MultipleChoice
You work as a Software Developer for UcTech Inc. You build an online book shop, so that users can purchase books using their credit cards. You want to ensure that only the administrator can access the credit card information sent by users. Which security mechanism will you use to accomplish the task?
OptionsDragDrop
You work as a Security Administrator in Tech Perfect Inc. The company has a TCP/IP based network. Three Cisco IOS routers- router1, router2, and router3 are currently working in the network. You want to accomplish the following tasks:
Configure router1 to act as an SSH server.
Configure domain name 'network.com'.
Generate a general-purpose RSA key pair and specify the IP key size of 1024.
Configure SSH time-out of 30 seconds and SSH authentication retries value 4.
Drag and drop the appropriate commands beside their respective command prompts in order to accomplish the tasks.

















































