Which IS-IS authentication method is supported on the ERX Edge Router?()A、simple passwordB、HMAC message digest 5C、Password Authentication ProtocolD、Challenge Handshake Authentication Protocol
Which IS-IS authentication method is supported on the ERX Edge Router?()
- A、simple password
- B、HMAC message digest 5
- C、Password Authentication Protocol
- D、Challenge Handshake Authentication Protocol
相关考题:
Which BGPv4 authentication type is supported in JUNOS software?() A. MD4B. MD5C. RSAD. simple password
Which user authentication method is supported by the Junos OS as a last resort alternative?() A. TACACS+B. RADIUSC. local user databaseD. enable password
Which IS-IS authentication method is supported on the ERX Edge Router?() A. simple passwordB. HMAC message digest 5C. Password Authentication ProtocolD. Challenge Handshake Authentication Protocol
What are the three OSPF authentication methods supported on the ERX Edge Router?() A.AB.BC.CD.DE.E
Which three authentication options does IS-IS support?() A. MD5B. DESC. KerberosD. unauthenticatedE. simple password
Which two authentication protocols can be configured for RIP on an ERX Edge Router? () A.AB.BC.CD.D
In a PPP over ATM environment,which two PPP authentication methods are supported by the ERX Edge Router?() A.IKEB.PAPC.CHAPD.MSCHAP
Which of the following statements about authentication responses and conditions is true? ()(Choose two.) A. When a router receives a failure response, it stops querying authentication methods.B. When a router receives an error response, it stops querying authentication methods.C. If the router receives a failure response from an authentication method, it queries the next method.D. The router does not differentiate between failure and error responses; the authentication process is always interrupted.E. If it receives no response from the authentication method, a router will determine the error condition on its own; the router also has the option to proceed to the next method in a list if configured accordingly.
Which information is contained in a AAA authentication method list?()A、A pointer to the address where a RADIUS server can be locatedB、A sequential list of user authentication methodsC、A description of what a user can execute on a routerD、The setup for the authentication phase on a router
Which of the following statements about authentication responses and conditions is true? ()(Choosetwo.)A、When a router receives a failure response, it stops querying authentication methods.B、When a router receives an error response, it stops querying authentication methods.C、If the router receives a failure response from an authentication method, it queries the next method.D、The router does not differentiate between failure and error responses; the authentication process is always interrupted.E、If it receives no response from the authentication method, a router will determine the error condition On its own; the router also has the option to proceed to the next method in a list if configured accordingly.
What are the three OSPF authentication methods supported on the ERX Edge Router?()A、 null passwordB、 simple passwordC、 message digest 5D、 Password Authentication ProtocolE、 Challenge Handshake Authentication Protocol
IPSec中定义密钥交换的协议是()。A、IKE(internet key exhcnage)B、PAP(password authentication protocol)C、CHAP(challenge handshake authentication protocol)D、ESP(encapsulation seurity payload)
SNMPv3 authorizes management operations only by configured users and encrypts SNMP messages. Which authentication protocols does Cisco NX-OS Software use for SNMPv3?()A、 NMAC-SHA-96 authentication protocolB、 HMAC-MD5-96 authentication protocolC、 Community String Match protocolD、 NMAC-MD5-96 authentication protocolE、 HMAC-SHA-96 authentication protocol
In computer security, AAA stands for authentication, authorization and accounting. Which optionabout the AAA authentication enable default group radius enable command is correct?()A、If the radius server returns an error, the enable password will be usedB、If the radius server returns a ’failed’ message, the enable password will be usedC、The command login authentication group will associate the AM authentication to a specifiedinterfaceD、If the group database is unavailable, the radius server will be used
Which description of BGP authentication is true?()A、MD5 has been used by BGP to encrypt BGP update packets.B、BGP uses a message-digest algorithm to authenticate BGP peersC、A plain-text password authentication is an option of BGP authenticationD、EBGP peers authentication is faster than IBGP peers authenticationE、BGP uses public key and private key to authenticate BGP peers.
Which BGPv4 authentication type is supported in JUNOS software?()A、MD4B、MD5C、RSAD、simple password
Which three authentication options does IS-IS support?()A、MD5B、DESC、KerberosD、unauthenticatedE、simple password
Which user authentication method is supported by the Junos OS as a last resort alternative?()A、TACACS+B、RADIUSC、local user databaseD、enable password
In a PPP over ATM environment,which two PPP authentication methods are supported by the ERX Edge Router?()A、IKEB、PAPC、CHAPD、MSCHAP
Your network contains one Active Directory domain. You have a member server named Server1 that runs Windows Server 2008. The server has the Routing and Remote Acecss role service installed. You implement Network Access Protection (NAP) for the domain. You need to configure the Point-to-Point (PPP) authentication method on Server1. Which autnetication method should you choose?()A、Challenge Handshake Authentication Protocol (CHAP)B、Extensible Authentication Protocol (EAP)C、Microsoft Challenge Handshake Authentication Protocol version 2 (MS-CHAP v2)D、Password Authentication Protocol (PAP)
Your network contains one Active Directory domain. You have a member server named Server1 that runs Windows Server 2008 R2. The server has the Routing and Remote Access Services role service installed.You implement Network Access Protection (NAP) for the domain.You need to configure the Point-to-Point Protocol (PPP) authentication method on Server1. Which authentication method should you use?()A、Challenge Handshake Authentication Protocol (CHAP)B、Extensible Authentication Protocol (EAP)C、Microsoft Challenge Handshake Authentication Protocol version 2 (MS-CHAP v2)D、Password Authentication Protocol (PAP)
单选题Which IS-IS authentication method is supported on the ERX Edge Router?()Asimple passwordBHMAC message digest 5CPassword Authentication ProtocolDChallenge Handshake Authentication Protocol
多选题Which three authentication options does IS-IS support?()AMD5BDESCKerberosDUnauthenticatedESimple password
多选题What are the three OSPF authentication methods supported on the ERX Edge Router?()Anull passwordBsimple passwordCmessage digest 5DPassword Authentication ProtocolEChallenge Handshake Authentication Protocol
单选题Your network contains one Active Directory domain. You have a member server named Server1 that runs Windows Server 2008. The server has the Routing and Remote Acecss role service installed. You implement Network Access Protection (NAP) for the domain. You need to configure the Point-to-Point (PPP) authentication method on Server1. Which autnetication method should you choose?()AChallenge Handshake Authentication Protocol (CHAP)BExtensible Authentication Protocol (EAP)CMicrosoft Challenge Handshake Authentication Protocol version 2 (MS-CHAP v2)DPassword Authentication Protocol (PAP)
单选题Your network contains one Active Directory domain. You have a member server named Server1 that runs Windows Server 2008 R2. The server has the Routing and Remote Access Services role service installed.You implement Network Access Protection (NAP) for the domain.You need to configure the Point-to-Point Protocol (PPP) authentication method on Server1.Which authentication method should you use?()AChallenge Handshake Authentication Protocol (CHAP)BExtensible Authentication Protocol (EAP)CMicrosoft Challenge Handshake Authentication Protocol version 2 (MS-CHAP v2)DPassword Authentication Protocol (PAP)