How does using the service password encryption command on a router provide additional security?()A、by encrypting all passwords passing through the routerB、by encrypting passwords in the plain text configuration fileC、by requiring entry of encrypted passwords for access to the deviceD、by configuring an MD5 encrypted key to be used by routing protocols to validate routing exchangesE、by automatically suggesting encrypted passwords for use in configuring the router

How does using the service password encryption command on a router provide additional security?()

  • A、by encrypting all passwords passing through the router
  • B、by encrypting passwords in the plain text configuration file
  • C、by requiring entry of encrypted passwords for access to the device
  • D、by configuring an MD5 encrypted key to be used by routing protocols to validate routing exchanges
  • E、by automatically suggesting encrypted passwords for use in configuring the router

相关考题:

How did Redmon find his job?A By searching openings in a job database.B By posting a matching position in a database.C By using a special service of a database.D By E-mailing his resume to a database.

A metro Ethernet user is connected using a PPP over Ethernet service.How many Layer 2 headers are attached to each IP datagram?() A.1B.2C.3D.4

How does ERS use the VLAN tag?() A. to provide service internetworkingB. to support transparency for Layer 2 framesC. as a connection identifier to indicate destinationD. as a mapping to the DLCI in service internetworkingE. to provide a trunk by which all VLANs can navigate from one site to one or multiple sites

How does ERS use the VLAN tag?()A、to provide service internetworkingB、to support transparency for Layer 2 framesC、as a connection identifier to indicate destinationD、as a mapping to the DLCI in service internetworkingE、to provide a trunk by which all VLANs can navigate from one site to one or multiple sites

When you enter the interface command auto qos voip cisco-phone on a port at the edge of a network,how does the Cisco Catalyst switch detect if a Cisco IP Phone is connected to the port?()A、by snooping the CoS marking on the incoming framesB、by using RTP hello messages between the switch port and the Cisco IP PhoneC、by using CDPD、by using DHCP snoopingE、by snooping the incoming 802.1Q VLAN tag

How does the Ethernet Relay Service use the VLAN tag?()A、 to provide service internetworkingB、 to support transparency for Layer 2 framesC、 as a connection identifier to indicate destinationD、 as a mapping to the DLCI in service internetworkingE、 to provide a trunk by which all VLANs can navigate from one site to one or multiple sites

How does the Cisco Small Service Business Pro Service differ from the Cisco Small Business Pro warranty?()A、 access to Cisco Small Business Support CommunityB、 device-level warrantyC、 Cisco Small Business Pro Products onlyD、 speed of hardware replacement

How does the Cisco Small Business Pro Service differ from the Cisco Small Business Pro warranty?()  A、 device-level warrantyB、 Cisco Small Business Pro products onlyC、 speed of hardware replacementD、 access to Cisco Small Business Support Community

Refer to the exhibit. What does the option secret 5 in the username global configuration mode commandindicate about the enable secret password?()A、It is hashed using SHAB、It is encrypted using DH group 5C、It is hashed using MD5D、It is encrypted via the service password-encryption commandE、It is hashed using a proprietary Cisco hashing algorithmF、It is encrypted using a proprietary Cisco encryption algorithm

The Service Agent User Interface option is being selected for Electronic Service Agent on the HMC. What would be typed in to authenticate and gain access to the application?()A、abc123B、hscrootC、passw0rdD、password

A metro Ethernet user is connected using a PPP over Ethernet service.How many Layer 2 headers are attached to each IP datagram?()A、1B、2C、3D、4

You used the following command in Recovery Manager (RMAN) as part of the recovery process: RESTORE CONTROLFILE FROM AUTOBACKUP;   How does RMAN find the control file autobackup?()A、 By using the trace file.B、 By using the alert log file.C、 By using the database IDD、 By using the server parameter file.E、 By using the V$CONTROLFILE view.F、 By using the autobackup format configuration setting.

You used the following command in Recovery Manager (RMAN) as part of the recovery process: RESTORE CONTROLFILE FROM AUTOBACKUP;  How does RMAN find the control file autobackup?()A、by using the trace fileB、by using the alert log fileC、by using the database IDD、by using the server parameter fileE、by using the V$CONTROLFILE viewF、by using the autobackup format configuration setting

You need to recommend a strategy for using managed service accounts on the Web servers.How many managed service accounts should you recommend?()A、1B、2C、3D、5

单选题For how long does the contract include free on-site service?AOne year.BTwo years.CThree years.

单选题How does the Cisco Small Service Business Pro Service differ from the Cisco Small Business Pro warranty?()A access to Cisco Small Business Support CommunityB device-level warrantyC Cisco Small Business Pro Products onlyD speed of hardware replacement

多选题You used the following command in Recovery Manager (RMAN) as part of the recovery process: RESTORE CONTROLFILE FROM AUTOBACKUP;   How does RMAN find the control file autobackup?()ABy using the trace file.BBy using the alert log file.CBy using the database IDDBy using the server parameter file.EBy using the V$CONTROLFILE view.FBy using the autobackup format configuration setting.

多选题You used the following command in Recovery Manager (RMAN) as part of the recovery process: RESTORE CONTROLFILE FROM AUTOBACKUP;  How does RMAN find the control file autobackup?()Aby using the trace fileBby using the alert log fileCby using the database IDDby using the server parameter fileEby using the V$CONTROLFILE viewFby using the autobackup format configuration setting

单选题How does using the service password encryption command on a router provide additional security?()Aby encrypting all passwords passing through the routerBby encrypting passwords in the plain text configuration fileCby requiring entry of encrypted passwords for access to the deviceDby configuring an MD5 encrypted key to be used by routing protocols to validate routing exchangesEby automatically suggesting encrypted passwords for use in configuring the router

单选题Refer to the exhibit. What does the option secret 5 in the username global configuration mode commandindicate about the enable secret password?()AIt is hashed using SHABIt is encrypted using DH group 5CIt is hashed using MD5DIt is encrypted via the service password-encryption commandEIt is hashed using a proprietary Cisco hashing algorithmFIt is encrypted using a proprietary Cisco encryption algorithm

单选题In a Bridged 1483 service offering, how does an end user’s workstation dynamically obtain an IP address? ()ARADIUS serverBexternal DHCP serverCaddress pool on the DSL modemDaddress pool on the provider router

单选题How does the Ethernet Relay Service use the VLAN tag?()A to provide service internetworkingB to support transparency for Layer 2 framesC as a connection identifier to indicate destinationD as a mapping to the DLCI in service internetworkingE to provide a trunk by which all VLANs can navigate from one site to one or multiple sites

单选题A metro Ethernet user is connected using a PPP over Ethernet service.How many Layer 2 headers are attached to each IP datagram?()A1B2C3D4

单选题You need to recommend a strategy for using managed service accounts on the Web servers.How many managed service accounts should you recommend?()A1B2C3D5

单选题How does ERS use the VLAN tag?()Ato provide service internetworkingBto support transparency for Layer 2 framesCas a connection identifier to indicate destinationDas a mapping to the DLCI in service internetworkingEto provide a trunk by which all VLANs can navigate from one site to one or multiple sites

单选题How many building places does the Building Service look at each month to see if things are going on well?A700.B900.CWe don’t know,

单选题Companycom purchased a new p5 570 without a HMC. The customer does not know how to power the full frame/system off since there does not appear to be an on/off button. What can be done to accomplish this task?()ATelnet into the machine and do a shutdown -FrBLog into ASMI as Administrator and use ASMI menusCLog into the service processor using WebSM and use ASMI menusDUse the off button which is located to the left below the LEDs