更多"Which two of these key fields are u"的相关试题:
[多项选择]Which two statements regarding symmetric key encryption are true?() (Choose two.)
A. The same key is used for encryption and decryption.
B. It is commonly used to create digital certificate signatures.
C. It uses two keys: one for encryption and a different key for decryption.
D. An attacker can decrypt data if the attacker captures the key used for encryption.
[多项选择]Which two statements regarding asymmetric key encryption are true?() (Choose two.)
A. The same key is used for encryption and decryption.
B. It is commonly used to create digital certificate signatures.
C. It uses two keys: one for encryption and a different key for decryption.
D. An attacker can decrypt data if the attacker captures the key used for encryption.
[多项选择]Which two commands are used during the password recovery process?()
A. clear system login
B. boot -s
C. recovery
D. delete system root-authentication
[多项选择]Which two values are used by Spanning Tree Protocol to elect a root bridge?()
A. amount of RAM
B. bridge priority
C. IOS version
D. IP address
E. MAC address
F. speed of the links
[多项选择]Which two commands may be used when configuring an IP address for a Gigabit Ethernet interface?()
A. set interfaces ge-0/0/0.0 address 10.1.1.1/24
B. set interfaces ge-0/0/0.0 family inet address 10.1.1.1/24
C. set interfaces ge-0/0/0 unit 0 family inet address 10.1.1.1/24
D. set interfaces ge-0/0/0 address 10.1.1.1/24
[多项选择]Which two link protocols are used to carry multiple VLANs over a single link?()
A. VTP
B. 802.1q
C. IGP
D. ISL
E. 802.3u
[多项选择]Which two methods of authentication are used by the Infranet Controller for IPSec enforcement?()
A. dial-up VPN
B. IKE authentication
C. XAuth authentication
D. shared IKE authentication
[多项选择]Which two signaling protocols could be used in VPLS to advertise site information between PEs? ()
A. IKE
B. BGP
C. RSVP
D. LDP
[多项选择]Which two methods are used to assign an IP address to a WX device? ()(Choose two.)
A. SSH
B. Telnet
C. WebView
D. device front panel
E. serial console (command-line interface)
[多项选择]Which two LSA types can be used to aggregate inter-area routes?()
A. Type 2
B. Type 3
C. Type 4
D. Type 5
E. Type 9
[多项选择]Which two methods are used to assign a route-distinguisher in a Kompella Layer 2 VPN?()
A. by assigning the RD under the routing-instances
B. by assigning the RD under protocols bgp
C. by assigning the RD under routing-options
D. by assing the RD under policy-options
[多项选择]Which two can be used to create and apply an export policy that advertises static routes to RIP neighbors?()
A. set protocols rip export demo
B. edit policy-options policy-statement demo set term 1 from protocol static set term 1 then accept
C. edit policy-options policy-statement demo set term 1 from protocol static
D. set policy-options policy-statement demo