1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Naily [24]
3 years ago
10

A Network Management Station (NMS) is using SNMP to manage some Cisco routers and switches with SNMPv2c. Which of the following

answers most accurately describes how the SNMP agent on a router authenticates any SNMP Get requests received from the NMS?a. Using a username and hashed version of a password
b. Using either the read-write or read-only community string
c. Using only the read-write community string
d. Using only the read-only community string
Computers and Technology
2 answers:
Rom4ik [11]3 years ago
7 0

Answer:

b. Using either the read-write or read-only community string.

Explanation:

The SNMP agent on a router authenticates any SNMP Get requests received from the NMS using either the read-write or read-only community string.

In the SNMPv2c, if the NMS sends either the read-write or read-only community string requests, SNMP Get requests will be allowed.

iren2701 [21]3 years ago
4 0

Answer:

A. Using a username and hashed version of password

Explanation:

SNMP v2 allows password hashing with MD5, unlike the early versions SNMP v1 which sends passwords in clear-text over the network which allows packet sniffing to read the password, but the password hashing has to be configure n SNMP v2.

Therefore using a username and hashed version of a password would be most accurately describes how the SNMP agent on a router authenticates any SNMP Get requests received from the NMS.

You might be interested in
What is another name for mesolithic age
Romashka-Z-Leto [24]
In archaeology, mesolithic is culture between paleolithic and neolithic. The term "Epipaleolithic" is often used for areas outside northern Europe, but was also the preferred synonym used by French archaeologists until the 1960s.
7 0
3 years ago
Read 2 more answers
Desertification is caused by
Alex Ar [27]
<span>it is caused by A.overgrazing
</span>
5 0
3 years ago
Can an engine run on air? I think it can, but I am not sure
Svetlanka [38]

Hello,

NO, and engine can run on steam, gas and other things but not air.

-Bella

3 0
3 years ago
Read 2 more answers
Bestie give me some r username ideas​
Anna71 [15]

Answer:

magic school bus dropout

5 0
3 years ago
Read 2 more answers
External network security threats can include management failure to support organization-wide security awareness, inadequate sec
stiks02 [169]

Answer:

B. False

Explanation:

External security threat can be defined as any threats coming outside the company's computer network operation, usually carried out with negative or hostile intent for the purpose of stealing information or distracting the flow of operation. For example, Virus Attack

However, given that the question talked about the "management failure to support organization-wide security awareness, inadequate security policies, and unenforced security procedures."

Hence, this is not an External Security Threat, which means, the correct answer is FALSE.

5 0
3 years ago
Other questions:
  • Yesterday Hunter's laptop screen appeared to go black. The laptop was still running, but he could not see the desktop or any gra
    9·1 answer
  • 9. Name at least two types of hard drives?
    6·1 answer
  • What kind of voltage do solar cells generate? Solar cells produce ______ voltage which is not usable by most household appliance
    15·1 answer
  • An administrator has noticed that GPO containing new update settings has not yet applied to one of the computers on the network.
    5·1 answer
  • Another html/css assignment, drop css code below, thank you
    15·1 answer
  • All web page urls begin with the letters ____.
    6·1 answer
  • You are creating a presentation and you have come to the last slide. You still have more information to add. What should you do?
    7·1 answer
  • Add me on f0rtnite <br> (Tsarbacon)
    9·2 answers
  • Which of the following is an example of group dynamics?
    8·1 answer
  • How many pages is 1500 words double spaced 12 font?.
    10·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!