网友您好, 请在下方输入框内输入要搜索的题目:
题目内容
(请给出正确答案)
单选题
Which of the following authentication protocols uses certificates to negotiate access to the network?()
A
PAP
B
CHAP
C
EAP-TLS
D
Kerberos
参考答案
参考解析
解析:
暂无解析
更多 “单选题Which of the following authentication protocols uses certificates to negotiate access to the network?()A PAPB CHAPC EAP-TLSD Kerberos” 相关考题
考题
Which two authentication protocols can be configured for RIP on an ERX Edge Router? ()
A.AB.BC.CD.D
考题
Which of the following uses pair authentication to provide a wireless connection between twodevices?()
A. 802.11nB. BluetoothC. InfraredD. Cellular
考题
Which statement about OSPF authentication is true?()A、To enable OSPF authentication in a network, OSPF area 0 authentications must be enabled firstB、The payload of OSPF version 3 packets contains no authentication informationC、OSPF version 3 supports Advanced Encryption StandardD、OSPF version 3 uses router ID as a key to encrypt OSPF hello packetsE、OSPF MD5 authentication uses TCP, and Plan Test authentication uses UDP
考题
Which of the following are TACACS+ characteristics?(Choose all that apply.)()A、Cisco proprietaryB、Standards-based protocolC、Provides separate services for authentication, authorization, and accountingD、Encrypts only the passwordE、Uses UDP for a transport layerF、Encrypts the entire packet
考题
Which two statements about using the CHAP authentication mechanism in a PPP link are true?()A、CHAP uses a two-way handshakeB、CHAP authentication periodically occurs after link establishmentC、CHAP has no protection from playback attacksD、CHAP authentication is performed only upon link establishmentE、CHAP uses a three-way handshakeF、CHAP authentication passwords are sent in plaintext
考题
Which of the following routing protocols is a link state and uses a backbone called area 0?()A、OSPFB、EIGRPC、BGPD、IS-IS
考题
Which of the following routing protocols uses AS-Path as one of the methods to build the routing table?()A、OSPFB、IS-ISC、EIGRPD、BGP
考题
Which security mechanism uses the concept of a realm?()A、AuthorizationB、Data integrityC、ConfidentialityD、Authentication
考题
多选题Which two statements about using the CHAP authentication mechanism in a PPP link are true?()ACHAP uses a two-way handshakeBCHAP authentication periodically occurs after link establishmentCCHAP has no protection from playback attacksDCHAP authentication is performed only upon link establishmentECHAP uses a three-way handshakeFCHAP authentication passwords are sent in plaintext
考题
单选题Which the security mechanism uses the concept of a realm?()A
authorizationB
data integrityC
confidentialityD
authentication
考题
单选题Which of the following routing protocols uses AS-Path as one of the methods to build the routing table?()A
OSPFB
IS-ISC
EIGRPD
BGP
考题
多选题Which two primary port authentication protocols are used with VSANs?()ASPAPBCHAPCDHCHAPDESP
考题
多选题You have been asked to develop an application that uses only connection-oriented protocols. Which two protocols can you use?()APPPBUDPCTCPDICMP
考题
单选题Which of the following uses pair authentication to provide a wireless connection between twodevices?()A
802.11nB
BluetoothC
InfraredD
Cellular
考题
单选题Which one of the following protocols uses both UDP and TCP ports for the transport layer operation?()A
FTPB
TFTPC
SMTPD
TelnetE
DNS
考题
单选题Which of the following authentication protocols uses certificates to negotiate access to the network?()A
PAPB
CHAPC
EAP-TLSD
Kerberos
考题
单选题Which statement about OSPF authentication is true?()A
To enable OSPF authentication in a network, OSPF area 0 authentications must be enabled firstB
The payload of OSPF version 3 packets contains no authentication informationC
OSPF version 3 supports Advanced Encryption StandardD
OSPF version 3 uses router ID as a key to encrypt OSPF hello packetsE
OSPF MD5 authentication uses TCP, and Plan Test authentication uses UDP
考题
多选题Which of the following protocols utilize TCP?()ANTPBNNTPCSMTPDSNMPEHTTPSFTFTP
热门标签
最新试卷