多項選擇題What are two recommended ways of protecting network device configuration files from outside network security threats? (Choose two.)()

A.Allow unrestricted access to the console or VTY ports.
B.Use a firewall to restrict access from the outside to the network devices.
C.Always use Telnet to access the device command line because its data is automatically encrypted.
D.Use SSH or another encrypted and authenticated transport to access device configurations.
E.Prevent the loss of passwords by disabling password encryption. 


您可能感興趣的試卷

你可能感興趣的試題

4.單項選擇題The command frame-relay map ip 10.121.16.8 102 broadcast was entered on the router. Which of the following statements is true concerning this command?()

A.This command should be executed from the global configuration mode.
B.The IP address 10.121.16.8 is the local router port used to forward data.
C.102 is the remote DLCI that will receive the information.
D.This command is required for all Frame Relay configurations.
E.The broadcast option allows packets, such as RIP updates, to be forwarded across the PVC

最新試題

Which statement describes the rule of split horizon?()

題型:單項選擇題

A network administrator needs to configure a serial link between the main office and a remote location.The router at the remote office is a non-cisco router. How should the network administrator configure the serial interface of the main office router to make the connection?()

題型:單項選擇題

While troubleshooting a network problem,a technician discovers that the current copy of the Cisco IOS is outdated and needs to be updated.Which of the following commands would the technician issue to replace the Cisco router IOS with the newer version?()

題型:單項選擇題

After the show ip route command has been entered,the follwing routes are displayed.Which route will not be entered into the routing table of a neighboring router?()

題型:單項選擇題

Three switches are connected to one anther via trunk ports.Assuming the default switch configuration,which switch is elected as the root bridge for the spanning-tree instance of vlan 1?()

題型:單項選擇題

Which encapsulation type is a Frame Relay encapsulation type that is supported by Cisco routers?()

題型:單項選擇題

On which options are standard access list based?()

題型:單項選擇題

Which pairing reflects a correct protocol-and-metric relationship?()

題型:單項選擇題

An employee of ABC company has move to an office on a different floor. Although the administrator is able to telnet to all of the routers,the address of Switch F is needed in order to verify that the employee remains in the same VLAN.Which action could be used by the administrator to find the IP address of Switch F?()

題型:單項選擇題

What is the subnetwork address for a host with the IP address 201.100.5.68/28?()

題型:單項選擇題