单选题Which of the following authentication protocols uses certificates to negotiate access to the network?()APAPBCHAPCEAP-TLSDKerberos

单选题
Which of the following authentication protocols uses certificates to negotiate access to the network?()
A

PAP

B

CHAP

C

EAP-TLS

D

Kerberos


参考解析

解析: 暂无解析

相关考题:

Which two authentication protocols can be configured for RIP on an ERX Edge Router? () A.AB.BC.CD.D

Which of the following uses pair authentication to provide a wireless connection between twodevices?() A. 802.11nB. BluetoothC. InfraredD. Cellular

Which statement about OSPF authentication is true?()A、To enable OSPF authentication in a network, OSPF area 0 authentications must be enabled firstB、The payload of OSPF version 3 packets contains no authentication informationC、OSPF version 3 supports Advanced Encryption StandardD、OSPF version 3 uses router ID as a key to encrypt OSPF hello packetsE、OSPF MD5 authentication uses TCP, and Plan Test authentication uses UDP

Which of the following are TACACS+ characteristics?(Choose all that apply.)()A、Cisco proprietaryB、Standards-based protocolC、Provides separate services for authentication, authorization, and accountingD、Encrypts only the passwordE、Uses UDP for a transport layerF、Encrypts the entire packet

Which two statements about using the CHAP authentication mechanism in a PPP link are true?()A、CHAP uses a two-way handshakeB、CHAP authentication periodically occurs after link establishmentC、CHAP has no protection from playback attacksD、CHAP authentication is performed only upon link establishmentE、CHAP uses a three-way handshakeF、CHAP authentication passwords are sent in plaintext

Which of the following routing protocols is a link state and uses a backbone called area 0?()A、OSPFB、EIGRPC、BGPD、IS-IS

Which of the following protocols is used by thin clients?()A、IPXB、NetBIOSC、RDPD、UDP

Which of the following routing protocols uses AS-Path as one of the methods to build the routing table?()A、OSPFB、IS-ISC、EIGRPD、BGP

Which of the following protocols uses port 119, by default?()A、NNTPB、NTPC、TFTPD、FTP

Which security mechanism uses the concept of a realm?()A、AuthorizationB、Data integrityC、ConfidentialityD、Authentication

多选题Which two statements about using the CHAP authentication mechanism in a PPP link are true?()ACHAP uses a two-way handshakeBCHAP authentication periodically occurs after link establishmentCCHAP has no protection from playback attacksDCHAP authentication is performed only upon link establishmentECHAP uses a three-way handshakeFCHAP authentication passwords are sent in plaintext

单选题Which the security mechanism uses the concept of a realm?()A authorizationB data integrityC confidentialityD authentication

单选题Which of the following routing protocols uses AS-Path as one of the methods to build the routing table?()AOSPFBIS-ISCEIGRPDBGP

多选题Which two primary port authentication protocols are used with VSANs?()ASPAPBCHAPCDHCHAPDESP

多选题You have been asked to develop an application that uses only connection-oriented protocols. Which two protocols can you use?()APPPBUDPCTCPDICMP

单选题Which of the following uses pair authentication to provide a wireless connection between twodevices?()A802.11nBBluetoothCInfraredDCellular

单选题Which of the following protocols uses both TCP and UDP ports?()ASMTPBTelnetCFTPDDNS

单选题Which one of the following protocols uses both UDP and TCP ports for the transport layer operation?()AFTPBTFTPCSMTPDTelnetEDNS

单选题Which statement about OSPF authentication is true?()ATo enable OSPF authentication in a network, OSPF area 0 authentications must be enabled firstBThe payload of OSPF version 3 packets contains no authentication informationCOSPF version 3 supports Advanced Encryption StandardDOSPF version 3 uses router ID as a key to encrypt OSPF hello packetsEOSPF MD5 authentication uses TCP, and Plan Test authentication uses UDP

单选题Which of the following protocols uses port 80?()ASMTPBHTTPCHTTPSDFTP

多选题Which of the following protocols utilize TCP?()ANTPBNNTPCSMTPDSNMPEHTTPSFTFTP