|[ LiB ]|
|Question 1|| |
Which command do you use to add a user 's public key to a sensor to enable RSA authentication?
Answer B is correct. The ssh authorized-key command allows the currently logged-on user to add his or her public key to the sensor. Answer A is incorrect because you use tls generate-key to create a new sensor certificate. Answer C is incorrect because the command does not exist. Answer D is incorrect because you use the ssh host-key command to add keys to the trusted host list.
|Question 2|| |
Which command helps you configure the sensor's IP address?
Answer C is correct. The interface command-control command navigates you to the interface configuration level. From there, you can execute the IP address command. Answers A and B are incorrect because these commands do not exist. Answer D is incorrect because the interface sensing command allows you to configure sensing interfaces. However, remember that sensing interfaces do not have IP addresses.
|Question 3|| |
If you want to replace the current running configuration with the backup configuration stored on the sensor, which command do you use?
Answer D is correct. The copy command syntax with the /erase option first deletes the file and then replaces it with the source file. Remember that copy command syntax is copy source destination . Therefore, Answers A, B, and C are incorrect.
|Question 4|| |
What command replaces the application partition with the backup partition?
Answer B is correct. The recover command replaces the application partition with the recovery partition. Answers A and C are incorrect because they use the reset command, which you only use to shut down or reboot the sensor. Answer D uses the incorrect syntax for the recovery command and therefore is incorrect.
|Question 5|| |
Which command adds trusted hosts entries to the sensor?
Answer A is correct. The ssh host-key command adds entries to the sensor's trusted host list. Answer B and C are invalid commands. Answer D is incorrect; you use the ssh authorized-key command to add user public keys to the sensor for RSA authentication.
|Question 6|| |
What command copies the running configuration to an FTP server?
Answer B is correct. The syntax for the copy command is copy source destination . The question talks about the running configuration, which relates to the current-config file, not the backup-config file. Therefore, Answers A, C, and D are incorrect.
|Question 7|| |
What happens when a user with a privilege level of viewer executes the show user all command?
Answer D is correct. This command option of all is not allowed by users with the viewer privilege level. You must be an administrator or operator to execute this command. In addition, when executed, the command displays all users configured on the sensor. Therefore, Answers A, B, and C are incorrect.
|Question 8|| |
Which command changes the privilege level of tina from administrator to operator?
Answer B is correct. The privilege command allows you to change a user privilege level if you are currently logged on as the administrator. Answers A, C, and D are incorrect syntax for the command and are therefore incorrect.
|Question 9|| |
Which command removes the current-config?
Answer C is correct. The erase command allows you to remove the current-config or the backup-config files. If you remove the current-config files, the sensor resets everything, except user accounts, back to default values. Answers A, B, and D are incorrect syntax of other commands and are therefore incorrect.
|Question 10|| |
Which command shuts down all sensor programs and applications and prepares the sensor for shutdown?
Answer C is correct. The reset command with the powerdown option shuts down all programs and shuts down the sensor. Answer A is incorrect because the powerdown command does not exist. Answer B is incorrect because it shuts down the programs before rebooting the sensor. Answer D is incorrect because the command does not exist.
|[ LiB ]|