1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Elis [28]
4 years ago
15

In the output at the command line from a router that reads - ip ospf message-digest-key 1 md5 CISCO-123 - what does the CISCO-12

3 portion of the command do? (Points : 2) It is used to name the OSPFv2 process.
It is used as a password.
It is used to choose the type of authentication.
It is used as the key index.
Computers and Technology
1 answer:
11111nata11111 [884]4 years ago
7 0

Answer: a) it is used as a password.

Explanation:

In order to be able to exchange routing information , CISCO routers use an authentication process, so when they send a message (a HELLO message for instance) the router that receives the message confirms that the message is authentic.

There are several types of authentication in OSPF, null, plain  and MD5.

The difference between them is as follows:

1) null, implies that no password is included in the packet header, it's the default mode.

2) plain: In this type of authentication, the password is sent transparently from a router to his neighbor, as a plain text which makes it vulnerable to attacks from packet inspection software, like Sniffer.

3) MD5, is a more secure mode, in which the password is not sent directly, but a hash built based on the packet contents and the password itself instead.

MD5 (Message Digest 5) is the name of the algoritm used to build the hash that receiver will compare with the sent by the sender in order to confirm authentication.

The chosen password, is placed at the end of the command, after the type of authentication (MD5 in this case), which in this case is "CISCO-123".  

You might be interested in
Write an expression in Boolean algebra that evaluates to 1 when an odd number of bits of the number is 1 and 0 otherwise
Leokris [45]

α∨1=1 is an example of boolean algebra with result equal to 1.

<h3>What is boolean algebra?</h3>

Are algebraic structures that "capture the essential properties" of logical and set operators, or provide a structure for dealing with "statements".

With this information, we can conclude that The purpose of Boolean algebra is to describe signal processing, in the form of an algebraic expression.

Learn more about Boolean algebra in brainly.com/question/2467366

3 0
3 years ago
6. You should check your tire pressure
tatyana61 [14]
Answer

Once every week

3 0
3 years ago
The part of the computer that contains the brain, or the central processing unit, also knows as the
Kamila [148]
What other name are you looking for? or pleases rephrase the question, You already have the answer in your question.




The part of the computer that contains the brain is the CPU, or Motherboard, Microprocessor. if that's what you're asking. I don't know another word for the brain of the computer.




Hope that helps!!!
7 0
3 years ago
What tag works as a dictionary between text &amp; computer bytes?
Lynna [10]

Answer:

Here is some python code

Explanation

5 0
3 years ago
List 4 activities that might be included as part of a dependable software engineering process. Which of these do you think are m
Bogdan [553]

Answer:

  • Requirement Management
  • Requirement Reviews
  • Requirement Specification
  • System Modeling

Explanation:

Requirement Management  and specification are most suitable for agile project.

7 0
3 years ago
Other questions:
  • Which of the following best describes the protocols used on the Internet?
    9·1 answer
  • Answer these two if u can❤️
    5·2 answers
  • if you wanted to predict the value of the y variable when the x variable is 15, you would be _____ the data. correlating extrapo
    14·2 answers
  • Who said "BAM WHAT?!" On disney channel?
    5·2 answers
  • Which of the following best describes the protocol used on the internet?
    8·1 answer
  • There are built-in Styles to format your document and make changes to your document with just one click of a button.
    5·2 answers
  • How does Accenture help companies harness the power of data to achieve optimal business outcomes?
    9·2 answers
  • What is the result when you run the following program?
    9·2 answers
  • A penetration tester is experimenting with Network Mapper (Nmap) on a test network as a privileged user. The tester would like t
    11·1 answer
  • Consider the following recursive method. public static string recur(int val) { string dig = "" + (val % 3); if (val / 3 &gt; 0)
    10·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!