网友您好, 请在下方输入框内输入要搜索的题目:
题目内容
(请给出正确答案)
Secure Shell (SSH) is a cryptographic network protocol for ( ) remote login and other secure network services over an(请作答此空)network.The standard( )port for SSH is 22. The best known example application is for remote login to computer systems by users.
SSH provides a secure channel over an insecured network in a( ) architecture, connecting an SSH client application with an SSH server. Common applications include remote command-line login and remote command execution, but any network service can be secured with SSH. The protocol specification distinguishes between two major versions, referred to as SSH-1 and SSH-2.
The most visible application of the protocol is for access to shell accounts on( )operating systems, but it sees some limited use on Windows as well. In 2015, Microsoft announced that they would include native support for SSH in a future release.
SSH provides a secure channel over an insecured network in a( ) architecture, connecting an SSH client application with an SSH server. Common applications include remote command-line login and remote command execution, but any network service can be secured with SSH. The protocol specification distinguishes between two major versions, referred to as SSH-1 and SSH-2.
The most visible application of the protocol is for access to shell accounts on( )operating systems, but it sees some limited use on Windows as well. In 2015, Microsoft announced that they would include native support for SSH in a future release.
A.secure
B.insecure
C.internet
D.internal
B.insecure
C.internet
D.internal
参考答案
参考解析
解析:Secure Shell (SSH) is a cryptographic network protocol for secure remote login and other secure network services over an insecure network.The standard TCP port for SSH is 22. The best known example application is for remote login to computer systems by users.
SSH provides a secure channel over an insecured network in a client-server architecture, connecting an SSH client application with an SSH server. Common applications include remote command-line login and remote command execution, but any network service can be secured with SSH. The protocol specification distinguishes between two major versions, referred to as SSH-1 and SSH-2.
The most visible application of the protocol is for access to shell accounts on Unix-like operating systems, but it sees some limited use on Windows as well. In 2015, Microsoft announced that they would include native support for SSH in a future release.
SSH provides a secure channel over an insecured network in a client-server architecture, connecting an SSH client application with an SSH server. Common applications include remote command-line login and remote command execution, but any network service can be secured with SSH. The protocol specification distinguishes between two major versions, referred to as SSH-1 and SSH-2.
The most visible application of the protocol is for access to shell accounts on Unix-like operating systems, but it sees some limited use on Windows as well. In 2015, Microsoft announced that they would include native support for SSH in a future release.
更多 “Secure Shell (SSH) is a cryptographic network protocol for ( ) remote login and other secure network services over an(请作答此空)network.The standard( )port for SSH is 22. The best known example application is for remote login to computer systems by users. SSH provides a secure channel over an insecured network in a( ) architecture, connecting an SSH client application with an SSH server. Common applications include remote command-line login and remote command execution, but any network service can be secured with SSH. The protocol specification distinguishes between two major versions, referred to as SSH-1 and SSH-2. The most visible application of the protocol is for access to shell accounts on( )operating systems, but it sees some limited use on Windows as well. In 2015, Microsoft announced that they would include native support for SSH in a future release.A.secure B.insecure C.internet D.internal ” 相关考题
考题
下面对于SSH的说法错误的是?()A.SSH是Secure Shell的简称B.客户端使用ssh连接远程登录SSH服务器必须经过基于公钥的身份验证C.通常Linux操作系统会在/usr/local目录下默认安装OpenSSHD.SSH2比SSH1更安全
考题
While the Internet is inherently insecure, businesses still need to preserve the privacy of data as it travels over the network. To help do that, the Internet Engineering Task Force an international group of network designers, operators, vendors, and researchers concerned with the evolution of(71)has developed a suite of(72)called Internet Protocol Security(IPSec).IPSec creates a standard platform. to develop secure networks and electronic(73)between two machines. Secure tunneling via IPSec creates(74)connections in a network through which data packets can move. It creates these tunnels between remote users and within a local network. It also(75)each data packet in a new packet that contains the information neccessary to set up, maintain and tear down the tunnel when it's no longer needed.A.channelsB.Web browserC.Internet dataD.Internet architecture
考题
Which of the following is a secure method of remote access via command line?()
A.RCPB.TelnetC.RSHD.SSH
考题
Which protocol should be used to establish a secure terminal connection to a remote network device? Select the best response.()
A. ARPB. SSHC. TelnetD. WEPE. SNMPv1F. SNMPv2
考题
The File Transfer Protocol (FTP) is a standard network protocol used for the transfer of computer ( ) between a client and server on a computer network.FTP is built on a ( ) model architecture using separate control and data connections between the client and the server. FTP users may authenticate themselves with a (请作答此空) sign-in protocol, normally in the form of a username and password, but can connect anonymously if the server is configured to allow it. For secure transmission that protects the username and password, and encrypts the content, FTP is often secured with SSL/TLS (FTPS) or replaced with SSH File Transfer Protocol (SFTP).The first FTP client applications were ( ) programs developed before operating systems had graphical user interfaces, and are still shipped with most Windows, Unix, and Linux operating systems. Many FTP clients and automation utilities have since been developed for desktops, servers, mobile devices, and hardware, and FTP has been incorporated into productivity applications, such as HTML editors.FTP may run in ( ) mode, which determines how the data connection is established. In both cases, the client creates a TCP control connection from a random, usually an unprivileged, port N to the FTP server command port 21.In active mode, the client starts listening for incoming data connections from the server on port M. It sends the FTP command PORT M to inform the server on which port it is listening. The server then initiates a data channel to the client from its port 20, the FTP server data port.In situations where the client is behind a firewall and unable to accept incoming TCP connections, passive mode may be used. In this mode, the client uses the control connection to send a PASV command to the server and then receives a server IP address and server port number from the server, which the client then uses to open a data connection from an arbitrary client port to the server IP address and server port number received.Both modes were updated in September 1998 to support IPv6. Further changes were introduced to the passive mode at that time, updating it to extended passive mode.A.encrypt
B.decryption
C.clear-text
D.secure
考题
IPsec, also known as the internet Protocol ( ) , defines the architecture for security services for IP network traffic IPsec describes the framework for providing security a the IP layer, as well as the suite of protocols designed to provide that security: through_ ( )_ and encryption of IP network packets. IPec can be used 10 protect network data, for example, by setting up circuits using IPsec ( ), in which all data being sent between two endpoints is encrypted, as with a Virtual (请作答此空) Network connection ;for encrypting application layer data ;and for providing security for routers sending routing data across the public internet. Internet traffic can also be secured from host to host without the use of IPsec, for example by encryption at the ( ) layer with HTTP Secure (TTPS)or an the transport layer wit the Transport Layer Security (TLS)protocol.A.pubic]
B.private]
C.personal
D.proper
考题
You are a network technician at Certpaper.com. Which description is correct when you have generated RSA keys on your Cisco router to prepare for secure device management?()A、You must then specify the general-purpose key size used for authentication with the crypto key generaters a general-keys modulus command.B、You must then zeroize the keys to reset secure shell before configuring other parameters.C、All vty ports are automatically enabled for SSH to provide secure management.D、The SSH protocol is automatically enabled.
考题
Which of the following is a secure method of copying information over a public network?()A、SCPB、SMTPC、SNMPD、TFTP
考题
SSH协议作为一种安全的远程登录协议,被广泛应用,关于SSH正确的是()。A、SSH采用额外的加密技术确保登录安全性B、SSH采用TCP端口22传输数据,端口23建立连接C、SSH还可以为FTP提供安全的传输通道D、SSH及Secure Shell,可以采用DES认证方式保证数据的安全性
考题
Which protocol should be used to establish a secure terminal connection to a remote network device?Select the best response.()A、ARPB、SSHC、TelnetD、WEPE、SNMPv1F、SNMPv2
考题
The Testking network is implementing dialup services for their remote employees.Testking uses several different Layer 3 protocols on the network. Authentication ofthe users connecting to the network is required for security. Additionally, some employees will be dialing long distance and will need callback support.Which protocol is the best choice for these remote access services?()A、802.1B、FramerelayC、HDLCD、PPPE、SLIPF、PAP
考题
Which two statements about the Cisco AutoSecure feature are true?()A、All passwords entered during the AutoSecure configuration must be a minimum of 8 characters in length.B、Cisco123 would be a valid password for both the enable password and the enable secret commands.C、The auto secure command can be used to secure the router login as well as the NTP and SSH protocols.D、For an interactive full session of AutoSecure, the auto secure login command should be used.E、If the SSH server was configured, the 1024 bit RSA keys are generated after the auto secure commandis enabled.
考题
As a network technician, do you know what is a recommended practice for secure configurationmanagement?()A、Disable post scanB、Use SSH or SSLC、Enable trust levelsD、Deny echo replies on all edge routers
考题
Refer to the exhibit.What is the effect of the configuration that is shown?()A、It tells the router or switch to try establish an SSH connection first and if that fail to use telnet.B、It configures a cisco network device to use the SSH protocol on incoming communications via the virtual terminal ports.C、It allows seven failed login attempts before the VTY lines are temporarily shutdown.D、It configures the virtual terminal lines with the password 030752180500.E、It configures SSH globally for all logins.
考题
Which of the following is a secure method of remote access via command line?()A、RCPB、TelnetC、RSHD、SSH
考题
Companycom informs the system administrator that there is concern about the Electronic Service Agent and security. What can be said about Electronic Service Agent that will address concerns about security?()A、All Service Agent transactions are inbound requests secured by encryption (cryptographic processor card) Kerberos, and Hypertext Transfer Protocol Secure (HTTPS). B、The ATT Global Network Services (AGNS ) phone connection generates system IDs and passwords for the client every six months. Service Agent has no inbound capability.C、All Service Agent transactions are outbound requests secured by encryption (Hypertext Transfer Protocol Secure (HTTPS) or POST). Service Agent has no inbound capability. D、The transmissions from Service Agent can be either by Internet or the ATT Global Network Services (AGNS) phone connection. Service Agent transactions are inbound requests generated by a point to point connection.
考题
You work as a exchange administrator at TestKing.com. The TestKing.com network contains an internalnetwork as well as a perimeter network. The primeter network contains an Exchange Server 2010 EdgeTransport Server named TESTKING-EX. During the course of day you receive an instruction form the CIO to formulate a remote managementsolution for TESTKING-EX01 based on the set criteria below: You need to ensure that management traffic is encypted. You nedd to ensure that remote administration is permitted fron the Internet network.You need to ensure that Exchange Management Console (EMC) is supported. What should you do?()A、You should recommend that Windows Management Instrumentation Command-line (WMIC) be used.B、You should recommend that Lightweight Directory Access Protocol(LDAP)over Secure Socket Layer(SSL) be used.C、You should recommend that Windows Remote Management (WinRM) over SSL be used.D、You should recommend that Remote Desktop Protocol(RDP)over Secure Socket Layer(SSL)be used.
考题
Your network contains a server named Server1 that has the Routing role service installed. Server1 has two network connections. One network connection connects to the internal network. The other network connection connects to the Internet.All network connections connected to the internal network use private IP addresses. You install a Web server named Web1. Web1 hosts a secured Web site that only allows connections over TCP port 8281. Web1 is connected to the internal network.You need to ensure that the secure Web site can be accessed from the Internet.What should you do from the Routing and Remote Access console?()A、Configure Routing Information Protocol (RIP), and then activate authentication on the RIP interface.B、Configure Routing Information Protocol (RIP), and then configure the incoming packet protocol settings on the RIP interface.C、Configure Network Address Translation (NAT), and then add a new service to the NAT interface.D、Configure Network Address Translation (NAT), and then enable the Secure Web Server (HTTPS) service on the NAT interface.
考题
单选题A company wants to secure access to its internal wireless network. The company wants to use themost secure means to access the network. Which of the following is the BEST choice for wireless security in this situation?()A
WEP encryptionB
Channel rotationC
Disable SSIDD
WPA encryption
考题
单选题Refer to the exhibit.What is the effect of the configuration that is shown?()A
It tells the router or switch to try establish an SSH connection first and if that fail to use telnet.B
It configures a cisco network device to use the SSH protocol on incoming communications via the virtual terminal ports.C
It allows seven failed login attempts before the VTY lines are temporarily shutdown.D
It configures the virtual terminal lines with the password 030752180500.E
It configures SSH globally for all logins.
考题
多选题Which two statements about the Cisco AutoSecure feature are true?()AAll passwords entered during the AutoSecure configuration must be a minimum of 8 characters in length.BCisco123 would be a valid password for both the enable password and the enable secret commands.CThe auto secure command can be used to secure the router login as well as the NTP and SSH protocols.DFor an interactive full session of AutoSecure, the auto secure login command should be used.EIf the SSH server was configured, the 1024 bit RSA keys are generated after the auto secure commandis enabled.
考题
单选题The Testking network is implementing dialup services for their remote employees.Testking uses several different Layer 3 protocols on the network. Authentication ofthe users connecting to the network is required for security. Additionally, some employees will be dialing long distance and will need callback support.Which protocol is the best choice for these remote access services?()A
802.1B
FramerelayC
HDLCD
PPPE
SLIPF
PAP
考题
单选题You are a network technician at Certpaper.com. Which description is correct when you have generated RSA keys on your Cisco router to prepare for secure device management?()A
You must then specify the general-purpose key size used for authentication with the crypto key generaters a general-keys modulus command.B
You must then zeroize the keys to reset secure shell before configuring other parameters.C
All vty ports are automatically enabled for SSH to provide secure management.D
The SSH protocol is automatically enabled.
考题
单选题Which protocol should be used to establish a secure terminal connection to a remote network device? Select the best response.()A
ARPB
SSHC
TelnetD
WEPE
SNMPv1F
SNMPv2
考题
单选题Your network consists of a single Active Directory domain. All servers run Windows Server 2008 R2. All client computers run Windows 7. Some users have laptop computers and work remotely from home. You need to plan a data provisioning infrastructure to secure sensitive files. Your plan must meet the following requirements: èFiles must be stored in an encrypted format. èFiles must be accessible by remote users over the Internet. èFiles must be encrypted while they are transmitted over the Internet. What should you include in your plan?()A
Deploy one Microsoft SharePoint Foundation 2010 site. Require users to access the SharePoint site by using a Secure Socket Transmission Protocol (SSTP) connection.B
Deploy two Microsoft SharePoint Foundation 2010 sites.Configure one site for internal users. Configure the other site for remote users. Publish the SharePoint sites by using HTTPS.C
Configure a Network Policy and Access Services (NPAS) server to act as a VPN server. Require remote users to access the files by using an IPsec connection to the VPN server.D
Store all sensitive files in folders that are encrypted by using Encrypting File System (EFS). Require remote users to access the files by using Secure Socket Transmission Protocol (SSTP).
热门标签
最新试卷