When configuring SSH, which is the Cisco minimum recommended modulus value?()A、2048 bitsB、1024 bitsC、256 bitsD、512 bits

When configuring SSH, which is the Cisco minimum recommended modulus value?()

  • A、2048 bits
  • B、1024 bits
  • C、256 bits
  • D、512 bits

相关考题:

When configuring resource access policies in a Junos Pulse Access Control Service device, which entry is permitted when defining the specific resources?() A. HostnameB. fully qualified domain nameC. IP addressD. address book entry

When configuring OSPF on the ERX, what is the default auto-cost reference-bandwidth value?() A.AB.BC.CD.D

When configuring system state conditions with the Cisco SecurityAgent, what is the resulting action when configuring more than one system state condition? ()A、Any matching state condition will result with the state being triggeredB、 Once a state condition ismet, the system ceases searching further conditions and will cause the state condition to triggerC、 All specified state conditions are used as part of the requirements tobe met to for the state to triggerD、 Once the state conditions are met, they become persistent and can only be removed using the Reset feature

You are a network technician at Certpaper.com. Which description is correct when you have generated RSA keys on your Cisco router to prepare for secure device management?()A、You must then specify the general-purpose key size used for authentication with the crypto key generaters a general-keys modulus command.B、You must then zeroize the keys to reset secure shell before configuring other parameters.C、All vty ports are automatically enabled for SSH to provide secure management.D、The SSH protocol is automatically enabled.

When configuring a scheduler map, which two are referenced?()A、Forwarding ClassB、SchedulerC、Rewrite RulesD、Priority

When configuring QoS on a wireless controller, the per-user, real-time bandwidth contract isenforced for which of the following protocols?()A、IPXB、IPC、UDPD、TCP

When a Cisco router is configured for SSH, it acts as an ()?A、SSH clientB、SSH proxyC、SSH serverD、SSH and SSL server

What must be set correctly when configuring a serial interface so that higher-level protocols calculate the best route?()A、bandwidthB、delayC、loadD、reliability

When configuring a DHCP server, which of the following can the administrator define for DHCPusers?()A、 Database serverB、 NTP serverC、 DHCP serverD、 SQL serverE、 DNS serverF、 Domain name

When configuring surround sound systems, speaker delay is used to compensate for speaker().A、distanceB、powerC、sizeD、efficiency

When configuring the messaging system, which of the following are valid parameters for the file transport? ()A、File NameB、Operating SystemC、LocationD、HostE、Mode

You are configuring captive portal on your SRX Series device for guest user access.When would you use the redirect-traffic all command?()A、When you want all unauthenticated traffic to be redirectedB、When you want all clear text traffic to be redirected.C、When you want all authenticated traffic to be redirected.D、When you want all encrypted traffic to be redirected.

单选题When configuring SSH, which is the Cisco minimum recommended modulus value?()A2048 bitsB1024 bitsC256 bitsD512 bits

单选题When a Cisco router is configured for SSH, it acts as an ()?ASSH clientBSSH proxyCSSH serverDSSH and SSL server

多选题When configuring the messaging system, which of the following are parameters of the e-mail transport? ()ALocationBProtocolCModeDWeb AddressEHost

单选题You are a network technician at Certpaper.com. Which description is correct when you have generated RSA keys on your Cisco router to prepare for secure device management?()AYou must then specify the general-purpose key size used for authentication with the crypto key generaters a general-keys modulus command.BYou must then zeroize the keys to reset secure shell before configuring other parameters.CAll vty ports are automatically enabled for SSH to provide secure management.DThe SSH protocol is automatically enabled.

单选题When configuring a serial interface on a router, what is the default encapsulation?()Aatm-dxiBframe-relayChdlcDlapbEppp

单选题When configuring resource access policies in a Junos Pulse Access Control Service device, which entry is permitted when defining the specific resources?()AHostnameBfully qualified domain nameCIP addressDaddress book entry