多选题Which three steps are part of the PPP CHAP 3-way handshake?()AThe caller sends a challenge to the authenticator.BThe authenticator sends a challenge to the caller.CThe caller encrypts the challenge using a secret.DThe caller sends a success message to the authenticator.EThe authenticator encrypts the challenge using a secret.
多选题
Which three steps are part of the PPP CHAP 3-way handshake?()
A
The caller sends a challenge to the authenticator.
B
The authenticator sends a challenge to the caller.
C
The caller encrypts the challenge using a secret.
D
The caller sends a success message to the authenticator.
E
The authenticator encrypts the challenge using a secret.
参考解析
解析:
暂无解析
相关考题:
Which action does a BGP speaker take when it detects that the reset state bit is set in an openmessage?() A. It tears down the BGP session.B. It sends a restart message to the peer.C. It marks all routes from that peer as stale.D. It sends a BGP refresh message to the peer
Which IS-IS authentication method is supported on the ERX Edge Router?() A. simple passwordB. HMAC message digest 5C. Password Authentication ProtocolD. Challenge Handshake Authentication Protocol
If the Call Redirect step sends a caller to a device that does not exist in the CallManager, which branch of the step is executed? ()A、Busy B、Invalid C、Successful D、Unsuccessfu
If a technician is getting frustrated during a support call, which of the following could the technician employ to avoid irritating the customer?()A、End the call quickly, even if a solution has not been found.B、Ask the caller to call back in a while.C、Put the caller on hold briefly and take a deep breath.D、Pass the caller to another support representative.
Which IS-IS authentication method is supported on the ERX Edge Router?()A、simple passwordB、HMAC message digest 5C、Password Authentication ProtocolD、Challenge Handshake Authentication Protocol
What are the three OSPF authentication methods supported on the ERX Edge Router?()A、 null passwordB、 simple passwordC、 message digest 5D、 Password Authentication ProtocolE、 Challenge Handshake Authentication Protocol
IPSec中定义密钥交换的协议是()。A、IKE(internet key exhcnage)B、PAP(password authentication protocol)C、CHAP(challenge handshake authentication protocol)D、ESP(encapsulation seurity payload)
Cisco IOS IPS sends IPS alert messages using which two protocols? ()A、 SDEEB、 LDAPC、 SYSLOGD、 FTPE、 SNMPF、 SMTP
Which statement is true about a Smurf attack?()A、It sends ping requests in segments of an invalid sizeB、It intercepts the third step in a TCP three-way handshake to hijack a sessionC、It sends ping requests to a subnet, requesting that devices on that subnet send ping replies to a targetsystemD、It uses Trojan horse applications to create a distributed collection of "zombie" computers, which can beused to launch a coordinated DDoS attack
Which of the following are not steps in setting up aTLS session? ()A、 Client sends Hello to Server listing all of its supported cipher suitesB、 Server sends Hello to Client listing all of its supported cipher suitesC、 Client calculates and sends encryptedpre_master_secretD、 Client and Server calculate keys from pre_master_secretE、 Server sends Change Cipher Spec to indicate a shift to encrypted mode
Which process occurs first during the Ethernet Discovery Stage process for a PPPoE service offering?()A、The ERX router sends an Active Discovery Off ermessage.B、The ERX router sendsan Active Discovery Initiation message.C、The customer device sends an Active Discovery Offer message.D、The customer device sends an Active Discovery Initiation message.
Which process occurs first during the Ethernet Discovery Stage process for a PPPoE service offering?()A、The ERX router sends an Active Discovery Offer message.B、The ERX router sends an Active Discovery Initiation message.C、The customer device sends an Active Discovery Offer message.D、The customer device sends an Active Discovery Initiation message
Which action does a BGP speaker take when it detects that the reset state bit is set in an openmessage?()A、It tears down the BGP session.B、It sends a restart message to the peer.C、It marks all routes from that peer as stale.D、It sends a BGP refresh message to the peer
Which three steps are part of the PPP CHAP 3-way handshake?()A、The caller sends a challenge to the authenticator.B、The authenticator sends a challenge to the caller.C、The caller encrypts the challenge using a secret.D、The caller sends a success message to the authenticator.E、The authenticator encrypts the challenge using a secret.
Your network contains one Active Directory domain. You have a member server named Server1 that runs Windows Server 2008. The server has the Routing and Remote Acecss role service installed. You implement Network Access Protection (NAP) for the domain. You need to configure the Point-to-Point (PPP) authentication method on Server1. Which autnetication method should you choose?()A、Challenge Handshake Authentication Protocol (CHAP)B、Extensible Authentication Protocol (EAP)C、Microsoft Challenge Handshake Authentication Protocol version 2 (MS-CHAP v2)D、Password Authentication Protocol (PAP)
Your network contains one Active Directory domain. You have a member server named Server1 that runs Windows Server 2008 R2. The server has the Routing and Remote Access Services role service installed.You implement Network Access Protection (NAP) for the domain.You need to configure the Point-to-Point Protocol (PPP) authentication method on Server1. Which authentication method should you use?()A、Challenge Handshake Authentication Protocol (CHAP)B、Extensible Authentication Protocol (EAP)C、Microsoft Challenge Handshake Authentication Protocol version 2 (MS-CHAP v2)D、Password Authentication Protocol (PAP)
多选题Which three steps are part of the PPP CHAP 3-way handshake?()AThe caller sends a challenge to the authenticator.BThe authenticator sends a challenge to the caller.CThe caller encrypts the challenge using a secret.DThe caller sends a success message to the authenticator.EThe authenticator encrypts the challenge using a secret.
多选题Which two statements are correct when you use the reject parameter as the next-hop value for a static route?()AThe packet is dropped and the packet's source is marked with the no-readvertise parameter.BThe system sends the packet back to the source.CThe packet is dropped from the network.DThe system sends an ICMP message back to the source of the packet.
多选题Cisco IOS IPS sends IPS alert messages using which two protocols? ()ASDEEBLDAPCSYSLOGDFTPESNMPFSMTP
单选题Which action does a BGP speaker take when it detects that the reset state bit is set in an openmessage?()AIt tears down the BGP session.BIt sends a restart message to the peer.CIt marks all routes from that peer as stale.DIt sends a BGP refresh message to the peer
单选题Your network contains one Active Directory domain. You have a member server named Server1 that runs Windows Server 2008. The server has the Routing and Remote Acecss role service installed. You implement Network Access Protection (NAP) for the domain. You need to configure the Point-to-Point (PPP) authentication method on Server1. Which autnetication method should you choose?()AChallenge Handshake Authentication Protocol (CHAP)BExtensible Authentication Protocol (EAP)CMicrosoft Challenge Handshake Authentication Protocol version 2 (MS-CHAP v2)DPassword Authentication Protocol (PAP)
单选题Which process occurs first during the Ethernet Discovery Stage process for a PPPoE service offering?()AThe ERX router sends an Active Discovery Off ermessage.BThe ERX router sendsan Active Discovery Initiation message.CThe customer device sends an Active Discovery Offer message.DThe customer device sends an Active Discovery Initiation message.
单选题Which process occurs first during the Ethernet Discovery Stage process for a PPPoE service offering?()AThe ERX router sends an Active Discovery Offer message.BThe ERX router sends an Active Discovery Initiation message.CThe customer device sends an Active Discovery Offer message.DThe customer device sends an Active Discovery Initiation message
单选题Which statement is true about a Smurf attack?()AIt sends ping requests in segments of an invalid sizeBIt intercepts the third step in a TCP three-way handshake to hijack a sessionCIt sends ping requests to a subnet, requesting that devices on that subnet send ping replies to a targetsystemDIt uses Trojan horse applications to create a distributed collection of zombie computers, which can beused to launch a coordinated DDoS attack
单选题Which of the following are not steps in setting up aTLS session? ()A Client sends Hello to Server listing all of its supported cipher suitesB Server sends Hello to Client listing all of its supported cipher suitesC Client calculates and sends encryptedpre_master_secretD Client and Server calculate keys from pre_master_secretE Server sends Change Cipher Spec to indicate a shift to encrypted mode
多选题Which three of these statements about the IP service level agreement (SLA) sender are true? ()ASLA sender target can be an IP hostBSLA sender sends a probe packet and a response probe packetCSLA sender sends a probe packetDSLA sender target must be a routerESLA sender target can be an IP SLA responder