多項(xiàng)選擇題What are two recommended ways of protecting network device configuration files from outside network security threats? (Choose two.)()

A.Allow unrestricted access to the console or VTY ports.
B.Use a firewall to restrict access from the outside to the network devices.
C.Always use Telnet to access the device command line because its data is automatically encrypted.
D.Use SSH or another encrypted and authenticated transport to access device configurations.
E.Prevent the loss of passwords by disabling password encryption. 


您可能感興趣的試卷

你可能感興趣的試題

4.單項(xiàng)選擇題The command frame-relay map ip 10.121.16.8 102 broadcast was entered on the router. Which of the following statements is true concerning this command?()

A.This command should be executed from the global configuration mode.
B.The IP address 10.121.16.8 is the local router port used to forward data.
C.102 is the remote DLCI that will receive the information.
D.This command is required for all Frame Relay configurations.
E.The broadcast option allows packets, such as RIP updates, to be forwarded across the PVC

最新試題

When you are troubleshooting an ACL issue on a router,which command can help you to verify which interfaces are affected by the ACL?()

題型:?jiǎn)雾?xiàng)選擇題

Which cisco ios command can help to determine the timing of various debug events,relative to each other,when you are debugging a complicated router issue?()

題型:?jiǎn)雾?xiàng)選擇題

Three access ports have been installed and configured to a small office.What term defines the wireless topology?()

題型:?jiǎn)雾?xiàng)選擇題

Which command is used to display the collection of OSPF link states?()

題型:?jiǎn)雾?xiàng)選擇題

What is the default administrative distance of OSPF?()

題型:?jiǎn)雾?xiàng)選擇題

At which layer of the OSI model is RSTP used to prevent loops?()

題型:?jiǎn)雾?xiàng)選擇題

A router receives information about network 192.168.10.0/24 from multiple sources.What will the router consider the most reliable information about the path to that network?()

題型:?jiǎn)雾?xiàng)選擇題

Which command displays the CHAP authentication process as it occurs between two routers?()

題型:?jiǎn)雾?xiàng)選擇題

What is the subnetwork address for a host with the IP address 201.100.5.68/28?()

題型:?jiǎn)雾?xiàng)選擇題

Which name describes an IPV6 host-enable tunneling technique that uses IPV4 UDP,does not require dedicated gateway tunnels,and can pass through existing IPV4 NAT gateways?()

題型:?jiǎn)雾?xiàng)選擇題