网友您好, 请在下方输入框内输入要搜索的题目:

题目内容 (请给出正确答案)
单选题
What is the minimum key size to enable SSH v2?()
A

512 bits

B

768 bits

C

1024 bits

D

2048 bits


参考答案

参考解析
解析: 暂无解析
更多 “单选题What is the minimum key size to enable SSH v2?()A 512 bitsB 768 bitsC 1024 bitsD 2048 bits” 相关考题
考题 工厂的最小有效规模(Minimum efficient size of plant)

考题 By default, what type of SSH server key is generated by Cisco NX-OS Software?()A、 DSA key generated with 512 bitsB、 RSA key generated with 768 bitsC、 RSA key generated with 1024 bitsD、 DSA key generated with 1024 bitsE、 RSA key generated with 2048 bits

考题 The enable secret password appears as an MD5 hash in a router’s configuration file, whereas the enablepassword is not hashed (or encrypted, if the password-encryption service is not enabled). What is thereason that Cisco still support the use of both enable secret and enable passwords in a router’sconfiguration?()A、The enable password is present for backward compatibility.B、Because the enable secret password is a hash, it cannot be decrypted. Therefore, the enable password is used to match the password that was entered, and the enable secret is used to verify that the enablepassword has not been modified since the hash was generated.C、The enable password is considered to be a router’s public key, whereas the enable secret password is considered to be a router’s private key.D、The enable password is used for IKE Phase I, whereas the enable secret password is used for IKE Phase II.

考题 You have configured the "config network webmode enable" command on a Cisco device.  What is the purpose of this command? ()A、To allow HTTP access to the WLAN controllerB、To allow SSH access to the CLI of the WLAN controllerC、To allow SSL access to the CLI of the WLAN controllerD、To allow HTTPS access to the WLAN controllerE、None of the other alternatives apply

考题 You are a network technician at Certpaper.com. Which description is correct when you have generated RSA keys on your Cisco router to prepare for secure device management?()A、You must then specify the general-purpose key size used for authentication with the crypto key generaters a general-keys modulus command.B、You must then zeroize the keys to reset secure shell before configuring other parameters.C、All vty ports are automatically enabled for SSH to provide secure management.D、The SSH protocol is automatically enabled.

考题 Whattwo things must you do onthe router before generating an SSH key with the "crypto key generate rsa"IOS command? ()A、 Configure the SSH version that the router will useB、 Configure the host name of the routerC、 Enable AAA AuthenticationD、 Configure the default IP domain name that the router will useE、 Enable SSH transport support onthe vty lines

考题 What is the minimum key size to enable SSH v2?()A、512 bitsB、768 bitsC、1024 bitsD、2048 bits

考题 What is the minimum configuration you must do in order to enable multicast support on the CiscoWireless LAN Controller v5.2?()A、Enable the IGMP snooping capability and define the IGMP timeout period.B、Set the Ethernet multicast mode to Enabled, enable the IGMP snooping capability, and define the IGMP timeout period.C、Set the multicast monitor function to Enabled, enable the IGMP snooping capability, and define the mandatory data rate to the minimum value supported.D、Set the Ethernet multicast mode to Multicast and define the multicast group address.

考题 You have a computer that runs Windows 7. Multiple users share the computer. The computer is joined to adomain. You need to prevent the users from using more than 2 GB of disk space on drive C.  What should you do?()A、From a Group Policy object (GPO), enable the Limit profile size setting.B、Enable System Protection for Local Disk (C) and set the disk space usage.C、Enable disk quota management on Computer1 and configure a default quota limit.D、From a Group Policy object (GPO), enable the Limit the size of the entire roaming user profile cachesetting.

考题 When configuring SSH, which is the Cisco minimum recommended modulus value?()A、2048 bitsB、1024 bitsC、256 bitsD、512 bits

考题 Which two statements about the Cisco AutoSecure feature are true?()A、All passwords entered during the AutoSecure configuration must be a minimum of 8 characters in length.B、Cisco123 would be a valid password for both the enable password and the enable secret commands.C、The auto secure command can be used to secure the router login as well as the NTP and SSH protocols.D、For an interactive full session of AutoSecure, the auto secure login command should be used.E、If the SSH server was configured, the 1024 bit RSA keys are generated after the auto secure commandis enabled.

考题 As a network technician, do you know what is a recommended practice for secure configurationmanagement?()A、Disable post scanB、Use SSH or SSLC、Enable trust levelsD、Deny echo replies on all edge routers

考题 You are trying to initiate an SSH connection to a remote router and are getting rejected with an error code of 0. Which of these might be the cause of the error?()A、The routers are using different SSH versions.B、You are trying to log in using invalid credentials.C、The RSA key pair is not properly configured on the SSH client.D、The RSA key pair is not properly configured on the SSH server.

考题 After purchasing the Active Memory Expansion (AME) Enablement Feature,what tasks must be completed before AME can be used?()A、Enable using active partition properties with DLPARB、Enter the activation key via the AIX 6.1 command line and reboot AIXC、Enter the activation key via the HMC,power cycle the managed system and start the LPARD、Enter the activation key via the HMC,modify the partition profile and restart the LPAR

考题 All servers in your environment run Windows Server 2008 R2. All client computers ru n Windows 7. Each client computer has at least 2 5 GB free disk space. You virtualize applications by using Microsoft Application Virtualization (App - V). The App - V client cache is set to 4096 MB. User profiles are virtualized and stored on a server. You ne ed to increase the size of the file system cache on a client computer to at least 10 GB. What should you do?()A、Use the AppVCacheSize tool to set the maximum cache size to 10240.B、Use the AppVCacheSize tool to set the minimum free disk space threshold to 1 0240.C、Set the HKLM / SOFTWARE / Microsoft / SoftGrid / 4.5 / Client /AppFS/ State registry key to 10240.D、Set the HKLM / SOFTWARE / Microsoft / SoftGrid / 4.5 / Client /AppFS/ FileSize registry key to 10240.

考题 All client computers in your environment run Windows 7. You virtualize applications by using Microsoft Application Virtuali zation (App - V). You need to reset the FileSystem cache on a client computer. What should you do?()A、Use the AppVCacheSize tool to set the maximum cache size to 0.B、Use the AppVCacheSize tool to set the minimum free disk space threshold to 0.C、Set the HKLM / SOFTWARE / Microsoft / SoftGrid / 4.5 / Client /AppFS/ State registry key to 0.D、Set the HKLM / SOFTWARE / Microsoft / SoftGrid / 4.5 / Client /AppFS/ FileSize registry key to 0.

考题 单选题You are trying to initiate an SSH connection to a remote router and are getting rejected with an error code of 0. Which of these might be the cause of the error?()A The routers are using different SSH versions.B You are trying to log in using invalid credentials.C The RSA key pair is not properly configured on the SSH client.D The RSA key pair is not properly configured on the SSH server.

考题 单选题By default, what type of SSH server key is generated by Cisco NX-OS Software?()A  DSA key generated with 512 bitsB  RSA key generated with 768 bitsC  RSA key generated with 1024 bitsD  DSA key generated with 1024 bitsE  RSA key generated with 2048 bits

考题 单选题The enable secret password appears as an MD5 hash in a router’s configuration file, whereas the enablepassword is not hashed (or encrypted, if the password-encryption service is not enabled). What is thereason that Cisco still support the use of both enable secret and enable passwords in a router’sconfiguration?()A The enable password is present for backward compatibility.B Because the enable secret password is a hash, it cannot be decrypted. Therefore, the enable password is used to match the password that was entered, and the enable secret is used to verify that the enablepassword has not been modified since the hash was generated.C The enable password is considered to be a router’s public key, whereas the enable secret password is considered to be a router’s private key.D The enable password is used for IKE Phase I, whereas the enable secret password is used for IKE Phase II.

考题 多选题You set the value of the SGA_TARGET initialization parameter to 1G to enable Oracle to automatically resize most of the memory components according to the current workload in the database. You issue the following statement:   SQL SELECT name, value, isdefault  2 FROM v$parameter   3 WHERE name LIKE ’%size%’;   The output of this statement displays that the DB_CACHE_SIZE, SHARED_POOL_SIZE,  LARGE_POOL_SIZE, and JAVA_POOL_SIZE initialization parameters contain a zero value.  What does this imply?()AThe SGA_TARGET initialization parameter cannot be set to a value less than 1GBThe SGA_TARGET initialization parameter cannot be set to a value greater than 1GCThe Memory Advisor of the Oracle Enterprise Manager 10g cannot be used to obtain advice on the important memory components of the SGADThe values of the DB_CACHE_SIZE, SHARED_POOL_SIZE, LARGE_POOL_SIZE, and JAVA_POOL_SIZE initialization parameters cannot be set manually.ENo minimum limits are imposed on the DB_CACHE_SIZE, SHARED_POOL_SIZE, LARGE_POOL_SIZE, and  JAVA_POOL_SIZE initialization parameters.FThe Automatic Shared Memory Management feature cannot be disabled unless you specify values for the  DB_CACHE_SIZE, SHARED_POOL_SIZE, LARGE_POOL_SIZE, and JAVA_POOL_SIZE initialization parameters in the initialization parameter file.

考题 单选题You have configured the "config network webmode enable" command on a Cisco device.  What is the purpose of this command? ()A To allow HTTP access to the WLAN controllerB To allow SSH access to the CLI of the WLAN controllerC To allow SSL access to the CLI of the WLAN controllerD To allow HTTPS access to the WLAN controllerE None of the other alternatives apply

考题 多选题Which two statements about the Cisco AutoSecure feature are true?()AAll passwords entered during the AutoSecure configuration must be a minimum of 8 characters in length.BCisco123 would be a valid password for both the enable password and the enable secret commands.CThe auto secure command can be used to secure the router login as well as the NTP and SSH protocols.DFor an interactive full session of AutoSecure, the auto secure login command should be used.EIf the SSH server was configured, the 1024 bit RSA keys are generated after the auto secure commandis enabled.

考题 多选题Whattwo things must you do onthe router before generating an SSH key with the "crypto key generate rsa"IOS command? ()AConfigure the SSH version that the router will useBConfigure the host name of the routerCEnable AAA AuthenticationDConfigure the default IP domain name that the router will useEEnable SSH transport support onthe vty lines

考题 单选题You are a network technician at Certpaper.com. Which description is correct when you have generated RSA keys on your Cisco router to prepare for secure device management?()A You must then specify the general-purpose key size used for authentication with the crypto key generaters a general-keys modulus command.B You must then zeroize the keys to reset secure shell before configuring other parameters.C All vty ports are automatically enabled for SSH to provide secure management.D The SSH protocol is automatically enabled.

考题 单选题You are maintaining your database in Oracle10g. You have set the value of the STATISTICS_LEVEL initialization parameter to TYPICAL and the value of the FAST_START_MTTR_TARGET parameter to 900 seconds. To increase the performance of the database, you want to determine the log file size that should equal the minimum size of all the online redo log files. Which column will enable you to perform the desired task?()A  the WRITES_LOGFILE_SIZE column of the V$INSTANCE_RECOVERY viewB  the column of the V$INSTANCE_RECOVERY viewC  the OPTIMAL_LOGFILE_SIZE column of the V$INSTANCE_RECOVERY viewD  the LOG_FILE_SIZE_REDO_BLKS column of the V$INSTANCE_RECOVERY view

考题 多选题What are the three steps you should take to tune a JDBC Connection pool in WebLogic from the  initial settings in a production environment?()AEnsure the maximum size is increased to an appropriate setting.BSet the minimum and maximum size of the connection pool to the same value.CIncrease the statement cache size.DAdd more heap to the JVM.EAdd more nodes to the cluster.

考题 单选题What is the minimum configuration you must do in order to enable multicast support on the CiscoWireless LAN Controller v5.2?()A Enable the IGMP snooping capability and define the IGMP timeout period.B Set the Ethernet multicast mode to Enabled, enable the IGMP snooping capability, and define the IGMP timeout period.C Set the multicast monitor function to Enabled, enable the IGMP snooping capability, and define the mandatory data rate to the minimum value supported.D Set the Ethernet multicast mode to Multicast and define the multicast group address.