多选题Which three authentication options does IS-IS support?()AMD5BDESCKerberosDunauthenticatedEsimple password

多选题
Which three authentication options does IS-IS support?()
A

MD5

B

DES

C

Kerberos

D

unauthenticated

E

simple password


参考解析

解析: 暂无解析

相关考题:

On which three traffic types does firewall pass-through authentication work? ()(Choose three.) A. pingB. FTPC. TelnetD. HTTPE. HTTPS

Which IS-IS authentication method is supported on the ERX Edge Router?() A. simple passwordB. HMAC message digest 5C. Password Authentication ProtocolD. Challenge Handshake Authentication Protocol

Which three authentication options does OSPF support?() A. DESB. MD5C. KerberosD. unauthenticatedE. simple password

Which three authentication options does IS-IS support?() A. MD5B. DESC. KerberosD. unauthenticatedE. simple password

Which protocols does Cisco NSF support? () A. IS-IS, EIGRP, SSO, BGPB. ISSU, OSPF, IS-ISC. IETF, OSPF, ISSUD. EIGRP, BGP, OSPF, IS-IS

Which two content-filtering features does FTP support?() (Choose two.)A、block extension listB、block MIME typeC、protocol command listD、notifications-options

On which three traffic types does firewall pass-through authentication work? ()(Choose three.)A、pingB、FTPC、TelnetD、HTTPE、HTTPS

Which IS-IS authentication method is supported on the ERX Edge Router?()A、simple passwordB、HMAC message digest 5C、Password Authentication ProtocolD、Challenge Handshake Authentication Protocol

Which protocols does Cisco NSF support? ()A、IS-IS, EIGRP, SSO, BGPB、ISSU, OSPF, IS-ISC、IETF, OSPF, ISSUD、EIGRP, BGP, OSPF, IS-IS

Which authentication protocol does H-REAP AP local authentication support in version 5.2?()A、EAP-TLSB、EAP-PEAPC、EAP-LEAPD、EAP-TTLS

By default, which IS-IS metric types does JUNOS software support?()A、receiving of wide metrics onlyB、sending of narrow metrics onlyC、receiving of narrow metrics onlyD、sending and receiving of narrow and wide metrics

Which three authentication options does OSPF support?()A、DESB、MD5C、KerberosD、UnauthenticatedE、Simple password

Which three authentication options does IS-IS support?()A、MD5B、DESC、KerberosD、unauthenticatedE、simple password

Which two statements regarding external authentication servers for firewall userauthentication are true?()A、Up to three external authentication server types can be used simultaneously.B、Only one external authentication server type can be used simultaneously.C、If the local password database is not configured in the authentication order, and the configured authentication server is unreachable, authentication is not performed.D、If the local password database is not configured in the authentication order, and the configured authentication server rejects the authentication request, authentication is not performed

Which two statements regarding external authentication servers for firewall user authentication are true?() (Choose two.)A、Up to three external authentication server types can be used simultaneously.B、Only one external authentication server type can be used simultaneously.C、If the local password database is not configured in the authentication order, and the configured authentication server bypassed.D、If the local password database is not configured in the authentication order, and the configured authentication server authentication is rejected.

单选题Which authentication protocol does H-REAP AP local authentication support in version 5.2?()AEAP-TLSBEAP-PEAPCEAP-LEAPDEAP-TTLS

多选题On which three traffic types does firewall pass-through authentication work? ()(Choose three.)ApingBFTPCTelnetDHTTPEHTTPS

多选题Which three authentication options does IS-IS support?()AMD5BDESCKerberosDUnauthenticatedESimple password

多选题Which three IS-IS TLVs are used to support MPLS traffic engineering? ()Aextended TLV 22Bextended TLV 23Cextended TLV 134Dextended TLV 135Eextended TLV 136Fextended TLV 138

单选题Which protocols does Cisco NSF support? ()AIS-IS, EIGRP, SSO, BGPBISSU, OSPF, IS-ISCIETF, OSPF, ISSUDEIGRP, BGP, OSPF, IS-IS

多选题Which three options are network evaluation techniques? ()APerforming end-user training on the use of antispyware softwareBPerforming virus scansCScanning a network for active IP addresses and open ports on those IP addressesDUsing password-cracking utilities

多选题Which three types of integration does the Business Event System support?() (Choose three.)Apoint-to-pointBparent/child messagingCmessaging hub systemDdistributed applications messagingEsimple object access protocol (SOAP) messaging

多选题Which three WAN technologies does the Cisco SR 500 Family support?()AADSLBSIP trunkingCFibre ChannelDIPv6EFast EthernetFT1

多选题Which two statements regarding external authentication servers for firewall userauthentication are true?()AUp to three external authentication server types can be used simultaneously.BOnly one external authentication server type can be used simultaneously.CIf the local password database is not configured in the authentication order, and the configured authentication server is unreachable, authentication is not performed.DIf the local password database is not configured in the authentication order, and the configured authentication server rejects the authentication request, authentication is not performed

多选题Which two content-filtering features does FTP support?() (Choose two.)Ablock extension listBblock MIME typeCprotocol command listDnotifications-options

多选题Which two statements regarding external authentication servers for firewall user authentication are true?() (Choose two.)AUp to three external authentication server types can be used simultaneously.BOnly one external authentication server type can be used simultaneously.CIf the local password database is not configured in the authentication order, and the configured authentication server bypassed.DIf the local password database is not configured in the authentication order, and the configured authentication server authentication is rejected.

多选题Which three authentication options does OSPF support?()ADESBMD5CKerberosDUnauthenticatedESimple password

多选题Which three methods of source NAT does the Junos OS support?() (Choose three.)Ainterface-based source NATBsource NAT with address shiftingCsource NAT using static source poolDinterface-based source NAT without PATEsource NAT with address shifting and PAT