exam questions

Exam 642-883 All Questions

View all questions & answers for the 642-883 exam

Exam 642-883 topic 1 question 132 discussion

Actual exam question from Cisco's 642-883
Question #: 132
Topic #: 1
[All 642-883 Questions]

A customer is concerned about rerouting attacks on the IS-IS domain spanning the company. Which keychain management configuration is valid to authenticate
IS-IS link-state information and provide a first response to this type of attack for Cisco IOS XR instances?

  • A. configurekey chain isis-keyskey 1key-string myP@ssw0rdcryptographic-algorithm MD5send-lifetime 18:05:00 may 31 2014 infiniteaccept-lifetime 18:05:00 may 31 2014 infiniterouter isis 1Isp-password keychain isis-keys
  • B. key chain cisco-xrkey 10key-string myP@ssw0rd!interface GigabitEthernet 3/1/1ip addressip_address subnet_maskip router isisisis authentication mode md5 level-1isis authentication key-chain cisco-xr level-1
  • C. configurekey chain isis-keys!key 8cryptographic- algorithm MD5send-lifetime 18:05:00 may 31 2014 infiniteaccept-lifetime 18:05:00 may 31 2014 infiniterouter isis 1isp-password keychainisis-keys
  • D. configurekey chain isis-keyskey-string myP@ssw0rdsend-lifetime 18:05:00 may 31 2014 infiniteaccept-lifetime 18:05:00 may 31 2014 infiniterouter isis 1isp- password keychain isis-keys
Show Suggested Answer Hide Answer
Suggested Answer: A 🗳️

Comments

Chosen Answer:
This is a voting comment (?). It is better to Upvote an existing comment if you don't have anything to add.
Switch to a voting comment New
Currently there are no comments in this discussion, be the first to comment!
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.

Upvoting a comment with a selected answer will also increase the vote count towards that answer by one. So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.

SaveCancel
Loading ...