642-883 Free Dumps Study Materials
Question 6: A customer is concerned about rerouting attacks on the IS-IS domain spanning the company.
Which keychain management configuration is valid to authenticate IS-IS link- state information and
provide a first response to this type of attack for Cisco IOS XR instances?
A. configurekey chain isis-keyskey 1key-string myP@ssw0rdcryptographic-algorithm MD5send-
lifetime 18:05:00 may 31 2014 infiniteaccept-lifetime 18:05:00 may 31 2014 infiniterouter isis 1Isp-
password keychain isis-keys
B. key chain cisco-xrkey 10key-string myP@ssw0rd!interface GigabitEthernet 3/1/1ip
addressip_address subnet_maskip router isisisis authentication mode md5 level-1isis authentication
key-chain cisco-xr level-1
C. configurekey chain isis-keys!key 8cryptographic- algorithm MD5send-lifetime 18:05:00 may 31
2014 infiniteaccept-lifetime 18:05:00 may 31 2014 infiniterouter isis 1isp-password keychainisis-keys
D. configurekey chain isis-keyskey-string myP@ssw0rdsend-lifetime 18:05:00 may 31 2014
infiniteaccept-lifetime 18:05:00 may 31 2014 infiniterouter isis 1isp-password keychain isis-keys
Correct Answer: A