A.aaa new-model command
B.secret password for the root user
C.usernames and passwords
D.multiple privilege levels
您可能感興趣的試卷
你可能感興趣的試題
A.Performing end-user training on the use of antispyware software
B.Performing virus scans
C.Scanning a network for active IP addresses and open ports on those IP addresses
D.Using password-cracking utilities
A.Top-secret
B.Confidential
C.SBU
D.Secret
A.Host-based IPS can work in promiscuous mode or inline mode.
B.Network-based IPS can provide protection to desktops and servers without the need of installing specialized software on the end hosts and servers.
C.Network-based IPS is better suited for inspection of SSL and TLS encrypted data flows.
D.Host-based IPS deployment requires less planning than network-based IPS.
A.HMAC
B.RSA
C.MD5
D.SHA-1
A.MD65
B.SHA-135
C.XR12
D.MD5
最新試題
Regarding constructing a good encryption algorithm, what does creating an avalanche effect indicate?()
Which statement is true about a Smurf attack?()
What are two characteristics of the SDM Security Audit wizard?()
How do you define the authentication method that will be used with AAA?()
In an IEEE 802.1x deployment,between which two devices EAPOL messages typically are sent?()
Which information is stored in the stateful session flow table while using a stateful firewall?()
Refer to the exhibit. Based on the VPN connection shown, which statement is true?()
Refer to the exhibit. Which statement is correct based on the show login command output shown?()
During role-based CLI configuration, what must be enabled before any user views can be created?()
When configuring SSH, which is the Cisco minimum recommended modulus value?()