Computer Networks » Snmpv3 User Based Security Model
The use of ______ involves defining collections of data, groups of users of the data, and access statements.
A. Usm (user-based security model)
B. Vacm (view-based access control model)
C. Mib (management information base)
D. Mac (message access code)
Read more about this MCQ
What is the function of Masquerade in SNMPv3 security threats?
A. Some unauthorized user may modify the contents of the message while it is in transit
B. The message stream could be monitored by an unauthorized person by eavesdropping
C. An unauthorized user sends information to another assuming the identity of an authorized user
D. An authorized user is denied service by a management entity
Read more about this MCQ
Two algorithms are recommended in SNMPv3 for developing the key from the password. They are ______ and ______
A. Triple des, rsa
B. Block cipher algorithm, stream cipher algorithm
C. . the second part in the designation is the bashing algorithm used, the first one being the mds hashing algorithm, and the second one the sha-1 hashing algorithm to generate mac.
D. Hmac-mds-96, hmac-sha-96
Read more about this MCQ
What is the function of the access policy?
A. It permits the operation of changes and modification in a key
B. It provides a common medium for network devices to share management information
C. It has enhanced security features
D. It determines the access rights to objects as read-view, write-view, and notify-view
Read more about this MCQ