Secure shell
Secure sessionhost
Secure session home
Session shell
第1题:
A.Secure shell
B.Secure sessionhost
C.Secure session home
D.Session shell
第2题:
You are a network technician at Certpaper.com. Which description is correct when you have generated RSA keys on your Cisco router to prepare for secure device management?()
第3题:
SSH协议作为一种安全的远程登录协议,被广泛应用,关于SSH正确的是()。
第4题:
Which two statements about the Cisco AutoSecure feature are true?()
第5题:
What is the primary use of a remote access VPN?()
第6题:
Which Junos Pulse feature allows the user to log in once through a Junos Pulse Secure Access Service on the network and then access resources protected by a Junos Pulse Access Control Service without reauthentication?()
第7题:
You have a Junos Pulse Secure Access Service acting as an IF-MAP client, configured to federate all user roles to a Junos Pulse Access Control Service acting as an IF-MAP Federation server. A remote user using Junos Pulse logs in to the Junos Pulse Secure Access Service; the Junos Pulse Secure Access Service provisions a remote access session for that user.What happens next?()
第8题:
Roaming Session
Session Migration
Location Awareness
Persistent Session
第9题:
Disable post scan
Use SSH or SSL
Enable trust levels
Deny echo replies on all edge routers
第10题:
Static secure MAC address
Dynamic secure MAC address
Pervasive secure MAC address
Sticky secure MAC address
第11题:
You must then specify the general-purpose key size used for authentication with the crypto key generaters a general-keys modulus command.
You must then zeroize the keys to reset secure shell before configuring other parameters.
All vty ports are automatically enabled for SSH to provide secure management.
The SSH protocol is automatically enabled.
第12题:
Use refresh -s sshd
Use init.sshd /etc/rc.ssh
Use /usr/sbin/sshd -restart
Use stopsrc -s sshd and then startsrc -s sshd
第13题:
第14题:
Which type of MAC address is dynamically learned by a switch port and then added to the switch’s runningconfiguration?()
第15题:
安全套接层协议SSL是()的缩写
第16题:
SSH是下面哪个英语词缩写().
第17题:
Which of the following is a secure method of remote access via command line?()
第18题:
Which three types of policies must you configure to allow remote users transparent access to protected resources using IF-MAP Federation between a Junos Pulse Secure Access Service and a Junos Pulse Access Control Service?()
第19题:
Service Focal Point, Inventory Scout, and DLPAR rely on correct setup and networking between the HMC and the logical partitions. Which authentication method is used to control session management, but also authentication between network peers?()
第20题:
Secure desktop will create a completely separate computing environment thatwill be deleted when you are done.This ensures that no confidential data has been left on the shared/public computer.
Secure desktop is used to protect access to your registry and systemfiles when browsing to SSL/VPN protectedpages.
Secure Desktop ensures that an SSLprotected password cannotbe exploitedby a man in the middle attackusing a spoofed certificate.
Secure desktop hardens the operating system of the machines you are using at the time secure desktop islaunched.
第21题:
All passwords entered during the AutoSecure configuration must be a minimum of 8 characters in length.
Cisco123 would be a valid password for both the enable password and the enable secret commands.
The auto secure command can be used to secure the router login as well as the NTP and SSH protocols.
For an interactive full session of AutoSecure, the auto secure login command should be used.
If the SSH server was configured, the 1024 bit RSA keys are generated after the auto secure commandis enabled.
第22题:
to secure communication between two remote PCs
to secure communication between two remote offices
to secure communication betweenan remote PC and the corporate intranet
to secure communication between a corporate intranet and the public internet
第23题:
The Junos Pulse Secure Access Service redirects the user to the Junos Pulse Secure Access Service for authentication
The Junos Pulse Access Control Service provisions enforcement points to enable resource access for that user.
The Junos Pulse Secure Access Service publishes user session and role information to the IF- MAP Federation server,
The Junos Pulse Secure Access Service provisions enforcement points to enable resource access for that user.