1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Elis [28]
4 years ago
15

In the output at the command line from a router that reads - ip ospf message-digest-key 1 md5 CISCO-123 - what does the CISCO-12

3 portion of the command do? (Points : 2) It is used to name the OSPFv2 process.
It is used as a password.
It is used to choose the type of authentication.
It is used as the key index.
Computers and Technology
1 answer:
11111nata11111 [884]4 years ago
7 0

Answer: a) it is used as a password.

Explanation:

In order to be able to exchange routing information , CISCO routers use an authentication process, so when they send a message (a HELLO message for instance) the router that receives the message confirms that the message is authentic.

There are several types of authentication in OSPF, null, plain  and MD5.

The difference between them is as follows:

1) null, implies that no password is included in the packet header, it's the default mode.

2) plain: In this type of authentication, the password is sent transparently from a router to his neighbor, as a plain text which makes it vulnerable to attacks from packet inspection software, like Sniffer.

3) MD5, is a more secure mode, in which the password is not sent directly, but a hash built based on the packet contents and the password itself instead.

MD5 (Message Digest 5) is the name of the algoritm used to build the hash that receiver will compare with the sent by the sender in order to confirm authentication.

The chosen password, is placed at the end of the command, after the type of authentication (MD5 in this case), which in this case is "CISCO-123".  

You might be interested in
A computerized spreadsheet program is useful for
Vaselesa [24]
Its c storing and charting data from surveys
6 0
4 years ago
Read 2 more answers
If you delete a conversation many times with someone like this, will you stop receiving messages from them?
GREYUIT [131]

Answer: No

Explanation:

4 0
3 years ago
Im having trouble with PLC subject. How to make this ladder diagram?
ozzi
Did you try google? Probably it will help u
6 0
3 years ago
. ____________is/are the JSP ImplicitObject(s).sessionapplicationconfigAll of GivenNone of Given
Lynna [10]

Answer:

All of Given

Explanation:

JSP provides a number of implicit objects which are made available by the container and can be used directly in scriptlets. These objects include:

  • session
  • application
  • config
  • out
  • request
  • response
  • pageContext
  • page
  • exception

Example usage:

<% session.setAttribute("userid","demoid"); %>

<% application.getContextPath(); %>

<% out.println(config.getServletName()); %>

5 0
4 years ago
A(n) _____ measures the ability to juggle a variety of demands, as in a manager's job where the candidate is presented with simu
Tju [1.3M]

Answer: in-basket test

Explanation:

An in-basket test or an in-basket exercise is a test used by firms or governments in recruiting and promoting employees. During the test, job applicants receive some mails, telephone calls, documents and memos.

3 0
4 years ago
Other questions:
  • What is Gamekit Loa3's all questsions
    14·1 answer
  • If the value of the expression,
    13·1 answer
  • The system should enable the staff of each academic department to examine the courses offered by their department, add and remov
    14·1 answer
  • On the seventh day of the iteration, the team realizes that they will not complete 5 of the 13 stories. the product owner says s
    12·1 answer
  • Computer architecture:
    6·1 answer
  • A process is: An activity of a function that is performed for some specific business reason A single piece of data within a syst
    14·1 answer
  • Can someone help me with my homework?
    7·1 answer
  • What specific authentication method has no encryption for user credentials or data, and is not recommended for most applications
    14·1 answer
  • Who invented slide Rule and when?​
    7·2 answers
  • _______ are useful when you want the user to select one choice from several possible choices. Radio buttons Check boxes Buttons
    5·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!