Cisco IDS-4230-FE - Intrusion Detection Sys Fast Ethernet Sensor Ficha Técnica Página 93

  • Descarregar
  • Adicionar aos meus manuais
  • Imprimir
  • Página
    / 123
  • Índice
  • MARCADORES
  • Avaliado. / 5. Com base em avaliações de clientes
Vista de página 92
642-531
D. keygen
E. puttygen
Answer: E
Explanation:
This document explains how to use the Key generator for PuTTY (PuTTYgen) to generate Secure Shell (SSH)
authorized keys and RSA authentication for use on Cisco Secure Intrusion Detection System (IDS). The
primary issue when you establish SSH authorized keys is that only the older RSA1 key format is acceptable.
This means that you need to tell your key generator to create an RSA1 key, and you must restrict the SSH client
to use the SSH1 protocol.
Cisco Courseware 12-6
QUESTION 217
Which of the following identify basic authentication methods for accessing a Sensor from IDS MC? (Choose all
that apply.)
A. User account passwords
B. SSL certificates
C. SSH public keys
D. Digital certificates with pre-shared keys
E. Digital certificates with Certificate Authority
Answer: A C
Explanation:
NoteSSH supports two forms of authentication: password and public key. If you have set up a public key
between IDSMC and the sensor, you can use that key by selecting the Use Existing SSH keys check box. If you
have not set up the key, or if you do not want to use it, leave the Use Existing SSH keys deselected, and
IDSMC will use SSH password authentication.
Reference:Cisco Courseware 12-3
Password (or Passphrase if using existing SSH keys)
QUESTION 218
Which of the following CLI commands will you advice the new Certkiller trainee technician to use in
orderto configure the IDS MC public key on the Sensor?
A. copy
B. putty
C. puttygen
D. ssh generate-key
E. ssh authorized-key
Answer: E
IDS course 4.0 page 12-8 sensor1(config)#ssh authorized-key 0 ....
Vista de página 92
1 2 ... 88 89 90 91 92 93 94 95 96 97 98 ... 122 123

Comentários a estes Manuais

Sem comentários