The caller sends a challenge to the authenticator.
The authenticator sends a challenge to the caller.
The caller encrypts the challenge using a secret.
The caller sends a success message to the authenticator.
The authenticator encrypts the challenge using a secret.
第1题:
If a technician is getting frustrated during a support call, which of the following could the technician employ to avoid irritating the customer?()
第2题:
What are the three OSPF authentication methods supported on the ERX Edge Router?()
第3题:
CHAP验证协议有哪几种数据报文类型().
第4题:
Which statement is true about a Smurf attack?()
第5题:
Which process occurs first during the Ethernet Discovery Stage process for a PPPoE service offering?()
第6题:
Which action does a BGP speaker take when it detects that the reset state bit is set in an openmessage?()
第7题:
Your network contains one Active Directory domain. You have a member server named Server1 that runs Windows Server 2008. The server has the Routing and Remote Acecss role service installed. You implement Network Access Protection (NAP) for the domain. You need to configure the Point-to-Point (PPP) authentication method on Server1. Which autnetication method should you choose?()
第8题:
The caller sends a challenge to the authenticator.
The authenticator sends a challenge to the caller.
The caller encrypts the challenge using a secret.
The caller sends a success message to the authenticator.
The authenticator encrypts the challenge using a secret.
第9题:
SDEE
LDAP
SYSLOG
FTP
SNMP
SMTP
第10题:
Challenge Handshake Authentication Protocol (CHAP)
Extensible Authentication Protocol (EAP)
Microsoft Challenge Handshake Authentication Protocol version 2 (MS-CHAP v2)
Password Authentication Protocol (PAP)
第11题:
The ERX router sends an Active Discovery Offer message.
The ERX router sends an Active Discovery Initiation message.
The customer device sends an Active Discovery Offer message.
The customer device sends an Active Discovery Initiation message
第12题:
Client sends Hello to Server listing all of its supported cipher suites
Server sends Hello to Client listing all of its supported cipher suites
Client calculates and sends encryptedpre_master_secret
Client and Server calculate keys from pre_master_secret
Server sends Change Cipher Spec to indicate a shift to encrypted mode
第13题:
Which IS-IS authentication method is supported on the ERX Edge Router?()
第14题:
IPSec中定义密钥交换的协议是()。
第15题:
Cisco IOS IPS sends IPS alert messages using which two protocols? ()
第16题:
Which of the following are not steps in setting up aTLS session? ()
第17题:
Which process occurs first during the Ethernet Discovery Stage process for a PPPoE service offering?()
第18题:
Which three steps are part of the PPP CHAP 3-way handshake?()
第19题:
Your network contains one Active Directory domain. You have a member server named Server1 that runs Windows Server 2008 R2. The server has the Routing and Remote Access Services role service installed.You implement Network Access Protection (NAP) for the domain.You need to configure the Point-to-Point Protocol (PPP) authentication method on Server1. Which authentication method should you use?()
第20题:
The packet is dropped and the packet's source is marked with the no-readvertise parameter.
The system sends the packet back to the source.
The packet is dropped from the network.
The system sends an ICMP message back to the source of the packet.
第21题:
It tears down the BGP session.
It sends a restart message to the peer.
It marks all routes from that peer as stale.
It sends a BGP refresh message to the peer
第22题:
The ERX router sends an Active Discovery Off ermessage.
The ERX router sendsan Active Discovery Initiation message.
The customer device sends an Active Discovery Offer message.
The customer device sends an Active Discovery Initiation message.
第23题:
It sends ping requests in segments of an invalid size
It intercepts the third step in a TCP three-way handshake to hijack a session
It sends ping requests to a subnet, requesting that devices on that subnet send ping replies to a targetsystem
It uses Trojan horse applications to create a distributed collection of zombie computers, which can beused to launch a coordinated DDoS attack
第24题:
SLA sender target can be an IP host
SLA sender sends a probe packet and a response probe packet
SLA sender sends a probe packet
SLA sender target must be a router
SLA sender target can be an IP SLA responder