
Cyoer
Authored by vor53637@xcoxc.com vor53637@xcoxc.com
Education
1st Grade
Used 4+ times

AI Actions
Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...
Content View
Student View
44 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Authentication, .................. , and confidentiality are the three objectives of secure communications.
Integrity
communications
2.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
which attack occurs when an attacker targets a virtual machine (VM) hypervisor and then uses that VM to launch an attack on other data center devices.
Hyperjacking
Man in the meddile
3.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
which part of nfp uses ssh
management plane
Worm
Echo
4.
MULTIPLE SELECT QUESTION
45 sec • 1 pt
one of an asymmetric encryption algorithm is
RSA
DH
DSS
DSA
Elgamal
5.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
why HMAC uses an additional secret key as input to the hash function ?
to provide authentication
for private key
6.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
there is no different method lists can be applied to different interfaces and lines using the aaa authentication login
True
False
7.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What is a difference between RADIUS and TACACS+?
A. RADIUS is most appropriate for dial authentication, but TACACS+ can be used for multiple types of authentication
B. TACACS+ encrypts only password information and RADIUS encrypts the entire payload
C. TACACS+ separates authentication and authorization, and RADIUS merges them
D. RADIUS logs all commands that are entered by the administrator, but TACACS+ logs only start, stop, and interim commands
Access all questions and much more by creating a free account
Create resources
Host any resource
Get auto-graded reports

Continue with Google

Continue with Email

Continue with Classlink

Continue with Clever
or continue with

Microsoft
%20(1).png)
Apple
Others
Already have an account?