Which of the following commands should be done as a precursor to generating a matched public and private key for encryption?
A) hostname name
B) ip domain-name name
C) crypto key prepare rsa
D) ip ssh version 2
A, B
Explanation: A) The hostname (hostname name) and domain name (ip domain-name name) need to be configured before generating the keys for encryption.
B) The hostname (hostname name) and domain name (ip domain-name name) need to be configured before generating the keys for encryption.
Computer Science & Information Technology
You might also like to view...
One of the primary goals of routing protocols is to reduce ________
A) Connection jitter B) Serialization delay C) Convergence time D) IPv4 address usage
Computer Science & Information Technology
Explain why UTP is commonly used with networks when compared to STP cabling.
What will be an ideal response?
Computer Science & Information Technology