Which two statements about using the CHAP authentication mechanism in a PPP link are true?()A、CHAP uses a two-way handshakeB、CHAP authentication periodically occurs after link establishmentC、CHAP has no protection from playback attacksD、CHAP authentication is performed only upon link establishmentE、CHAP uses a three-way handshakeF、CHAP authentication passwords are sent in plaintext
Which two statements about using the CHAP authentication mechanism in a PPP link are true?()
- A、CHAP uses a two-way handshake
- B、CHAP authentication periodically occurs after link establishment
- C、CHAP has no protection from playback attacks
- D、CHAP authentication is performed only upon link establishment
- E、CHAP uses a three-way handshake
- F、CHAP authentication passwords are sent in plaintext
相关考题:
The user SYS creates a job by using the following command:Which two statements are true about the job that was created by the preceding command?() A. The job is enabled by default after creationB. The job is automatically dropped after the end dateC. The job executes with the privileges of the user SYSD.
Which two statements are true about a job chain?() A. A job chain can contain a nested chain of jobs.B. The jobs in a job chain cannot have more than one dependency.C. A job of the CHAIN type can be run using event-based or time-based schedules.D. The jobs in a job chain can be executed only by using the events generated by the Scheduler
Which two statements are true about precedence values in policy?() (Choose two.) A. 1 is the default precedence.B. A lower number is preferred.C. A higher number is preferred.D. 100 is the default precedence.
Which two statements about Network Attached Storage are correct?() A. Data is accessed using NFS or CIFS.B. Data is accessed at the block level.C. NAS is referred to as captive storage.D. Storage devices can be shared between users.E. A NAS implementation is not as fast as a DAS implementation.
Which two statements about using the CHAP authentication mechanism in a PPP link are true?() A.CHAP uses a two-way handshakeB.CHAP authentication periodically occurs after link establishmentC.CHAP has no protection from playback attacksD.CHAP authentication is performed only upon link establishmentE.CHAP uses a three-way handshakeF.CHAP authentication passwords are sent in plaintext
Which two statements about spanning tree path cost are true?()A、The path cost can be changed for an interface using the spanning-tree cost commandB、The path cost can be changed for an interface using the stp path-cost commandC、The SPT default path cost depends on the interface speedD、The STP default path cost is similar for all interface
Which two statements are true about L2TP tunnels?() (Choose two.)A、Traffic is clear textB、Traffic is encryptedC、They are initiated by the LNSD、They are initiated by the LAC
Which two of the following statements are true about HSRP load sharing?() (Choose two)A、It is achieved by using more than one HSRP group.B、It is done in regards to either round robin or weight basis.C、It is used to offload the active router in a certain HSRP group.D、Single group HSRP is used to achieve more efficient link utilization.E、The return traffic is influenced by HSRP load sharing configuration.
Which two statements about zoning are correct? ()A、Zoning increases security.B、DNS queries are used for software zoning.C、Software zoning is more secure than hardware zoning.D、When using zones and VSANs together, the zone is created first.E、Zoning requires that VSANs be established before it becomes operational.
Which two statements about Network Attached Storage are correct?()A、Data is accessed using NFS or CIFS.B、Data is accessed at the block level.C、NAS is referred to as captive storage.D、Storage devices can be shared between users.E、A NAS implementation is not as fast as a DAS implementation.
Which two statements are true about using the isUserInRole method to implement security in a Java EEapplication?()A、It can be invoked only from the doGet or doPost methods.B、It can be used independently of the getRemoteUser method.C、Can return "true" even when its argument is NOT defined as a valid role name in the deployment descriptor.D、Using the isUserInRole method overrides any declarative authentication related to the method in which it is invoked.
Which two statements are true about precedence values in policy?() (Choose two.)A、1 is the default precedence.B、A lower number is preferred.C、A higher number is preferred.D、100 is the default precedence.
Consider the events_% tables in performance Schema. Which two methods will clear or reset the collected events in the tables?()A、Using DELETE statements, for example, DELETE FROM performance_schema.events_watis_currentB、Using the statement RESET PERFORMANCE CACHEC、Using the statement FLUSH PERFORMANCE CACHED、Using TRUNCATE statements, for example, TRUNATE TABLE performance_schema.events_waits_currentE、Disabling and re-enabling all instrumentsF、Restarting Mysql
Which two statements are true about a job chain? ()(Choose two.)A、A job chain can contain a nested chain of jobs.B、The jobs in a job chain cannot have more than one dependency.C、A job of the CHAIN type can be run using event-based or time-based schedules.D、The jobs in a job chain can be executed only by using the events generated by the Scheduler
Which two statements are true about a job chain?()A、 A job chain can contain a nested chain of jobsB、 The jobs in a job chain cannot have more than one dependencyC、 A job of the CHAIN type can be run using event-based or time-based schedulesD、 The jobs in a job chain can be executed only by using the events generated by the Scheduler
Which two statements are true regarding the USING and ON clauses in table joins?()A、Both USING and ON clauses can be used for equijoins and nonequijoins B、Amaximum of one pair of columns can be joined between two tables using the ON clause C、The ON clause can be used to join tables on columns that have different names but compatible data types D、The WHERE clause can be used to apply additional conditions in SELECT statements containing the ON or the USING clause
Which two statements about Flashback Query are true?()A、It is generated by using the redo log files. B、It helps in row-level recovery from user errors.C、It can be performed to recover ALTER TABLE statements D、It fails when undo data pertaining to the transaction is overwritten.E、The database has to be opened with the resetlogs option after performing Flashback Query.
多选题Which two statements about using the CHAP authentication mechanism in a PPP link are true?()ACHAP uses a two-way handshakeBCHAP authentication periodically occurs after link establishmentCCHAP has no protection from playback attacksDCHAP authentication is performed only upon link establishmentECHAP uses a three-way handshakeFCHAP authentication passwords are sent in plaintext
多选题Which two statements are true about L2TP tunnels?() (Choose two.)ATraffic is clear textBTraffic is encryptedCThey are initiated by the LNSDThey are initiated by the LAC
多选题Which two statements are true regarding the USING and ON clauses in table joins?()ABoth USING and ON clauses can be used for equijoins and nonequijoinsBAmaximum of one pair of columns can be joined between two tables using the ON clauseCThe ON clause can be used to join tables on columns that have different names but compatible data typesDThe WHERE clause can be used to apply additional conditions in SELECT statements containing the ON or the USING clause
多选题Which two statements about route redistribution when implementing OSPF are true?()ARoutes learned using any IP routing protocol can only be redistributed into non IP routing protocols.BOSPF can import routes learned using EIGRP, RIP, and IS - IS.COSPF routes cannot be exported into EIGRP, RIP, an d IS - IS.DAt the interdomain level, OSPF cannot import routes learned using BGP.EOSPF routes can be exported into BGP.
单选题Which of the following statements about Vandergrift's research is TRUE?AThe participants were postgraduates learning French as a second language.BAll the participants were taught using the conventional method, with the focus on listening strategies.CThe two groups were taught by different teachers.DThe participants were at the same initial skill level.
多选题Which two statements about spanning tree path cost are true?()AThe path cost can be changed for an interface using the spanning-tree cost commandBThe path cost can be changed for an interface using the stp path-cost commandCThe SPT default path cost depends on the interface speedDThe STP default path cost is similar for all interface
多选题Which two statements are true about a job chain? ()(Choose two.)AA job chain can contain a nested chain of jobs.BThe jobs in a job chain cannot have more than one dependency.CA job of the CHAIN type can be run using event-based or time-based schedules.DThe jobs in a job chain can be executed only by using the events generated by the Scheduler
多选题Which two statements are true about a job chain?()AA job chain can contain a nested chain of jobs.BThe jobs in a job chain cannot have more than one dependency.CA job of the CHAIN type can be run using event-based or time-based schedules.DThe jobs in a job chain can be executed only by using the events generated by the Scheduler
多选题Which two statements are true about a job chain?()AA job chain can contain a nested chain of jobsBThe jobs in a job chain cannot have more than one dependencyCA job of the CHAIN type can be run using event-based or time-based schedulesDThe jobs in a job chain can be executed only by using the events generated by the Scheduler
多选题Which two statements are true about using the isUserInRole method to implement security in a Java EEapplication?()AIt can be invoked only from the doGet or doPost methods.BIt can be used independently of the getRemoteUser method.CCan return true even when its argument is NOT defined as a valid role name in the deployment descriptor.DUsing the isUserInRole method overrides any declarative authentication related to the method in which it is invoked.