What should be enabled before any user views can be created during role-based CLI configuration ?()A、aaa new-model commandB、secret password for the root userC、usernames and passwordsD、multiple privilege levels

What should be enabled before any user views can be created during role-based CLI configuration ?()

  • A、aaa new-model command
  • B、secret password for the root user
  • C、usernames and passwords
  • D、multiple privilege levels

相关考题:

What are three actions performed by the mysql_secure_installation tool?() A.It prompts you to set the root user account passwordB.It checks whether file permissions are appropriate within datadirC.It asks to remove the test database, which is generated at installation timeD.It can delete any anonymous accountsE.It verifies that all users are configuration with the longer password hash

During a password recovery, what is the next step after configuring the system to boot into single- user mode?() A. Reset the root password.B. Press the space bar.C. Type recovery.D. Press the Enter key.

You want to log into the router and make a configuration change.After loggin in as the root user, what is the next command you must enter?() A. enableB. configureC. editD. cli

What is the purpose of pressing the Ctrl+Break keys during the router password recover procedure?() A. To restart the router.B. To bypass the configuration in Flash.C. To view the password before changes are made.D. To bypass setup configuration mode.E. To access ROM Monitor mode.

What is the effect of using the service password-encryption command?()A、Only passwords configured after the command has been entered will beencrypted.B、Only the enable password will be encrypted.C、Only the enable secret password will beencryptedD、It will encrypt the secret password and remove the enable secret password from the configuration.E、It will encrypt all current and future passwords.

The enable secret password appears as an MD5 hash in a router’s configuration file, whereas the enablepassword is not hashed (or encrypted, if the password-encryption service is not enabled). What is thereason that Cisco still support the use of both enable secret and enable passwords in a router’sconfiguration?()A、The enable password is present for backward compatibility.B、Because the enable secret password is a hash, it cannot be decrypted. Therefore, the enable password is used to match the password that was entered, and the enable secret is used to verify that the enablepassword has not been modified since the hash was generated.C、The enable password is considered to be a router’s public key, whereas the enable secret password is considered to be a router’s private key.D、The enable password is used for IKE Phase I, whereas the enable secret password is used for IKE Phase II.

What is the purpose of pressing the Ctrl+Break keys during the router password recover procedure?()A、To restart the router.B、To bypass the configuration in Flash.C、To view the password before changes are made.D、To bypass setup configuration mode.E、To access ROM Monitor mode.

When configuring role-based CLI on a Cisco router,which action will be taken first ?()A、Create a parser view called "root view."B、Log in to the router as the root user.C、Enable the root view on the router.D、Enable role-based CLI globally on the router using the privileged EXEC mode Cisco IOS command.

Which two statements are true when using the configure exclusive CLI command?()A、Multiple users can enter configuration mode and have their own private configuration.B、When a user commits, only the user's changes are committed.C、A message indicates which other users are in configuration mode and what portion of the configuration they are editing.D、Only a single user can edit the configuration.

Which two statements about the Cisco AutoSecure feature are true?()A、All passwords entered during the AutoSecure configuration must be a minimum of 8 characters in length.B、Cisco123 would be a valid password for both the enable password and the enable secret commands.C、The auto secure command can be used to secure the router login as well as the NTP and SSH protocols.D、For an interactive full session of AutoSecure, the auto secure login command should be used.E、If the SSH server was configured, the 1024 bit RSA keys are generated after the auto secure commandis enabled.

As a candidate for CCNA examination, when you are familiar with the basic commands, if you input thecommand "enable secret level 5 password" in the global mode , what does it indicate?()A、Set the enable secret command to privilege level 5B、The enable secret password is hashed using MD5C、The enable secret password is for accessing exec privilege level 5D、The enable secret password is hashed using SHAE、The enable secret password is encrypted using Cisco proprietary level 5 encryption

During role-based CLI configuration, what must be enabled before any user views can be created?()A、multiple privilege levelsB、usernames and passwordsC、aaa new-model commandD、secret password for the root userE、HTTP and/or HTTPS server

non-root user can run rsh commands from serverA to serverB, but attempts to run rsh commands by the root user return with a permission error message. What action will resolve the problem? ()A、Add root user to the /etc/hosts.equiv on serverbB、Create $HOME/.rhosts file for the root user on serverbC、Restart the rshd daemon with root enabled option on serverbD、Add entry to allow root user from serverA to the /etc/hosts.allow on serverb

What should an administrator do to allow the logon of a user to a local system without limitations from the host ‘webserver’?()A、configure the /etc/.rhosts with. webserver userB、configure the root'$HOME/.rhost file with.+webserver userC、configure each user's $HOME/.rhosts file with. webserver userD、configure the root'$HOME/.rhost file with.webserver ip user

During a password recovery, what is the next step after configuring the system to boot into single-user mode?()A、Reset the root password.B、Press the space bar.C、Type recovery.D、Press the "Enter" key.

During a password recovery, what is the next step after configuring the system to boot into single-user mode?()A、Reset the root passwordB、Press the space barC、Type recoveryD、Press the "Enter" key

You want to log into the router and make a configuration change.After loggin in as the root user, what is the next command you must enter?()A、enableB、configureC、editD、cli

Which statement is true regarding this setting?()A、It drops the connection after the specified number of login attempts fail for any user.B、It is enforced only if the password profile is enabled for the user. C、It locks the user account after the specified number of attempts. D、It drops the connection after the specified number of login attempts fail only for users who have the SYSDBA privilege.

What are three actions performed by the mysql_secure_installation tool?()A、It prompts you to set the root user account passwordB、It checks whether file permissions are appropriate within datadirC、It asks to remove the test database, which is generated at installation timeD、It can delete any anonymous accountsE、It verifies that all users are configuration with the longer password hash

单选题What should be enabled before any user views can be created during role-based CLI configuration ?()Aaaa new-model commandBsecret password for the root userCusernames and passwordsDmultiple privilege levels

单选题As a candidate for CCNA examination, when you are familiar with the basic commands, if you input thecommand "enable secret level 5 password" in the global mode , what does it indicate?()ASet the enable secret command to privilege level 5BThe enable secret password is hashed using MD5CThe enable secret password is for accessing exec privilege level 5DThe enable secret password is hashed using SHAEThe enable secret password is encrypted using Cisco proprietary level 5 encryption

单选题During role-based CLI configuration, what must be enabled before any user views can be created?()Amultiple privilege levelsBusernames and passwordsCaaa new-model commandDsecret password for the root userEHTTP and/or HTTPS server

多选题Which two statements about the Cisco AutoSecure feature are true?()AAll passwords entered during the AutoSecure configuration must be a minimum of 8 characters in length.BCisco123 would be a valid password for both the enable password and the enable secret commands.CThe auto secure command can be used to secure the router login as well as the NTP and SSH protocols.DFor an interactive full session of AutoSecure, the auto secure login command should be used.EIf the SSH server was configured, the 1024 bit RSA keys are generated after the auto secure commandis enabled.

多选题Which two statements are true when using the configure exclusive CLI command?()AMultiple users can enter configuration mode and have their own private configuration.BWhen a user commits, only the user's changes are committed.CA message indicates which other users are in configuration mode and what portion of the configuration they are editing.DOnly a single user can edit the configuration.

多选题What are three actions performed by the mysql_secure_installation tool?()AIt prompts you to set the root user account passwordBIt checks whether file permissions are appropriate within datadirCIt asks to remove the test database, which is generated at installation timeDIt can delete any anonymous accountsEIt verifies that all users are configuration with the longer password hash

单选题The enable secret password appears as an MD5 hash in a router’s configuration file, whereas the enablepassword is not hashed (or encrypted, if the password-encryption service is not enabled). What is thereason that Cisco still support the use of both enable secret and enable passwords in a router’sconfiguration?()AThe enable password is present for backward compatibility.BBecause the enable secret password is a hash, it cannot be decrypted. Therefore, the enable password is used to match the password that was entered, and the enable secret is used to verify that the enablepassword has not been modified since the hash was generated.CThe enable password is considered to be a router’s public key, whereas the enable secret password is considered to be a router’s private key.DThe enable password is used for IKE Phase I, whereas the enable secret password is used for IKE Phase II.

单选题What is the purpose of pressing the Ctrl+Break keys during the router password recover procedure?()ATo restart the router.BTo bypass the configuration in Flash.CTo view the password before changes are made.DTo bypass setup configuration mode.ETo access ROM Monitor mode.