多项选择题X 纠错
A. this login authenticationmethod list is automaticallyapplied to all lines except those that have a named method list explicitly defined
B. If the user fails the TACACS+ authentication then the local database on the router will be used to authenticatethe user
C. if the tacacs+ server fails to respond then the local database on the router will be used to authenticate the user
D. "login" is the name of the method list being configured
E. if the tacacs+ server is unavailable, authentication will succeed automaticallyby default
你可能喜欢
单项选择题
A. Cisco Secure Desktop (CSD)
B. NAC Appliance Agent (NAA)
C. Cisco SecurityAgent (CSA)
D. SSLVPN Client (SVC)
E. Cisco TrustAgent (CTA)
多项选择题
A. ACCESS REQUEST
B. ACCESS ACCEPT
C. CONTINUE
D. CHALLENGE
E. REPLY
F. START
单项选择题
A. the business knowledge of the IT staff
B. the technical knowledge of the IT staff
C. the company’s business objectives
D. the company’s network topology
E. the IT future directions
单项选择题
A. Class-Based Policing
B. Control Plane Policing
C. Dual-Rate Policier
D. Single-Rate Policier
E. Class-BasedTraffic Shaper
单项选择题
A. The client and the NAS.
B. The NAS andthe LNS.
C. The NAS and the LAC.
D. The client and the LNS.
单项选择题
A. PFS group.
B. Encryption algorithm.
C. Hashing Algorithm.
D. Authenticationmethod.
E. Lifetime duration.
单项选择题
A. The sender of the message.
B. The receipient of the message.
C. The sender’s administrator who provides the sender with the PGP program.
D. A third party that belongs to what’s often known as "web of trust", that can verify the relationship between the user and the key.
E. The vendor of the PGP program.
单项选择题
A. tunnel source
B. tunnel destination
C. tunnel key
D. ip address
E. tunnelvrf
多项选择题
A. A DH key exchange is an algorithm that utilizes asymmetric cryptographic keys.
B. The DH key exchange is used to establish a shared secret over an insecure medium during an IPSec phase 1 exchange.
C. The DH exchange is susceptible to man-in-the-middle attacks.
D. The DH exchange is used to authenticate the peer device duringan IPSec phase 1 exchange.
E.A DH exchange provides Perfect Forward Secrecy (PFS).
多项选择题
A. 3DES is muchmore secure than DES.
B. Both DES and 3DES are stream ciphers.
C. DES uses 64 bitkeys, although the effective key lengthis only 56bits.
D. The decryption operation for both DES and 3DES is the same as the encryption operation.
E. DES can only be used for encryption, whereas 3DES can also be used for authentication.