Which versions of SNMP rely on community strings, which are used to authenticate access to MIB objects?

A) Version 1
B) Version 2c
C) Version 3
D) Version 3c

A, B
Explanation: A) Simple Network Management Protocol (SNMP) versions 1 and 2c utilize community strings to authenticate access to MIB objects, which is overall a very weak type of authentication. This was remedied in version 3, which provides several different authentication options that are considered more secure.
B) Simple Network Management Protocol (SNMP) versions 1 and 2c utilize community strings to authenticate access to MIB objects, which is overall a very weak type of authentication. This was remedied in version 3, which provides several different authentication options that are considered more secure.

Computer Science & Information Technology

You might also like to view...

In many open program windows a Search box is available at the ________ of the window

A) near the bottom center B) top left corner C) bottom right corner D) top right corner

Computer Science & Information Technology

The ________ contains the information printed at the top of every page of a report

Fill in the blank(s) with correct word

Computer Science & Information Technology