A.Signature-based detection B.Anomaly-based detection C.Honey pot detection D.Policy-based detection
单项选择题Whichoneoftheaaaaccountingcommandscanbeusedtoenableloggingofboththestartandstoprecordsforuserterminalsessionsontherouter?()
A.aaa accounting connection start-stop tacacs+ B.aaa accounting exec start-stop tacacs+ C.aaa accounting system start-stop tacacs+ D.aaa accounting network start-stop tacacs+
单项选择题Which statement is correct regarding the aaa configurations based on the exhibit provided?()
A.The authentication method list used by the vty port is named test. B.If the TACACS+ AAA server is not available, no users will be able to establish a Telnet session with the router. C.If the TACACS+ AAA server is not available, console access to the router can be authenticated using the local database. D.The authentication method list used by the console port is named test.
单项选择题Whenconfiguringrole-basedCLIonaCiscorouter,whichactionwillbetakenfirst?()
A.Create a parser view called "root view." B.Log in to the router as the root user. C.Enable the root view on the router. D.Enable role-based CLI globally on the router using the privileged EXEC mode Cisco IOS command.
多项选择题WhichtwoprimaryportauthenticationprotocolsareusedwithVSANs?()
A.SPAP B.CHAP C.DHCHAP D.ESP
多项选择题Whichthreearedistinctionsbetweenasymmetricandsymmetricalgorithms?()
A.Only symmetric algorithms have a key exchange technology built in B.Asymmetric algorithms are used quite often as key exchange protocols for symmetricalgorithms C.Only asymmetric algorithms have a key exchange technology built in D.Asymmetric algorithms are based on more complex mathematical computations