Distinguish between security in SNMP V1 and security in SNMP V2

A. SNMP v1 and v2 have strong security.
B. SNMP v1 and v2 had no security at all.
C. SNMP v1 had no security at all. SNMP v2 introduces community strings in which a shared secret between manager and managed devices was used to authenticate messages.
D. SNMP v2 had no security at all. SNMP v1 introduces community strings in which a shared secret between manager and managed devices was used to authenticate messages.


C. SNMP v1 had no security at all. SNMP v2 introduces community strings in which a shared secret between manager and managed devices was used to authenticate messages.

Computer Science & Information Technology

You might also like to view...

Consider a relation s over the attributes A and B with the following characteristics:

• 5,000 tuples with 10 tuples per page • A 2-level B+ tree index on attribute A with up to 100 index entries per page • Attribute A is a candidate key of s The values that the attribute A takes in relation s are uniformly distributed in the range 1 to 100,000. (a) Assuming that the aforesaid index on A is unclustered, estimate the number of disk accesses needed to compute the range query ?A>1000 ? A<6000(s). (b) What would be the cost if the above index were clustered?

Computer Science & Information Technology

A(n) ____________________ image is created with mathematical calculations and can be enlarged without a loss of quality.

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology

?Identify a method that tests whether the condition returned by thecallbackfunction holds for all items in anarray.

A. ?array.every(callback [, thisArg]) B. ?array.filter(callback [, thisArg]) C. ?array.some(callback [, thisArg]) D. ?array.find(callback [, thisArg])

Computer Science & Information Technology

Typically the systems in the _________ require or foster external connectivity such as a corporate Web site, an e-mail server, or a DNS server.

A. DMZ B. IP protocol field C. boundary firewall D. VPN

Computer Science & Information Technology