When you enter router passwords during the setup dialog what
is the difference between enable and the enable secret
passwords?
A. The enable password is encrypted
B. The enable secret password uses IPSec password authentication
C. The enable secret password cannot be seen as clear text
when viewing the configuration
D. The enable secret password acts as a backup in case the
enable password is compromised
Answers were Sorted based on User's Feedback
Answer / bharghava srinivas
Ans: C
Reason: In the Router When We Give "Enable Password" Then
The password is visible,and when We Give "Enable Secret
Password" The Password We are not able to see the Password
Bcoz it is in a encrypted form.
For Example:When we give password as "Bharghava" then, it
will show as "Ab0182h@q"
Is This Answer Correct ? | 2 Yes | 0 No |
Answer / surya
when we give the command as "enable secret
password"password will be encrypted and The enable secret
password cannot be seen as clear text when viewing the
configuration.
Is This Answer Correct ? | 2 Yes | 0 No |
Answer / s.m.feroz ahmed
Hi,
The answer for this query is A and C .
Is This Answer Correct ? | 0 Yes | 0 No |
Answer / s.m.feroz ahmed
Hi,
The answer for this query is A and C .
Is This Answer Correct ? | 0 Yes | 0 No |
what is burst rate
What must you do to test connectivity on a dial on demand routing (DDR) link? A. increase the idle Import parameter B. send interesting traffic across the link C. reboot one of the integrated services digital network (ISDN) routers D. reset the DDR integrated services digital network (ISDN) router statistics to zero
Put the following steps of encapsulation into the correct order: 1) The data is broken into segments to be organized 2) Frames are converted to 1s and 0s to be put on the wire 3) Packets are converted into frames 4) Information that users enter is converted into data 5) The segments are changed to packets to be routed A.) 4, 1, 3, 2, 5 B.) 4, 5, 1, 3, 2 C.) 2, 3, 1, 4, 5 D.) 4, 1, 5, 3, 2
Which layer allows multiple Ethernet devices to uniquely identify one another on the Datalink layer? A.) Transport B.) Session C.) Network D.) Datalink - MAC Sublayer E.) Datalink - LLC Sublayer
Identify 3 feature of access-lists? A.) Implicit deny will deny any packets not matched B.) Processed sequentially from bottom to top C.) Processed sequentially from top to bottom D.) If a packet is denied it would be tested against the remaining statements in the access-list E.) Once a match is made the packet is either denied or permitted F.) Enabled on all interfaces by default
When you mistakenly type the wrong command at the Router# prompt the router does a DNS lookup which takes about 20 seconds. Which command can you enter to prevent the router doing this in future?
What are the different types of passwords that you can use in cisco routers?
Identify the command to determine if CDP is enabled? A.) show enable cdp B.) show cdp enabled C.) show cdp run D.) show cdp
what is stp.
What is the difference between static ip addressing and dynamic ip addressing?
In regards to the ISDN BRI standard, which channel is used for control? A.) B B.) D C.) E D.) I E.) Q
What ISDN protocol specifies concepts, terminology, and services? A.) Q B.) S C.) I D.) E