What are two recommended ways of protecting network device configuration files from outside network security threats (Choose two.)()。A、Allow unrestricted access to the console or VTY portsB、Use a firewall to restrict access from the outside to the network

题目

What are two recommended ways of protecting network device configuration files from outside network security threats (Choose two.)()。

  • A、Allow unrestricted access to the console or VTY ports
  • B、Use a firewall to restrict access from the outside to the network devices
  • C、Always use Telnet to access the device command line because its data is automatically encrypted
  • D、Use SSH or another encrypted and authenticated transport to access device configurations
  • E、Prevent the loss of passwords by disabling password encryption

相似考题
更多“What are two recommended ways of”相关问题
  • 第1题:

    You enable the Windows Sidebar feature on your computer. You discover that you are unable to access the desktop icons that appear beneath the Windows Sidebar feature. You need to access these desktop icons.What are two possible ways to achieve this goal?()

    A.A

    B.B

    C.C

    D.D

    E.E


    参考答案:A, C

  • 第2题:

    What are two design guidelines for VoIP networks? ()

    A.Delay should be no more than 10 ms.

    B.Loss should be no more than1 percent.

    C.Jitter should be less then 40 ms.

    D.Managed bandwidth is strongly recommended for voice control traffic.


    参考答案:B, D

  • 第3题:

    What are two ways in which the Cisco Security Monitoring, Analysis, and Response System provides superior network protection? ()

    • A、 reports financial losses from attacks
    • B、 providessecutiy command and control
    • C、 provides VPN connectivity to clients
    • D、 expedites reporting of incidents
    • E、 manage rogue wireless signals

    正确答案:B,D

  • 第4题:

    What are two recommended ways of protecting network device configuration files from outside network security threats? (Choose two.)()

    • A、Allow unrestricted access to the console or VTY ports.
    • B、Use a firewall to restrict access from the outside to the network devices.
    • C、Always use Telnet to access the device command line because its data is automatically encrypted.
    • D、Use SSH or another encrypted and authenticated transport to access device configurations.
    • E、Prevent the loss of passwords by disabling password encryption. 

    正确答案:B,D

  • 第5题:

    In what two ways does the Cisco SR 520 Secure Router complement the Cisco Smart Business  Communications System? ()

    • A、 stateful packet inspection firewall
    • B、 10-Gigabit Ethernet connectivity
    • C、 remote configuration of access points
    • D、 guest access
    • E、 Cisco Intrusion Prevention System

    正确答案:D,E

  • 第6题:

    What are two ways to view the system log files on a WX device? ()(Choose two.)

    • A、Use the CLI and enter show log.
    • B、Use the CLI and enter show all.
    • C、Use the CLI and enter show logging.
    • D、In WebView, choose Admin > Tools > Display System Log.

    正确答案:A,D

  • 第7题:

    多选题
    What are two ways to verify if a WX device is configured as a hub, a spoke, or a mesh device? ()(Choose two.)
    A

    Admin > Device

    B

    Device Setup > Topology

    C

    Compression > Endpoints

    D

    Device Setup > Advanced > Topology


    正确答案: A,B
    解析: 暂无解析

  • 第8题:

    问答题
    Test 14  People from different cultures keep different value systems and have different ways of looking at things. Failing to recognize these cultural differences will lead to misunderstanding.  Write on ANSWER SHEET TWO a composition of about 200 words on the following topic:WAYS OF DEALING WITH CULTURAL DIFFERENCES  You are to write in three parts.  In the first part, state the necessity of dealing with the cultural differences.  In the second part, state specifically what your suggested ways are.  In the last part, bring what you have written to a natural conclusion or a summary.  Marks will be awarded for content, organization, grammar and appropriateness. Failure to follow the instructions may result in a loss of marks.

    正确答案:
    【参考范文】
    Different cultures have their own rules of behavior. People from different cultural backgrounds may have very different beliefs, religions, customs and habits. Ignorance of cultural differences often causes misunderstanding, offense, or embarrassment in cross-cultural communication. In order to avoid misunderstanding or giving unnecessary offense, we need to develop a cross-cultural perspective. Here are two basic ways to help deal with cultural differences:
    First of all, we must bear in mind that all cultures are equal, however different some cultures may seem from our own. Having a respect for other cultures is an effective way to promote international communication, since understanding can only be reached if we are willing to treat people from other cultures as equals. Second, we can avoid unintentionally offending others by learning the basic characteristics of other cultures. It is a good policy to ask your foreign friends or business associates about their everyday customs and let them know your customs as well.
    As China opens to the outside world, more and more people are involved in international business transactions or cultural exchanges in various areas. It is important that we improve our awareness of cultural differences so as to prepare ourselves for successful cross-cultural communication.
    解析: 暂无解析

  • 第9题:

    多选题
    What are two components of the discovery guide in the Cisco SBR sales approach?()
    A

    Calculate Business Need PriorityAnd Evolution Phase

    B

    Prioritize and Prepare Solutions Recommendations

    C

    Pain Point and Implementation Assessment

    D

    Business Needs-based Solution Recommended


    正确答案: A,D
    解析: 暂无解析

  • 第10题:

    多选题
    What are two recommended ways of protecting network device configuration files from outside network security threats (Choose two.)()。
    A

    Allow unrestricted access to the console or VTY ports

    B

    Use a firewall to restrict access from the outside to the network devices

    C

    Always use Telnet to access the device command line because its data is automatically encrypted

    D

    Use SSH or another encrypted and authenticated transport to access device configurations

    E

    Prevent the loss of passwords by disabling password encryption


    正确答案: E,D
    解析: 暂无解析

  • 第11题:

    多选题
    What are two design guidelines for VoIP networks? ()
    A

    Delay should be no more than 10 ms.

    B

    Loss should be no more than1 percent.

    C

    Jitter should be less then 40 ms.

    D

    Managed bandwidth is strongly recommended for voice control traffic.


    正确答案: D,B
    解析: 暂无解析

  • 第12题:

    多选题
    In JUNOS software, what are two ways that the router ID is chosen?()
    A

    Choose the lowest primary address.

    B

    If assigned, always choose address of fxp0.

    C

    Choose numerically lowest IP address of fxp0.

    D

    Choose the non-127.0.0.1 primary address on lo0.


    正确答案: C,D
    解析: 暂无解析

  • 第13题:

    Remote users are unable to connect to a shared folder on your computer. You need to allow access to the shared folder.What are the two possible ways to achieve this goal?()

    A.A

    B.B

    C.C

    D.D


    参考答案:B, C

  • 第14题:

    What are two recommended ways of protecting network device configuration files from outside network security threats (Choose two.)()。

    A.Allow unrestricted access to the console or VTY ports

    B.Use a firewall to restrict access from the outside to the network devices

    C.Always use Telnet to access the device command line because its data is automatically encrypted

    D.Use SSH or another encrypted and authenticated transport to access device configurations

    E.Prevent the loss of passwords by disabling password encryption


    参考答案:B, D

  • 第15题:

    Which two statements correctly describe UDLD? ()

    • A、Unidirectional link detection is achieved through monitoring STP BPDUs.
    • B、It is recommended that it be enabled globally rather than on an individual port.
    • C、When an error is detected, normal mode will disable a port.
    • D、It is recommended that it be enabled in normal mode.
    • E、It is recommended that it be used with the loop guard feature.

    正确答案:B,E

  • 第16题:

    What are two ways with which a small business can keep a wireless business separate and secure from a wireless guest access network? () 

    • A、 auto-channel selection
    • B、 WMM QoS
    • C、 802.11F roaming
    • D、 multiple BSSIDs
    • E、 802.1Q VLANs
    • F、 AP detection

    正确答案:D,E

  • 第17题:

    What are two design guidelines for VoIP networks?()

    • A、 Delay should be no more than 10 ms.
    • B、 Loss should be no more than 1 percent.
    • C、 Jitter should be less then 40 ms.
    • D、 Managed bandwidth is strongly recommended for voice control traffic.

    正确答案:B,D

  • 第18题:

    多选题
    What are two ways to create a rescue configuration on a J-series router?()
    A

    Use the J-Web System > Rescue menu.

    B

    Use the J-Web Configuration > Rescue menu.

    C

    Issue the configure rescue save command.

    D

    Issue the request system configuration rescue save command.


    正确答案: D,C
    解析: 暂无解析

  • 第19题:

    单选题
    A customer wants to deploy the Cisco Business Ready Teleworker solution, but is currently using a traditional (non-IP) PBX for voice services. What would you recommend to this customer?()
    A

    Deployment of Business Ready Teleworker with VoIP is not recommended.

    B

    The customer’s existing PBX must first be replaced with Cisco IP Telephony solution.

    C

    Business Ready Teleworker and Cisco IP Telephony can be deployed in parallel to the existing PBX, integrating the two with trunking.

    D

    Deployment is recommended only for full-time Teleworkers who have no other corporate phone.


    正确答案: A
    解析: 暂无解析

  • 第20题:

    单选题
    A customer has ten RS/6000 Model M80, two pSeries 690 Model 681, five POWER5 510 and two POWER6 560 machines installed and running commercial applications. They want to do a server consolidation study in order to replace the existing systems with POWER7 systems. What performance metric is recommended when evaluating the replacement system?()
    A

    IBM CPW

    B

    IBM rPerf

    C

    SPECint_rate2006

    D

    IDEAS International RPE2


    正确答案: B
    解析: 暂无解析

  • 第21题:

    多选题
    What are two ways in which the Cisco Security Monitoring, Analysis, and Response System provides superior network protection? ()
    A

    reports financial losses from attacks

    B

    providessecutiy command and control

    C

    provides VPN connectivity to clients

    D

    expedites reporting of incidents

    E

    manage rogue wireless signals


    正确答案: D,A
    解析: 暂无解析

  • 第22题:

    单选题
    The two friends said goodbye and then went their()ways.
    A

    relevant

    B

    relative

    C

    reluctant

    D

    respective


    正确答案: C
    解析: 暂无解析

  • 第23题:

    多选题
    What are two ways to view the system log files on a WX device? ()(Choose two.)
    A

    Use the CLI and enter show log.

    B

    Use the CLI and enter show all.

    C

    Use the CLI and enter show logging.

    D

    In WebView, choose Admin > Tools > Display System Log.


    正确答案: B,C
    解析: 暂无解析

  • 第24题:

    填空题
    What temperature is recommended for washing light colored clothes?____

    正确答案: warm temperature
    解析:
    从文章中间部分“warm temperature for light colored clothes”可知,此处应填warm temperature。