When you enter router passwords during the setup dialog what
is the difference between enable and the enable secret
passwords?
A. The enable password is encrypted
B. The enable secret password uses IPSec password authentication
C. The enable secret password cannot be seen as clear text
when viewing the configuration
D. The enable secret password acts as a backup in case the
enable password is compromised
Answers were Sorted based on User's Feedback
Answer / bharghava srinivas
Ans: C
Reason: In the Router When We Give "Enable Password" Then
The password is visible,and when We Give "Enable Secret
Password" The Password We are not able to see the Password
Bcoz it is in a encrypted form.
For Example:When we give password as "Bharghava" then, it
will show as "Ab0182h@q"
Is This Answer Correct ? | 2 Yes | 0 No |
Answer / surya
when we give the command as "enable secret
password"password will be encrypted and The enable secret
password cannot be seen as clear text when viewing the
configuration.
Is This Answer Correct ? | 2 Yes | 0 No |
Answer / s.m.feroz ahmed
Hi,
The answer for this query is A and C .
Is This Answer Correct ? | 0 Yes | 0 No |
Answer / s.m.feroz ahmed
Hi,
The answer for this query is A and C .
Is This Answer Correct ? | 0 Yes | 0 No |
what is the difference between osi and tcp ?
what is internetworking.
Why would you use static routing instead of dynamic routing? A.) When you want automatic updates of the routing tables B.) All the time C.) When you have very few routes and want to conserve bandwidth D.) When you have a gateway of last resort
What does a router change in a packet when it forwards a packet to the next hop? * A: Destination physical address * B: Destination network address * C: Destination network address and the destination physical address
What is the command to copy the IOS image to a TFTP server? A.) copy flash tftp B.) copy running-config tftp C.) copy ios tftp D.) copy startup-config tftp
What are characteristics of UDP A. It is reliable and acknowledged B. It is unreliable and acknowledged C. It is reliable and unacknowledged D. It is unreliable and unacknowledged
Given the command 'cl?', what will it display? A.) Syntax of the 'clock' command B.) Syntax of the 'clear' command C.) All commands that begin with 'cl' D.) All commands that begin with 'c'
Identify 3 features of IGRP? A.) Composite metric B.) New horizon C.) Flash updates D.) 60 periodic updates E.) Poison reverse
LMI operates between the Frame Switch and what other device? A.) CPE device B.) Another Frame Switch C.) X.25 switch D.) Novell File Server
hi friends i have some problem regarding technical round ahr round plz tell me what should the right answer technical questions 1 what is brouter 2 what is the menaing of 10 base2, 10 base 5 and 10baset 3 what is diffrence between bit rate and baud rate. and this question was tooooooooooo much difficult to me that hr said to me that rank me after the taking the all short of interview
what is uplink port why are we use this port,this port having extra feature or only use to redundant link or other please explain it ,,,,,,,,,,,,,,,, bcz i am very confuse ..... Thanks
What are the two most common transport layer protocols? UDP TCP IPX ARP