单选题Which command encrypts all plaintext passwords?()ARouter(config)#password-encryptionBRouter(config)#service password-encryptionCRouter#service password-encryptionDRouter# password-encryption
单选题
Which command encrypts all plaintext passwords?()
A
Router(config)#password-encryption
B
Router(config)#service password-encryption
C
Router#service password-encryption
D
Router# password-encryption
参考解析
解析:
暂无解析
相关考题:
You Execute the Following command to create a password file in the database server:$ orapwd file = ‘+DATA/PROD/orapwprod entries = 5 ignorecase = N format = 12’Which two statements are true about the password file?()A. It records the usernames and passwords of users when granted the DBA role.B. It contains the usernames and passwords of users for whom auditing is enabled.C. Is used by Oracle to authenticate users for remote database administration.D. It records the usernames and passwords of all users when they are added to the OSDBA or OSOPER operating system groups.E. It supports the SYSBACKUP, SYSDG, and SYSKM system privileges.
Which command encrypts all plaintext passwords?() A.Router(config)#password-encryptionB.Router(config)#service password-encryptionC.Router#service password-encryptionD.Router# password-encryption
What is the effect of using the service password-encryption command?()A、Only passwords configured after the command has been entered will beencrypted.B、Only the enable password will be encrypted.C、Only the enable secret password will beencryptedD、It will encrypt the secret password and remove the enable secret password from the configuration.E、It will encrypt all current and future passwords.
What is the effect of using the service password-encryption command?()A、only passwords configured after the command has been entered will be encryptedB、Only the enable password will be encryptedC、Only the enable secret password will be encryptedD、It will encrypt the secret password and remove the enable secret password from the configurationE、It will encrypt all current and future passwords.
ou executed the command to create a password file in the database server: $ orapwd file=orapworcl entries=5 ignorecase=N Which statement describes the purpose of the above password file()A、It records usernames and passwords of users when granted the DBA role.B、It contains usernames and passwords of users for whom auditing is enabled.C、It is used by Oracle to authenticate users for remote database administration.D、It records usernames and passwords of all users when they are added to OSDBA or OSOPER operating system groups.
Which of the following are TACACS+ characteristics?(Choose all that apply.)()A、Cisco proprietaryB、Standards-based protocolC、Provides separate services for authentication, authorization, and accountingD、Encrypts only the passwordE、Uses UDP for a transport layerF、Encrypts the entire packet
Which two statements about using the CHAP authentication mechanism in a PPP link are true?()A、CHAP uses a two-way handshakeB、CHAP authentication periodically occurs after link establishmentC、CHAP has no protection from playback attacksD、CHAP authentication is performed only upon link establishmentE、CHAP uses a three-way handshakeF、CHAP authentication passwords are sent in plaintext
Which command encrypts all plaintext passwords?()A、Router(config)#password-encryptionB、Router(config)#service password-encryptionC、Router#service password-encryptionD、Router# password-encryption
How does using the service password encryption command on a router provide additional security?()A、by encrypting all passwords passing through the routerB、by encrypting passwords in the plain text configuration fileC、by requiring entry of encrypted passwords for access to the deviceD、by configuring an MD5 encrypted key to be used by routing protocols to validate routing exchangesE、by automatically suggesting encrypted passwords for use in configuring the router
Which of the following is true about Kerberos?以下哪一个是关于Kerberos的描述是正确的?()A、It encrypts data after a tickt is granted,but passwords are exchanged in plaintext.它在ticket获得授权后对数据进行加密,但是密码的交换是明文方式。B、It depends upon symmetric ciphers.它依赖于对称加密。C、It is a second party authentication system.它是一种第二方的认证系统D、It utilizes public key cryptography.它使用公钥密码学。
Which command shows all the paging spaces available on a system?() A、lsps -aB、showps -aC、psdisplay -lD、swaplist -ALL
You are designing a strategy for migrating the UNIX user accounts to Active Directory. Which three actions should you perform?()A、 Import the user accounts as inetOrgPerson objects.B、 Import the user accounts into Active Directory by using the Ldifde command-line tool.C、 Export all user accounts from the UNIX servers to a text file.D、 Export all user accounts and their passwords from the UNIX servers to a text file. Encrypt this file to achieve extra security.E、 Assign random passwords to each user object, and securely distribute the password to the users.F、 Create the same strong password for each user object, and require users to change their passwords at first logon.G、 Instruct users to use the same name and password as they used on the UNIX servers.
多选题You Execute the Following command to create a password file in the database server: $ orapwd file = ‘+DATA/PROD/orapwprod entries = 5 ignorecase = N format = 12’ Which two statements are true about the password file?()AIt records the usernames and passwords of users when granted the DBA role.BIt contains the usernames and passwords of users for whom auditing is enabled.CIs used by Oracle to authenticate users for remote database administration.DIt records the usernames and passwords of all users when they are added to the OSDBA or OSOPER operating system groups.EIt supports the SYSBACKUP, SYSDG, and SYSKM system privileges.
多选题Which two statements about using the CHAP authentication mechanism in a PPP link are true?()ACHAP uses a two-way handshakeBCHAP authentication periodically occurs after link establishmentCCHAP has no protection from playback attacksDCHAP authentication is performed only upon link establishmentECHAP uses a three-way handshakeFCHAP authentication passwords are sent in plaintext
单选题Which of the following is true about Kerberos?以下哪一个是关于Kerberos的描述是正确的?()AIt encrypts data after a tickt is granted,but passwords are exchanged in plaintext.它在ticket获得授权后对数据进行加密,但是密码的交换是明文方式。BIt depends upon symmetric ciphers.它依赖于对称加密。CIt is a second party authentication system.它是一种第二方的认证系统DIt utilizes public key cryptography.它使用公钥密码学。
多选题You are designing a strategy for migrating the UNIX user accounts to Active Directory. Which three actions should you perform?()AImport the user accounts as inetOrgPerson objects.BImport the user accounts into Active Directory by using the Ldifde command-line tool.CExport all user accounts from the UNIX servers to a text file.DExport all user accounts and their passwords from the UNIX servers to a text file. Encrypt this file to achieve extra security.EAssign random passwords to each user object, and securely distribute the password to the users.FCreate the same strong password for each user object, and require users to change their passwords at first logon.
单选题ou executed the command to create a password file in the database server: $ orapwd file=orapworcl entries=5 ignorecase=N Which statement describes the purpose of the above password file()AIt records usernames and passwords of users when granted the DBA role.BIt contains usernames and passwords of users for whom auditing is enabled.CIt is used by Oracle to authenticate users for remote database administration.DIt records usernames and passwords of all users when they are added to OSDBA or OSOPER operating system groups.
单选题Which command sets and automatically encrypts the privileged enable mode password?()Aenbale password c1scoBsecret enable c1scoCpassword enable c1scoDenable secret c1sco
单选题How does using the service password encryption command on a router provide additional security?()Aby encrypting all passwords passing through the routerBby encrypting passwords in the plain text configuration fileCby requiring entry of encrypted passwords for access to the deviceDby configuring an MD5 encrypted key to be used by routing protocols to validate routing exchangesEby automatically suggesting encrypted passwords for use in configuring the router
单选题What is the effect of using the service password-encryption command?()Aonly passwords configured after the command has been entered will be encryptedBOnly the enable password will be encryptedCOnly the enable secret password will be encryptedDIt will encrypt the secret password and remove the enable secret password from the configurationEIt will encrypt all current and future passwords.
单选题What is the effect of using the service password-encryption command?()Anly passwords configured after the command has been entered will be encrypted.BOnly the enable password will be encrypted.COnly the enable secret password will be encryptedDIt will encrypt the secret password and remove the enable secret password from the configuration.EIt will encrypt all current and future passwords.