Security Flashcards
1
Q
DHCP Snooping Rules
A
2
Q
DHCP snooping Configuration Summary
A
3
Q
How do you configure Extended ACLs
A
4
Q
what are the commands for enable secret in MD5 and SHA-256
A
5
Q
Type of encryption authentication exchange that proceeds as follows: 1) The authenticator (the server) sends a Request to authenticate the peer (the client). 2) The peer sends a Response packet in reply to a valid Request. 3) The authenticator sends an additional Request packet, and the peer replies with a Response.
A
EAP (Extensible Authentication protocol)
for more info: https://www.techtarget.com/searchsecurity/definition/Extensible-Authentication-Protocol-EAP