多項(xiàng)選擇題What are two recommended ways of protecting network device configuration files from outside network security threats? (Choose two.)()

A.Allow unrestricted access to the console or VTY ports.
B.Use a firewall to restrict access from the outside to the network devices.
C.Always use Telnet to access the device command line because its data is automatically encrypted.
D.Use SSH or another encrypted and authenticated transport to access device configurations.
E.Prevent the loss of passwords by disabling password encryption. 


您可能感興趣的試卷

你可能感興趣的試題

4.單項(xiàng)選擇題The command frame-relay map ip 10.121.16.8 102 broadcast was entered on the router. Which of the following statements is true concerning this command?()

A.This command should be executed from the global configuration mode.
B.The IP address 10.121.16.8 is the local router port used to forward data.
C.102 is the remote DLCI that will receive the information.
D.This command is required for all Frame Relay configurations.
E.The broadcast option allows packets, such as RIP updates, to be forwarded across the PVC

最新試題

You have been asked to come up with a subnet mask that will allow all three web servers to be on the same network while providing the max number of subnets.Which network address and subnet mask meet this requirement?()

題型:?jiǎn)雾?xiàng)選擇題

The network administrator cannot to switch 1 over a telnet session,although the hosts attached to switch 1 can ping the interface Fa0/0 of the router.Given the information in the graphic and assuming that the router and switch2 are configured properly,which of the following commands should be issued on switch 1 to correct this problem?()

題型:?jiǎn)雾?xiàng)選擇題

Which name describes an IPV6 host-enable tunneling technique that uses IPV4 UDP,does not require dedicated gateway tunnels,and can pass through existing IPV4 NAT gateways?()

題型:?jiǎn)雾?xiàng)選擇題

After the show ip route command has been entered,the follwing routes are displayed.Which route will not be entered into the routing table of a neighboring router?()

題型:?jiǎn)雾?xiàng)選擇題

Three switches are connected to one anther via trunk ports.Assuming the default switch configuration,which switch is elected as the root bridge for the spanning-tree instance of vlan 1?()

題型:?jiǎn)雾?xiàng)選擇題

If all OSPF routers in a single area are configured with the same priority value,what value dose a router use for the ODPF router ID in the absence of a loopback interface?()

題型:?jiǎn)雾?xiàng)選擇題

When you are troubleshooting an ACL issue on a router,which command can help you to verify which interfaces are affected by the ACL?()

題型:?jiǎn)雾?xiàng)選擇題

Which statement is true, as relates to classful or classless routing?()

題型:?jiǎn)雾?xiàng)選擇題

Which command displays the CHAP authentication process as it occurs between two routers?()

題型:?jiǎn)雾?xiàng)選擇題

Three access ports have been installed and configured to a small office.What term defines the wireless topology?()

題型:?jiǎn)雾?xiàng)選擇題