单选题You are a network technician at Certpaper.com. Which description is correct when you have generated RSA keys on your Cisco router to prepare for secure device management?()AYou must then specify the general-purpose key size used for authentication with the crypto key generaters a general-keys modulus command.BYou must then zeroize the keys to reset secure shell before configuring other parameters.CAll vty ports are automatically enabled for SSH to provide secure management.DThe SSH protocol is automatically enabled.

单选题
You are a network technician at Certpaper.com. Which description is correct when you have generated RSA keys on your Cisco router to prepare for secure device management?()
A

You must then specify the general-purpose key size used for authentication with the crypto key generaters a general-keys modulus command.

B

You must then zeroize the keys to reset secure shell before configuring other parameters.

C

All vty ports are automatically enabled for SSH to provide secure management.

D

The SSH protocol is automatically enabled.


参考解析

解析: 暂无解析

相关考题:

A network technician arrives to work and discovers users are having a problem connecting thecompany server. The server operator was working on upgrades the night before.Which of the following documents should the technician use to attempt to discover the problem?()A. Network mapsB. Change managementC. BaselinesD. Cable management

As an experienced technician, you are responsible for Technical Support in your company. One of the trainees is asking you which Cisco VPN Acceleration Module for Cisco 7200 Series routers and the Cisco 7301 provides high-performance encryption/compression and supports the latest encryption standard.Which of the following will answer his question?()A. AESB. Cisco IPSC. Cisco Network AssistantD. Cisco VAM2+

A network technician arrives to work and discovers users are having a problem connecting the company server. The server operator was working on upgrades the night before. Which of the following documents should the technician use to attempt to discover the problem?()A、Network mapsB、Change managementC、BaselinesD、Cable management

TestKing.com has a large corporate network that uses multiple routing protocols.Hosts in a portion of the network that uses EIGRP have become unreachable.Which router command will allow you, the network technician, to view the status of these routes?()A、TestKing# show eigrp entriesB、TestKing# show protocolsC、TestKing# debug eigrp routesD、TestKing# show ip route eigrpE、TestKing# show route eigrp

You are a network technician at Certpaper.com. Which description is correct when you have generated RSA keys on your Cisco router to prepare for secure device management?()A、You must then specify the general-purpose key size used for authentication with the crypto key generaters a general-keys modulus command.B、You must then zeroize the keys to reset secure shell before configuring other parameters.C、All vty ports are automatically enabled for SSH to provide secure management.D、The SSH protocol is automatically enabled.

The network technician is troubleshooting a network issue by implementing a new security device.After installing and configuring the device, which of the following steps should the technician takeNEXT?()A、Verity full system functionalityB、Identify the main problem and question the userC、Document their findings, actions, and outcomesD、Escalate the issue to upper management

A company’s wireless network is called FOO and it is not publicly visible. In a wirelessconfiguration wizard, in which of the following locations should the technician put FOO?()A、SSIDB、WPA PassphraseC、WEP KeyD、Network Path

The network technician is planning to use the 255.255.255.224 subent mask on the network.which three valid IP addresses can the technician use for the hosts?()A、172.22.243.127B、172.22.243.191C、172.22.243.190D、10.16.33.98E、10.17.64.34F、192.168.1.160

You are the network administrator for passguide.com. Which device will you install in your computer to make wireless connections you and a network?()A、RepeaterB、Wireless routerC、HubD、Wireless network adapter

Which IOS user EXEC command will allow a network technician to determine which router in the path to an unreachable network host should be examined more closely for the cause of the network failure?()A、TestKingB telnetB、TestKingB pingC、TestKingB traceD、TestKingB show ip routeE、TestKingB show interfaceF、TestKingB show cdp neighbors

As an experienced technician, you are responsible for Technical Support in your company. One of the trainees is asking you how to create separate networks on one Storage Area Network so as to provide enhanced availability, security, etc. Which of the following solution will enable that?()A、Cisco Direct Attached StorageB、Cisco Virtual Attached Storage NetworkC、Cisco Virtual Storage Area NetworkD、Cisco Direct Storage Area Network

As an experienced technician, you are responsible for Technical Support in your company. You ask one of the trainees to document the layers of an existing CIS network. Which three statements best characterize this process? ()(Choose three.)A、It provides reliable input for verifying network consistency.B、It requires a network audit to support some upgrade decisions.C、It requires a network audit to support any network restructuring.D、It begins with gathering organizational input that may be inaccurate.

Which of the following devices would allow a technician using a packet sniffer to view all the dataon a network?()A、GBICB、HubC、BridgeD、Modem

A technician needs to assign a default subnet mask for a class B network to a network device that was just installed. Which of the following would the technician use?()A、224.0.0.1B、255.0.0.0C、255.255.0.0D、255.255.255.0

Which of the following devices will allow a technician to measure the amount of data that is capable of traversing the network?()A、Event logsB、Throughput testerC、Packet sniffersD、OTDR

A technician needs to find an end of a network cable drop. Which of the following tools would the technician use?()A、Cable testerB、MultimeterC、Toner probeD、Loopback plug

Which of the following utilities would a technician use to determine network utilization? ()A、Start MenuB、My Network PlacesC、Administrative ToolsD、Task Manager

A technician is installing a basic router for a SOHO network. After installing the router the PCs connected to it are not able to acquire an IP address. Which of the following did the technician fail to configure correctly?()A、DHCPB、DNSC、WINSD、NAT

The technician needs to map a network share to the user’s Windows 7 computer from thecommand prompt. Which of the following commands will the technician execute?()A、NET SENDB、NET CONFIGC、NET USED、NET NAME

单选题Which IOS user EXEC command will allow a network technician to determine which router in the path to an unreachable network host should be examined more closely for the cause of the network failure?()ATestKingB telnetBTestKingB pingCTestKingB traceDTestKingB show ip routeETestKingB show interfaceFTestKingB show cdp neighbors

单选题As an experienced technician, you are responsible for Technical Support in your company. One of the trainees is asking you which Cisco VPN Acceleration Module for Cisco 7200 Series routers and the Cisco 7301 provides high-performance encryption/compression and supports the latest encryption standard. Which of the following will answer his question?()AAESBCisco IPSCCisco Network AssistantDCisco VAM2+

多选题The network technician is planning to use the 255.255.255.224 subent mask on the network.which three valid IP addresses can the technician use for the hosts?()A172.22.243.127B172.22.243.191C172.22.243.190D10.16.33.98E10.17.64.34F192.168.1.160

单选题TestKing.com has a large corporate network that uses multiple routing protocols.Hosts in a portion of the network that uses EIGRP have become unreachable.Which router command will allow you, the network technician, to view the status of these routes?()ATestKing# show eigrp entriesBTestKing# show protocolsCTestKing# debug eigrp routesDTestKing# show ip route eigrpETestKing# show route eigrp

单选题You are a network technician at Certpaper.com. Which description is correct when you have generated RSA keys on your Cisco router to prepare for secure device management?()AYou must then specify the general-purpose key size used for authentication with the crypto key generaters a general-keys modulus command.BYou must then zeroize the keys to reset secure shell before configuring other parameters.CAll vty ports are automatically enabled for SSH to provide secure management.DThe SSH protocol is automatically enabled.

单选题A technician needs to assign a default subnet mask for a class B network to a network device that was just installed. Which of the following would the technician use?()A224.0.0.1B255.0.0.0C255.255.0.0D255.255.255.0

多选题As an experienced technician, you are responsible for Technical Support in your company. You ask one of the trainees to document the layers of an existing CIS network. Which three statements best characterize this process? ()(Choose three.)AIt provides reliable input for verifying network consistency.BIt requires a network audit to support some upgrade decisions.CIt requires a network audit to support any network restructuring.DIt begins with gathering organizational input that may be inaccurate.

多选题The network technician is planning to use the 255.255.255.224 subent mask on the network.which threevalid IP addresses can the technician use for the hosts?()A172.22.243.127B172.22.243.191C172.22.243.190D10.16.33.98E10.17.64.34F192.168.1.160