xorg 7.0, what is the name of the default font server?()A xfservB xfsC fontsD xfsttE fserv

单选题What command would you use to set a persistent setting in RMAN so that backups are all written to a tape device?()ACONFIGURE DEFAULT DEVICE TYPE TO TAPE MEDIA BCONFIGURE DEFAULT DEVICE TYPE TO TAPE CCONFIGURE DEFAULT DEVICE TYPE TO SBT DCONFIGURE DEFAULT DEVICE TYPE TO SBT_TAPE

单选题You administer a SQL Server 2008 Reporting Services (SSRS) instance. You plan to design an authentication method for SSRS reports that use SQL Server data connections. You need to ensure that all SSRS reports communicate to the SQL Server instance by using the Kerberos authentication protocol. What should you do?()AConfigure the default Web site on the instance to use the Integrated Security type.BConfigure the application pool used by the default Web site to use a domain account. CConfigure the default Web site on the instance to use the Secure Sockets Layer (SSL) protocol.DRegister a service principal name (SPN) in the Active Directory directory service for the SSRSinstance.

多选题Whattwo things must you do onthe router before generating an SSH key with the "crypto key generate rsa"IOS command? ()AConfigure the SSH version that the router will useBConfigure the host name of the routerCEnable AAA AuthenticationDConfigure the default IP domain name that the router will useEEnable SSH transport support onthe vty lines

单选题You are a network technician at Certpaper.com. Which description is correct when you have generated RSA keys on your Cisco router to prepare for secure device management?()AYou must then specify the general-purpose key size used for authentication with the crypto key generaters a general-keys modulus command.BYou must then zeroize the keys to reset secure shell before configuring other parameters.CAll vty ports are automatically enabled for SSH to provide secure management.DThe SSH protocol is automatically enabled.

多选题You work as the IT professional in an international company which is named Wiikigo. You are experiencedin implementing and administering a network operating system. You are specialized in deploying servers,configuring Windows Server 2008 Terminal services and network application services, and configuring aweb services infrastructure. There is a server that runs Windows Server 2008 in your company. The serverhas the Web Server (IIS) server role installed. Now you receive an order from the company management.You are asked to activate SSL for the default Web site. What should you do?()AUse the IIS Manager console to add bindings for the HTTPS protocol to the default Web site.BYou should use the IIS Manager console to obtain and import a server certificate.CUse the Server Manager console to perform the installation of the Digest Authentication component forthe Web server role.DYou should choose the Generate Key option in the Machine Key dialog box for the default Web site.

单选题Your network environment includes two Windows Server 2008 R2 Hyper-V servers and one VMware ESX 3.5 host server. You are designing a Microsoft System Center Virtual Machine Manager (SCVMM) 2008 R2 implementation to manage your network environment. SCVMM must be able to perform management tasks that require file transfer operations between your VMware server and your Windows servers. You need to configure the ESX host server to ensure that file transfer operations are encrypted, and follow security best practices. What should you do?()AUse the default root credentials as the virtual machine delegate, and enable SSH root loginBCreate a new virtual machine delegate account, add the account as a member of the VMware Administrators role, and enable SSH root loginCCreate a new virtual machine delegate account, add the account as a member of the VMware Administrators role, and disable SSH root loginDUse the default root credentials as the virtual machine delegate, and disable SSH root login

单选题If the default VDC is configured to limit resources to a specific module type, what happens when a module that does not match the resource type is installed?()A The module is powered up, and interfaces are in an admin down state.B The module is denied power, and a syslog message is generated.C The module is powered up, and interfaces are allocated to VDC0.D The module is powered up, and interfaces are allocated to VDC100.