niusouti.com

单选题SSH是下面哪个英语词缩写().A Secure shellB Secure sessionhostC Secure session homeD Session shell

题目
单选题
SSH是下面哪个英语词缩写().
A

Secure shell

B

Secure sessionhost

C

Secure session home

D

Session shell


相似考题
更多“单选题SSH是下面哪个英语词缩写().A Secure shellB Secure sessionhostC Secure session homeD Session shell”相关问题
  • 第1题:

    SSH是下面哪个英语词缩写().

    A.Secure shell

    B.Secure sessionhost

    C.Secure session home

    D.Session shell


    参考答案:A

  • 第2题:

    You are a network technician at Certpaper.com. Which description is correct when you have generated RSA keys on your Cisco router to prepare for secure device management?()

    • A、You must then specify the general-purpose key size used for authentication with the crypto key generaters a general-keys modulus command.
    • B、You must then zeroize the keys to reset secure shell before configuring other parameters.
    • C、All vty ports are automatically enabled for SSH to provide secure management.
    • D、The SSH protocol is automatically enabled.

    正确答案:D

  • 第3题:

    SSH协议作为一种安全的远程登录协议,被广泛应用,关于SSH正确的是()。

    • A、SSH采用额外的加密技术确保登录安全性
    • B、SSH采用TCP端口22传输数据,端口23建立连接
    • C、SSH还可以为FTP提供安全的传输通道
    • D、SSH及Secure Shell,可以采用DES认证方式保证数据的安全性

    正确答案:A,C,D

  • 第4题:

    Which two statements about the Cisco AutoSecure feature are true?()

    • A、All passwords entered during the AutoSecure configuration must be a minimum of 8 characters in length.
    • B、Cisco123 would be a valid password for both the enable password and the enable secret commands.
    • C、The auto secure command can be used to secure the router login as well as the NTP and SSH protocols.
    • D、For an interactive full session of AutoSecure, the auto secure login command should be used.
    • E、If the SSH server was configured, the 1024 bit RSA keys are generated after the auto secure commandis enabled.

    正确答案:C,E

  • 第5题:

    What is the primary use of a remote access VPN?()

    • A、to secure communication between two remote PCs
    • B、to secure communication between two remote offices
    • C、to secure communication betweenan remote PC and the corporate intranet
    • D、to secure communication between a corporate intranet and the public internet

    正确答案:C

  • 第6题:

    Which Junos Pulse feature allows the user to log in once through a Junos Pulse Secure Access Service on the network and then access resources protected by a Junos Pulse Access Control Service without reauthentication?()

    • A、Roaming Session
    • B、Session Migration
    • C、Location Awareness
    • D、Persistent Session

    正确答案:B

  • 第7题:

    You have a Junos Pulse Secure Access Service acting as an IF-MAP client, configured to federate all user roles to a Junos Pulse Access Control Service acting as an IF-MAP Federation server. A remote user using Junos Pulse logs in to the Junos Pulse Secure Access Service; the Junos Pulse Secure Access Service provisions a remote access session for that user.What happens next?()

    • A、The Junos Pulse Secure Access Service redirects the user to the Junos Pulse Secure Access Service for authentication
    • B、The Junos Pulse Access Control Service provisions enforcement points to enable resource access for that user.
    • C、The Junos Pulse Secure Access Service publishes user session and role information to the IF- MAP Federation server,
    • D、The Junos Pulse Secure Access Service provisions enforcement points to enable resource access for that user.

    正确答案:C

  • 第8题:

    单选题
    Which Junos Pulse feature allows the user to log in once through a Junos Pulse Secure Access Service on the network and then access resources protected by a Junos Pulse Access Control Service without reauthentication?()
    A

    Roaming Session

    B

    Session Migration

    C

    Location Awareness

    D

    Persistent Session


    正确答案: C
    解析: 暂无解析

  • 第9题:

    单选题
    As a network technician, do you know what is a recommended practice for secure configurationmanagement?()
    A

    Disable post scan

    B

    Use SSH or SSL

    C

    Enable trust levels

    D

    Deny echo replies on all edge routers


    正确答案: B
    解析: 暂无解析

  • 第10题:

    单选题
    Which type of MAC address is dynamically learned by a switch port and then added to the switch’s runningconfiguration?()
    A

    Static secure MAC address

    B

    Dynamic secure MAC address

    C

    Pervasive secure MAC address

    D

    Sticky secure MAC address


    正确答案: D
    解析: 暂无解析

  • 第11题:

    单选题
    You are a network technician at Certpaper.com. Which description is correct when you have generated RSA keys on your Cisco router to prepare for secure device management?()
    A

    You must then specify the general-purpose key size used for authentication with the crypto key generaters a general-keys modulus command.

    B

    You must then zeroize the keys to reset secure shell before configuring other parameters.

    C

    All vty ports are automatically enabled for SSH to provide secure management.

    D

    The SSH protocol is automatically enabled.


    正确答案: D
    解析: 暂无解析

  • 第12题:

    单选题
    After performing a modification on the /etc/ssh/sshd_config file the operator needs to reinitialize the secure shell daemon to enable the new settings. Which of the following is the correct way to achieve this?()
    A

    Use refresh -s sshd

    B

    Use init.sshd /etc/rc.ssh

    C

    Use /usr/sbin/sshd -restart

    D

    Use stopsrc -s sshd and then startsrc -s sshd


    正确答案: A
    解析: 暂无解析

  • 第13题:

    Secure Shell (SSH) is a cryptographic network protocol for ( ) remote login and other secure network services over an(请作答此空)network.The standard( )port for SSH is 22. The best known example application is for remote login to computer systems by users.
    SSH provides a secure channel over an insecured network in a( ) architecture, connecting an SSH client application with an SSH server. Common applications include remote command-line login and remote command execution, but any network service can be secured with SSH. The protocol specification distinguishes between two major versions, referred to as SSH-1 and SSH-2.
    The most visible application of the protocol is for access to shell accounts on( )operating systems, but it sees some limited use on Windows as well. In 2015, Microsoft announced that they would include native support for SSH in a future release.

    A.secure
    B.insecure
    C.internet
    D.internal

    答案:B
    解析:
    Secure Shell (SSH) is a cryptographic network protocol for secure remote login and other secure network services over an insecure network.The standard TCP port for SSH is 22. The best known example application is for remote login to computer systems by users.
    SSH provides a secure channel over an insecured network in a client-server architecture, connecting an SSH client application with an SSH server. Common applications include remote command-line login and remote command execution, but any network service can be secured with SSH. The protocol specification distinguishes between two major versions, referred to as SSH-1 and SSH-2.
    The most visible application of the protocol is for access to shell accounts on Unix-like operating systems, but it sees some limited use on Windows as well. In 2015, Microsoft announced that they would include native support for SSH in a future release.

  • 第14题:

    Which type of MAC address is dynamically learned by a switch port and then added to the switch’s runningconfiguration?()

    • A、Static secure MAC address
    • B、Dynamic secure MAC address
    • C、Pervasive secure MAC address
    • D、Sticky secure MAC address

    正确答案:D

  • 第15题:

    安全套接层协议SSL是()的缩写

    • A、Secure Sockets Layer
    • B、Security Sending Language
    • C、Security Sending Layer
    • D、Secure Sets Layer

    正确答案:A

  • 第16题:

    SSH是下面哪个英语词缩写().

    • A、Secure shell
    • B、Secure sessionhost
    • C、Secure session home
    • D、Session shell

    正确答案:A

  • 第17题:

    Which of the following is a secure method of remote access via command line?()

    • A、RCP
    • B、Telnet
    • C、RSH
    • D、SSH

    正确答案:D

  • 第18题:

    Which three types of policies must you configure to allow remote users transparent access to protected resources using IF-MAP Federation between a Junos Pulse Secure Access Service and a Junos Pulse Access Control Service?()

    • A、Session-Export policies on the Junos Pulse Secure Access Service
    • B、Session-Export policies on the Junos Pulse Access Control Service
    • C、Session-Import policies on the Junos Pulse Secure Access Service
    • D、Session-Import policies on the Junos Pulse Access Control Service
    • E、Resource access policies on the Junos Pulse Access Control Service

    正确答案:A,D,E

  • 第19题:

    Service Focal Point, Inventory Scout, and DLPAR rely on correct setup and networking between the HMC and the logical partitions. Which authentication method is used to control session management, but also authentication between network peers?()

    • A、Kerberos
    • B、Domain Name Server
    • C、Secure Sockets Layer
    • D、Resource Monitoring and Control

    正确答案:D

  • 第20题:

    单选题
    Of the threats discussed below, what is the main advantage of using Cisco Secure Desktop which is part of the Cisco ASA VPN solution?()
    A

     Secure desktop will create a completely separate computing environment thatwill be deleted when you are done.This ensures that no confidential data has been left on the shared/public computer.

    B

     Secure desktop is used to protect access to your registry and systemfiles when browsing to SSL/VPN protectedpages.

    C

     Secure Desktop ensures that an SSLprotected password cannotbe exploitedby a man in the middle attackusing a spoofed certificate.

    D

     Secure desktop hardens the operating system of the machines you are using at the time secure desktop islaunched.


    正确答案: A
    解析: 暂无解析

  • 第21题:

    多选题
    Which two statements about the Cisco AutoSecure feature are true?()
    A

    All passwords entered during the AutoSecure configuration must be a minimum of 8 characters in length.

    B

    Cisco123 would be a valid password for both the enable password and the enable secret commands.

    C

    The auto secure command can be used to secure the router login as well as the NTP and SSH protocols.

    D

    For an interactive full session of AutoSecure, the auto secure login command should be used.

    E

    If the SSH server was configured, the 1024 bit RSA keys are generated after the auto secure commandis enabled.


    正确答案: A,C
    解析: 暂无解析

  • 第22题:

    单选题
    What is the primary use of a remote access VPN?()
    A

    to secure communication between two remote PCs

    B

    to secure communication between two remote offices

    C

    to secure communication betweenan remote PC and the corporate intranet

    D

    to secure communication between a corporate intranet and the public internet


    正确答案: C
    解析: 暂无解析

  • 第23题:

    单选题
    You have a Junos Pulse Secure Access Service acting as an IF-MAP client, configured to federate all user roles to a Junos Pulse Access Control Service acting as an IF-MAP Federation server. A remote user using Junos Pulse logs in to the Junos Pulse Secure Access Service; the Junos Pulse Secure Access Service provisions a remote access session for that user.What happens next?()
    A

    The Junos Pulse Secure Access Service redirects the user to the Junos Pulse Secure Access Service for authentication

    B

    The Junos Pulse Access Control Service provisions enforcement points to enable resource access for that user.

    C

    The Junos Pulse Secure Access Service publishes user session and role information to the IF- MAP Federation server,

    D

    The Junos Pulse Secure Access Service provisions enforcement points to enable resource access for that user.


    正确答案: D
    解析: 暂无解析