niusouti.com

All WAN links is side the TestKing.com network use PPP with for authentication security. Which command will display the CHAP authentication process as it occurs between two routers in the network?()A. show CHAP authenticationB. show interface serial 0C. d

题目
All WAN links is side the TestKing.com network use PPP with for authentication security. Which command will display the CHAP authentication process as it occurs between two routers in the network?()

A. show CHAP authentication

B. show interface serial 0

C. debug PPP authentication

D. debug CHAP authentication

E. show PPP authentication CHAP


相似考题
更多“All WAN links is side the TestKing.com network use PPP with for authentication security. Which command will display the CHAP authentication process as it occurs between two routers in the network?() ”相关问题
  • 第1题:

    which command is used to enable CHAP authentication whit PAP as the fallback method on a serial interface?()

    A.(config-if)#authentication ppp chap fallback ppp

    B.(config-if)#authentication ppp chap pap

    C.(config-if)#ppp authentication chap pap

    D.(config-if)#ppp authentication chap fallback ppp


    参考答案:C

  • 第2题:

    All WAN links inside the ABC University network use PPP with CHAP for authentication security. Which command will display the CHAP authentication process as it occur between two routers in the network?()

    A.show chap authentication

    B.show interface serial0

    C.debug ppp authentication

    D.debug chap authentication

    E.show ppp authentication chap


    参考答案:C

  • 第3题:

    Which of the following options lists the steps in PPP session establishment in the correct order?()

    • A、Optional authentication phase, link establishment phase, network layer protocol phase.
    • B、Network layer protocol phase, link establishment phase, optional authentication phase.
    • C、Network layer protocol phase, optional authentication phase, link establishment phase.
    • D、Link establishment phase, network layer protocol phase, optional authentication phase.
    • E、Link establishment phase, optional authentication phase, network layer protocol phase.
    • F、Optional authentication phase, network layer protocol phase, link establishment phase.

    正确答案:E

  • 第4题:

    What are two roles of the authenticator as described in the 802.1X standard? ()

    • A、It proxies the authentication information between the supplicant and the authentication server.
    • B、It controls physical access to the network.
    • C、It communicates with the authentication server only.
    • D、It is responsible for verifying the identity of the supplicant through the use of an internal database.

    正确答案:A,B

  • 第5题:

    Which two statements about using the CHAP authentication mechanism in a PPP link are true?()

    • A、CHAP uses a two-way handshake
    • B、CHAP authentication periodically occurs after link establishment
    • C、CHAP has no protection from playback attacks
    • D、CHAP authentication is performed only upon link establishment
    • E、CHAP uses a three-way handshake
    • F、CHAP authentication passwords are sent in plaintext

    正确答案:B,E

  • 第6题:

    which command is used to enable CHAP authentication whit PAP as the fallback method on a serialinterface?()

    • A、(config-if)#authentication ppp chap fallback ppp
    • B、(config-if)#authentication ppp chap pap
    • C、(config-if)#ppp authentication chap pap
    • D、(config-if)#ppp authentication chap fallback ppp

    正确答案:C

  • 第7题:

    Which command displays the CHAP authentication process as it occurs between two routers?()

    • A、debug authentication
    • B、debug chap ppp
    • C、debug chap authentication
    • D、debug ppp authentication

    正确答案:D

  • 第8题:

    Your network contains one Active Directory domain. You have a member server named Server1 that runs Windows Server 2008. The server has the Routing and Remote Acecss role service installed. You implement Network Access Protection (NAP) for the domain. You need to configure the Point-to-Point (PPP) authentication method on Server1. Which autnetication method should you choose?()

    • A、Challenge Handshake Authentication Protocol (CHAP)
    • B、Extensible Authentication Protocol (EAP)
    • C、Microsoft Challenge Handshake Authentication Protocol version 2 (MS-CHAP v2)
    • D、Password Authentication Protocol (PAP)

    正确答案:B

  • 第9题:

    You need to design a method of communication between the IT and HR departments. Your solution must meet business requirements. What should you do?()

    • A、Design a custom IPSec policy to implement Encapsulating Security Payload (ESP) for all IP traffic Design the IPSec policy to use certificate-based authentication between the two departments’ computers
    • B、Design a customer IPSec policy to implement Authentication Header (AH) for all IP traffic. Desing the IPSec policy to use preshared key authentication between the two departments’ computers
    • C、Design a customer IPSec policy to implement Encapsulating Payload (ESP) for all IP traffic. Desing the IPSec policy to use preshared key authentication between the two departments’ computers
    • D、Design a customer IPSec policy to implement Authentication Header (AH) for all IP traffic. Desing the IPSec policy to use certificate-based authentication between the two departments’ computers

    正确答案:A

  • 第10题:

    多选题
    You are the systems engineer for your company. The network consists of three physical networks connected by hardware-based routers. The network consists of a single Active Directory domain. All servers run Windows Server 2003. All client computers run Windows XP Professional.   Each physical network contains at least one domain controller and at least one DNS server. One physical network contains a Microsoft Internet Security and Acceleration (ISA) Server array that provides Internet access for the entire company. The network also contains a certificate server.   Company management wants to ensure that all data is encrypted on the network and that all computers transmitting data on the network are authenticated.   You decide to implement IPSec on all computers on the network. You edit the Default Domain Policy Group Policy object (GPO) to apply the Secure Server (Require Security) IPSec policy.   Users immediately report that they cannot access resources located in remote networks. You investigate and discover that all packets are being dropped by the routers. You also discover that Active Directory replication is not functioning between domain controllers in different networks.   You need to revise your design and implementation to allow computers to communicate across the entire network. You also need to ensure that the authentication keys are stored encrypted.   Which two actions should you take?()
    A

    Configure the routers to use IPSec and a preshared key for authentication.

    B

    Configure the routers to use IPSec and a certificate for authentication.

    C

    Configure the routers to use IPSec and Kerberos for authentication

    D

    Reconfigure the GPOs to require a preshared key for IPSec authentication.

    E

    Reconfigure the GPOs to require a certificate for IPSec authentication.


    正确答案: E,B
    解析: 暂无解析

  • 第11题:

    多选题
    What are two roles of the authenticator as described in the 802.1X standard? ()
    A

    It proxies the authentication information between the supplicant and the authentication server.

    B

    It controls physical access to the network.

    C

    It communicates with the authentication server only.

    D

    It is responsible for verifying the identity of the supplicant through the use of an internal database.


    正确答案: D,A
    解析: 暂无解析

  • 第12题:

    单选题
    You are a network administrator for your company. The company has a main office and one branch office. The network consists of a single Active Directory domain. All servers run Windows Server 2003.   The company needs to connect the main office network and the branch office network by using Routing and Remote Access servers at each office. The networks will be connected by a VPN connection over the Internet.   The company’s written security policy includes the following requirements for VPN connections over the Internet:  All data must be encrypted with end-to-end encryption.  VPN connection authentication must be at the computer level.   Credential information must not be transmitted over the Internet as part of the authentication process.   You need to configure security for VPN connection between the main office and the branch office. You need to comply with the written security policy.   What should you do?  ()
    A

     Use a PPTP connection with EAP-TLS authentication.

    B

     Use a PPTP connection with MS-CHAP v2 authentication.

    C

     Use an L2TP connection with EAP-TLS authentication.

    D

     Use an L2TP connection with MS-CHAP v2 authentication.


    正确答案: D
    解析: 暂无解析

  • 第13题:

    Which two statements about using the CHAP authentication mechanism in a PPP link are true?()

    A.CHAP uses a two-way handshake

    B.CHAP authentication periodically occurs after link establishment

    C.CHAP has no protection from playback attacks

    D.CHAP authentication is performed only upon link establishment

    E.CHAP uses a three-way handshake

    F.CHAP authentication passwords are sent in plaintext


    参考答案:B, E

  • 第14题:

    which command is used to enable CHAP authentication whit PAP as the fallback method on a serial interface?()

    • A、(config-if)#authentication ppp chap fallback ppp
    • B、(config-if)#authentication ppp chap pap
    • C、(config-if)#ppp authentication chap pap
    • D、(config-if)#ppp authentication chap fallback ppp

    正确答案:C

  • 第15题:

    Which profile configurations allows either PAP or CHAP to be used for authentication?()

    • A、ppp authentication chap pap
    • B、pppoe authentication chap pap
    • C、ppp authentication chap ppp authentication pap
    • D、pppoe authentication chap pppoe authentication pap

    正确答案:A

  • 第16题:

    All WAN links inside the ABC University network use PPP with CHAP for authentication security. Which command will display the CHAP authentication process as it occur between two routers in the network?()

    • A、show chap authentication
    • B、show interface serial0
    • C、debug ppp authentication
    • D、debug chap authentication
    • E、show ppp authentication chap

    正确答案:C

  • 第17题:

    You are an administrator of a network that uses PPP for CHAP authentication over ever WAN link. What command would you enter to display the CHAP authentication as it occurs in real time?()

    • A、show ppp authentication
    • B、debug PAP authentication
    • C、debug PPP authentication
    • D、show interface serial0
    • E、show CHAP authentication

    正确答案:C

  • 第18题:

    All WAN links is side the TestKing.com network use PPP with for authentication security. Which command will display the CHAP authentication process as it occurs between two routers in the network?()

    • A、show CHAP authentication
    • B、show interface serial 0
    • C、debug PPP authentication
    • D、debug CHAP authentication
    • E、show PPP authentication CHAP

    正确答案:C

  • 第19题:

    Which routers must be configured with the same authentication string when configuring OSPF authentication?()

    • A、all routers on a link
    • B、all routers in an area
    • C、all external OSPF peers
    • D、all routers in an OSPF domain

    正确答案:A

  • 第20题:

    Your network contains one Active Directory domain. You have a member server named Server1 that runs Windows Server 2008 R2. The server has the Routing and Remote Access Services role service installed.You implement Network Access Protection (NAP) for the domain.You need to configure the Point-to-Point Protocol (PPP) authentication method on Server1. Which authentication method should you use?()

    • A、Challenge Handshake Authentication Protocol (CHAP)
    • B、Extensible Authentication Protocol (EAP)
    • C、Microsoft Challenge Handshake Authentication Protocol version 2 (MS-CHAP v2)
    • D、Password Authentication Protocol (PAP)

    正确答案:B

  • 第21题:

    多选题
    Which two statements about using the CHAP authentication mechanism in a PPP link are true?()
    A

    CHAP uses a two-way handshake

    B

    CHAP authentication periodically occurs after link establishment

    C

    CHAP has no protection from playback attacks

    D

    CHAP authentication is performed only upon link establishment

    E

    CHAP uses a three-way handshake

    F

    CHAP authentication passwords are sent in plaintext


    正确答案: B,D
    解析: 暂无解析

  • 第22题:

    单选题
    Which profile configurations allows either PAP or CHAP to be used for authentication?()
    A

    ppp authentication chap pap

    B

    pppoe authentication chap pap

    C

    ppp authentication chap ppp authentication pap

    D

    pppoe authentication chap pppoe authentication pap


    正确答案: C
    解析: 暂无解析

  • 第23题:

    单选题
    which command is used to enable CHAP authentication whit PAP as the fallback method on a serialinterface?()
    A

    (config-if)#authentication ppp chap fallback ppp

    B

    (config-if)#authentication ppp chap pap

    C

    (config-if)#ppp authentication  chap pap

    D

    (config-if)#ppp authentication  chap fallback ppp


    正确答案: C
    解析: 暂无解析