The command enable algorithm-type scrypt secret password enables which of the following configurations?

A) SHA-256
B) MD5
C) Type 5
D) Type 9


A, D
Explanation: A) The scrypt algorithm uses SHA-256, which is coded as type setting 9 in IOS. MD5 is type setting 5.
D) The scrypt algorithm uses SHA-256, which is coded as type setting 9 in IOS. MD5 is type setting 5.

Computer Science & Information Technology

You might also like to view...

What two types of assessment methods are employed with the CMM model?

A. Software capability evaluation (SCE) and software process assessment (SPA) B. Software configuration evaluation (SCE) and software model assessment (SMA) C. Software control evaluation (SCE) and software maturity assessment (SMA) D. Software capability evaluation (SCE) and software model assessment (SMA)

Computer Science & Information Technology

____ refers to the physical dimensions of the image.

A. File size B. Image size C. Image raster D. Image width

Computer Science & Information Technology

If the base class has a public access and the derived class access specifier is public, the derived class member is ____.

A. public B. private C. blocked D. protected

Computer Science & Information Technology

Ethical hacking does not always require the explicit permission of the owner of the target.

a. true b. false

Computer Science & Information Technology