多选题Which three steps are part of the PPP CHAP 3-way handshake?()AThe caller sends a challenge to the authenticator.BThe authenticator sends a challenge to the caller.CThe caller encrypts the challenge using a secret.DThe caller sends a success message to

题目
多选题
Which three steps are part of the PPP CHAP 3-way handshake?()
A

The caller sends a challenge to the authenticator.

B

The authenticator sends a challenge to the caller.

C

The caller encrypts the challenge using a secret.

D

The caller sends a success message to the authenticator.

E

The authenticator encrypts the challenge using a secret.


相似考题
参考答案和解析
正确答案: C,B
解析: 暂无解析
更多“多选题Which three steps are part of the PPP CHAP 3-way handshake?()AThe caller sends a challenge to the authenticator.BThe authenticator sends a challenge to the caller.CThe caller encrypts the challenge using a secret.DThe caller sends a success message to ”相关问题
  • 第1题:

    If a technician is getting frustrated during a support call, which of the following could the technician employ to avoid irritating the customer?()

    • A、End the call quickly, even if a solution has not been found.
    • B、Ask the caller to call back in a while.
    • C、Put the caller on hold briefly and take a deep breath.
    • D、Pass the caller to another support representative.

    正确答案:C

  • 第2题:

    What are the three OSPF authentication methods supported on the ERX Edge Router?()

    • A、 null password
    • B、 simple password
    • C、 message digest 5
    • D、 Password Authentication Protocol
    • E、 Challenge Handshake Authentication Protocol

    正确答案:A,B,C

  • 第3题:

    CHAP验证协议有哪几种数据报文类型().

    • A、Challenge报文
    • B、Request报文
    • C、Response报文
    • D、Success报文
    • E、Failure报文

    正确答案:A,C,D,E

  • 第4题:

    Which statement is true about a Smurf attack?()

    • A、It sends ping requests in segments of an invalid size
    • B、It intercepts the third step in a TCP three-way handshake to hijack a session
    • C、It sends ping requests to a subnet, requesting that devices on that subnet send ping replies to a targetsystem
    • D、It uses Trojan horse applications to create a distributed collection of "zombie" computers, which can beused to launch a coordinated DDoS attack

    正确答案:C

  • 第5题:

    Which process occurs first during the Ethernet Discovery Stage process for a PPPoE service offering?()

    • A、The ERX router sends an Active Discovery Off ermessage.
    • B、The ERX router sendsan Active Discovery Initiation message.
    • C、The customer device sends an Active Discovery Offer message.
    • D、The customer device sends an Active Discovery Initiation message.

    正确答案:D

  • 第6题:

    Which action does a BGP speaker take when it detects that the reset state bit is set in an openmessage?()

    • A、It tears down the BGP session.
    • B、It sends a restart message to the peer.
    • C、It marks all routes from that peer as stale.
    • D、It sends a BGP refresh message to the peer

    正确答案:C

  • 第7题:

    Your network contains one Active Directory domain. You have a member server named Server1 that runs Windows Server 2008. The server has the Routing and Remote Acecss role service installed. You implement Network Access Protection (NAP) for the domain. You need to configure the Point-to-Point (PPP) authentication method on Server1. Which autnetication method should you choose?()

    • A、Challenge Handshake Authentication Protocol (CHAP)
    • B、Extensible Authentication Protocol (EAP)
    • C、Microsoft Challenge Handshake Authentication Protocol version 2 (MS-CHAP v2)
    • D、Password Authentication Protocol (PAP)

    正确答案:B

  • 第8题:

    多选题
    Which three steps are part of the PPP CHAP 3-way handshake?()
    A

    The caller sends a challenge to the authenticator.

    B

    The authenticator sends a challenge to the caller.

    C

    The caller encrypts the challenge using a secret.

    D

    The caller sends a success message to the authenticator.

    E

    The authenticator encrypts the challenge using a secret.


    正确答案: D,B
    解析: 暂无解析

  • 第9题:

    多选题
    Cisco IOS IPS sends IPS alert messages using which two protocols? ()
    A

    SDEE

    B

    LDAP

    C

    SYSLOG

    D

    FTP

    E

    SNMP

    F

    SMTP


    正确答案: A,B
    解析: 暂无解析

  • 第10题:

    单选题
    Your network contains one Active Directory domain. You have a member server named Server1 that runs Windows Server 2008. The server has the Routing and Remote Acecss role service installed. You implement Network Access Protection (NAP) for the domain. You need to configure the Point-to-Point (PPP) authentication method on Server1. Which autnetication method should you choose?()
    A

    Challenge Handshake Authentication Protocol (CHAP)

    B

    Extensible Authentication Protocol (EAP)

    C

    Microsoft Challenge Handshake Authentication Protocol version 2 (MS-CHAP v2)

    D

    Password Authentication Protocol (PAP)


    正确答案: B
    解析: 暂无解析

  • 第11题:

    单选题
    Which process occurs first during the Ethernet Discovery Stage process for a PPPoE service offering?()
    A

    The ERX router sends an Active Discovery Offer message.

    B

    The ERX router sends an Active Discovery Initiation message.

    C

    The customer device sends an Active Discovery Offer message.

    D

    The customer device sends an Active Discovery Initiation message


    正确答案: D
    解析: 暂无解析

  • 第12题:

    单选题
    Which of the following are not steps in setting up aTLS session? ()
    A

     Client sends Hello to Server listing all of its supported cipher suites

    B

     Server sends Hello to Client listing all of its supported cipher suites

    C

     Client calculates and sends encryptedpre_master_secret

    D

     Client and Server calculate keys from pre_master_secret

    E

     Server sends Change Cipher Spec to indicate a shift to encrypted mode


    正确答案: C
    解析: 暂无解析

  • 第13题:

    Which IS-IS authentication method is supported on the ERX Edge Router?()

    • A、simple password
    • B、HMAC message digest 5
    • C、Password Authentication Protocol
    • D、Challenge Handshake Authentication Protocol

    正确答案:B

  • 第14题:

    IPSec中定义密钥交换的协议是()。

    • A、IKE(internet key exhcnage)
    • B、PAP(password authentication protocol)
    • C、CHAP(challenge handshake authentication protocol)
    • D、ESP(encapsulation seurity payload)

    正确答案:A

  • 第15题:

    Cisco IOS IPS sends IPS alert messages using which two protocols? ()

    • A、 SDEE
    • B、 LDAP
    • C、 SYSLOG
    • D、 FTP
    • E、 SNMP
    • F、 SMTP

    正确答案:A,C

  • 第16题:

    Which of the following are not steps in setting up aTLS session? ()

    • A、 Client sends Hello to Server listing all of its supported cipher suites
    • B、 Server sends Hello to Client listing all of its supported cipher suites
    • C、 Client calculates and sends encryptedpre_master_secret
    • D、 Client and Server calculate keys from pre_master_secret
    • E、 Server sends Change Cipher Spec to indicate a shift to encrypted mode

    正确答案:B

  • 第17题:

    Which process occurs first during the Ethernet Discovery Stage process for a PPPoE service offering?()

    • A、The ERX router sends an Active Discovery Offer message.
    • B、The ERX router sends an Active Discovery Initiation message.
    • C、The customer device sends an Active Discovery Offer message.
    • D、The customer device sends an Active Discovery Initiation message

    正确答案:D

  • 第18题:

    Which three steps are part of the PPP CHAP 3-way handshake?()

    • A、The caller sends a challenge to the authenticator.
    • B、The authenticator sends a challenge to the caller.
    • C、The caller encrypts the challenge using a secret.
    • D、The caller sends a success message to the authenticator.
    • E、The authenticator encrypts the challenge using a secret.

    正确答案:B,C,E

  • 第19题:

    Your network contains one Active Directory domain. You have a member server named Server1 that runs Windows Server 2008 R2. The server has the Routing and Remote Access Services role service installed.You implement Network Access Protection (NAP) for the domain.You need to configure the Point-to-Point Protocol (PPP) authentication method on Server1. Which authentication method should you use?()

    • A、Challenge Handshake Authentication Protocol (CHAP)
    • B、Extensible Authentication Protocol (EAP)
    • C、Microsoft Challenge Handshake Authentication Protocol version 2 (MS-CHAP v2)
    • D、Password Authentication Protocol (PAP)

    正确答案:B

  • 第20题:

    多选题
    Which two statements are correct when you use the reject parameter as the next-hop value for a static route?()
    A

    The packet is dropped and the packet's source is marked with the no-readvertise parameter.

    B

    The system sends the packet back to the source.

    C

    The packet is dropped from the network.

    D

    The system sends an ICMP message back to the source of the packet.


    正确答案: A,B
    解析: 暂无解析

  • 第21题:

    单选题
    Which action does a BGP speaker take when it detects that the reset state bit is set in an openmessage?()
    A

    It tears down the BGP session.

    B

    It sends a restart message to the peer.

    C

    It marks all routes from that peer as stale.

    D

    It sends a BGP refresh message to the peer


    正确答案: A
    解析: 暂无解析

  • 第22题:

    单选题
    Which process occurs first during the Ethernet Discovery Stage process for a PPPoE service offering?()
    A

    The ERX router sends an Active Discovery Off ermessage.

    B

    The ERX router sendsan Active Discovery Initiation message.

    C

    The customer device sends an Active Discovery Offer message.

    D

    The customer device sends an Active Discovery Initiation message.


    正确答案: D
    解析: 暂无解析

  • 第23题:

    单选题
    Which statement is true about a Smurf attack?()
    A

    It sends ping requests in segments of an invalid size

    B

    It intercepts the third step in a TCP three-way handshake to hijack a session

    C

    It sends ping requests to a subnet, requesting that devices on that subnet send ping replies to a targetsystem

    D

    It uses Trojan horse applications to create a distributed collection of zombie computers, which can beused to launch a coordinated DDoS attack


    正确答案: D
    解析: 暂无解析

  • 第24题:

    多选题
    Which three of these statements about the IP service level agreement (SLA) sender are true? ()
    A

    SLA sender target can be an IP host

    B

    SLA sender sends a probe packet and a response probe packet

    C

    SLA sender sends a probe packet

    D

    SLA sender target must be a router

    E

    SLA sender target can be an IP SLA responder


    正确答案: B,C
    解析: 暂无解析