單項選擇題What should be enabled before any user views can be created during role-based CLI configuration ?()

A.aaa new-model command
B.secret password for the root user
C.usernames and passwords
D.multiple privilege levels


您可能感興趣的試卷

你可能感興趣的試題

1.多項選擇題Which three options are network evaluation techniques? ()

A.Performing end-user training on the use of antispyware software
B.Performing virus scans
C.Scanning a network for active IP addresses and open ports on those IP addresses
D.Using password-cracking utilities

3.單項選擇題Which is the main difference between host-based and network-based intrusion prevention?()

A.Host-based IPS can work in promiscuous mode or inline mode.
B.Network-based IPS can provide protection to desktops and servers without the need of installing specialized software on the end hosts and servers.
C.Network-based IPS is better suited for inspection of SSL and TLS encrypted data flows.
D.Host-based IPS deployment requires less planning than network-based IPS.

最新試題

A standard access control list has been configured on a router and applied to interface Serial 0 in anoutbound direction. No ACL is applied to Interface Serial 1 on the same router. What will happen whentraffic being filtered by the access list does not match the configured ACL statements for Serial 0?()

題型:單項選擇題

When using the Cisco SDM Quick Setup Siteto-Site VPN wizard, which three parameters do you configure?()

題型:多項選擇題

Which statement is true about a Smurf attack?()

題型:單項選擇題

If you click the Configure button along the top of Cisco SDM is graphical interface,which Tasks buttonpermits you to configure such features as SSH, NTP, SNMP, and syslog?()

題型:單項選擇題

Which type of MAC address is dynamically learned by a switch port and then added to the switch’s runningconfiguration?()

題型:單項選擇題

Please choose the correct description about Cisco Self-Defending Network characteristics.()

題型:單項選擇題

Which statement is correct regarding the aaa configurations based on the exhibit provided?()

題型:單項選擇題

During role-based CLI configuration, what must be enabled before any user views can be created?()

題型:單項選擇題

Which method is of gaining access to a system that bypasses normal security measures?()

題型:單項選擇題

Refer to the exhibit. Which statement is correct based on the show login command output shown?()

題型:單項選擇題