Which three steps are part of the PPP CHAP 3-way handshake?()
第1题:
If the Call Redirect step sends a caller to a device that does not exist in the CallManager, which branch of the step is executed? ()
第2题:
A person calls in asking for the name of the vendor that the technician uses for the organizations firewall hardware. Which of the following is the BEST action for the technician to take?()
第3题:
What are the three OSPF authentication methods supported on the ERX Edge Router?()
第4题:
CHAP验证协议有哪几种数据报文类型().
第5题:
Which statement is true about a Smurf attack?()
第6题:
Which process occurs first during the Ethernet Discovery Stage process for a PPPoE service offering?()
第7题:
Which action does a BGP speaker take when it detects that the reset state bit is set in an openmessage?()
第8题:
Your network contains one Active Directory domain. You have a member server named Server1 that runs Windows Server 2008 R2. The server has the Routing and Remote Access Services role service installed.You implement Network Access Protection (NAP) for the domain.You need to configure the Point-to-Point Protocol (PPP) authentication method on Server1. Which authentication method should you use?()
第9题:
SDEE
LDAP
SYSLOG
FTP
SNMP
SMTP
第10题:
Challenge Handshake Authentication Protocol (CHAP)
Extensible Authentication Protocol (EAP)
Microsoft Challenge Handshake Authentication Protocol version 2 (MS-CHAP v2)
Password Authentication Protocol (PAP)
第11题:
The ERX router sends an Active Discovery Offer message.
The ERX router sends an Active Discovery Initiation message.
The customer device sends an Active Discovery Offer message.
The customer device sends an Active Discovery Initiation message
第12题:
Client sends Hello to Server listing all of its supported cipher suites
Server sends Hello to Client listing all of its supported cipher suites
Client calculates and sends encryptedpre_master_secret
Client and Server calculate keys from pre_master_secret
Server sends Change Cipher Spec to indicate a shift to encrypted mode
第13题:
If a technician is getting frustrated during a support call, which of the following could the technician employ to avoid irritating the customer?()
第14题:
Which IS-IS authentication method is supported on the ERX Edge Router?()
第15题:
IPSec中定义密钥交换的协议是()。
第16题:
Cisco IOS IPS sends IPS alert messages using which two protocols? ()
第17题:
Which of the following are not steps in setting up aTLS session? ()
第18题:
Which process occurs first during the Ethernet Discovery Stage process for a PPPoE service offering?()
第19题:
Your network contains one Active Directory domain. You have a member server named Server1 that runs Windows Server 2008. The server has the Routing and Remote Acecss role service installed. You implement Network Access Protection (NAP) for the domain. You need to configure the Point-to-Point (PPP) authentication method on Server1. Which autnetication method should you choose?()
第20题:
The caller sends a challenge to the authenticator.
The authenticator sends a challenge to the caller.
The caller encrypts the challenge using a secret.
The caller sends a success message to the authenticator.
The authenticator encrypts the challenge using a secret.
第21题:
It tears down the BGP session.
It sends a restart message to the peer.
It marks all routes from that peer as stale.
It sends a BGP refresh message to the peer
第22题:
The ERX router sends an Active Discovery Off ermessage.
The ERX router sendsan Active Discovery Initiation message.
The customer device sends an Active Discovery Offer message.
The customer device sends an Active Discovery Initiation message.
第23题:
It sends ping requests in segments of an invalid size
It intercepts the third step in a TCP three-way handshake to hijack a session
It sends ping requests to a subnet, requesting that devices on that subnet send ping replies to a targetsystem
It uses Trojan horse applications to create a distributed collection of zombie computers, which can beused to launch a coordinated DDoS attack