Ccna ® Certification Practice Tests Jon Buhagiar



Download 10,86 Mb.
Pdf ko'rish
bet42/54
Sana24.09.2021
Hajmi10,86 Mb.
#183233
1   ...   38   39   40   41   42   43   44   45   ...   54
Bog'liq
CCNA Certification Practice Tests Exam 200-301 2020

Password20! contains a special character, but this is

encouraged to promote better security. The password



Password20! is not too long. The maximum length is 64

characters, which can differ from version to version of IOS.

29. C.  The command 

password Password20!

 will set the login

password to Password20

!

. The sub-command 



login

 will require

login for the line. The commands 

set password Password20!

 and

request login



 are incorrect. The commands of 

password


Password20!

 and 


login password

 are incorrect. The command

login password Password20!

 is incorrect.

30. C.  The VTY line login password is not set when you receive the

error 


Password required, but none set

. If the enable secret or

enable password was not set, you would just not be able to get to

a privileged exec prompt, but you would still be able to get to a




user exec prompt. A VTY line cannot be administratively shut

down.


31. B.  The hostname and domain name are required before you

attempt to generate the encryption keys for SSH. Setting the

time and date is recommended but not required for generating

the encryption keys for SSH on a router or switch. Setting the

key strength is also recommended but not required. The key

strength should be set over 768 bits so that SSH version 2 can be

used. The key repository does not need to be set; it normally

defaults to NVRAM on routers and switches and differs from

platform to platform.

32. A.  The command 

ip ssh version 2

 will set your SSH version to

2. This command is to be entered at a global configuration

prompt. The command 

version 2

 is incorrect, regardless of

where it is configured. The command 

ssh version 2

 must be

preceded with the 

ip

 command.



33. C.  The command 

transport ssh telnet

 will configure the VTY

line to accept SSH as a login protocol and fallback to Telnet. The

command 

login ssh telnet

 is incorrect regardless of where it is

configured. The command 

transport ssh telnet

 is incorrect

when it is configured from a global configuration prompt.

34. D.  SSH is encrypted and Telnet is in clear text. To keep

passwords and configuration safe, SSH should always be used.

Telnet contains no encryption whatsoever, and all usernames,

passwords, and commands are sent in clear text. SSH allows for

file copy if it is turned on in the IOS, but it is not a main reason

to replace Telnet. Telnet and SSH make it equally easy to create

ACLs for access.

35. C.  You must first create an access list to permit the host that will

manage the router or switch with the command 

access-list 1

permit host 192.168.1.5

. Then enter the VTY line in which it

will be applied with the command 

line vty 0 5

. Then apply it

with the command 

ip access-class 1 in

, which differs from the

command 


ip access-group

, which is used on interfaces. All of

the other options are incorrect.



36. B.  When you’re configuring a switch or router for SSH version

2, the key strength must be at least 768 bits for the modulus.

The default is normally 512 bits, and it is standard practice to

double the number to 1024 bits. The time and date do not

necessarily need to be correct to enable SSH version 2. The DNS

server does not need to be configured to enable SSH version 2.

DNS and host records are used strictly for connectivity and will

not affect enabling SSH version 2.

37. A.  The command 

username user1 password Password20!

 will

create a user account called user1 with a password of




Download 10,86 Mb.

Do'stlaringiz bilan baham:
1   ...   38   39   40   41   42   43   44   45   ...   54




Ma'lumotlar bazasi mualliflik huquqi bilan himoyalangan ©hozir.org 2024
ma'muriyatiga murojaat qiling

kiriting | ro'yxatdan o'tish
    Bosh sahifa
юртда тантана
Боғда битган
Бугун юртда
Эшитганлар жилманглар
Эшитмадим деманглар
битган бодомлар
Yangiariq tumani
qitish marakazi
Raqamli texnologiyalar
ilishida muhokamadan
tasdiqqa tavsiya
tavsiya etilgan
iqtisodiyot kafedrasi
steiermarkischen landesregierung
asarlaringizni yuboring
o'zingizning asarlaringizni
Iltimos faqat
faqat o'zingizning
steierm rkischen
landesregierung fachabteilung
rkischen landesregierung
hamshira loyihasi
loyihasi mavsum
faolyatining oqibatlari
asosiy adabiyotlar
fakulteti ahborot
ahborot havfsizligi
havfsizligi kafedrasi
fanidan bo’yicha
fakulteti iqtisodiyot
boshqaruv fakulteti
chiqarishda boshqaruv
ishlab chiqarishda
iqtisodiyot fakultet
multiservis tarmoqlari
fanidan asosiy
Uzbek fanidan
mavzulari potok
asosidagi multiservis
'aliyyil a'ziym
billahil 'aliyyil
illaa billahil
quvvata illaa
falah' deganida
Kompyuter savodxonligi
bo’yicha mustaqil
'alal falah'
Hayya 'alal
'alas soloh
Hayya 'alas
mavsum boyicha


yuklab olish