Which can be done to secure the virtual terminal interfaces on a router?()A、Administratively shut down the interfaces.B、Physically secure the interfaces.C、Configure a virtual terminal password and login process.D、Enter an access list and apply it to the t

题目

Which can be done to secure the virtual terminal interfaces on a router?()

  • A、Administratively shut down the interfaces.
  • B、Physically secure the interfaces.
  • C、Configure a virtual terminal password and login process.
  • D、Enter an access list and apply it to the terminal interfaces using the access-class command.
  • E、Create an access list and apply it to the terminal interfaces using the access-groupc ommand.

相似考题
更多“Which can be done to secure the ”相关问题
  • 第1题:

    Which three statements about the secure domain router are true?()

    • A、The logical router can span across chassis.
    • B、The fabric and system controller module are shared by all logical routers.
    • C、Each logical router has a distinct fabric and system controller module
    • D、The logical router can share a route processor
    • E、The logical router cannot share a route processor

    正确答案:A,B,E

  • 第2题:

    A network administrator needs to configure port security on a switch.which two statements are true?()

    • A、The network administrator can apply port security to dynamic access ports
    • B、The network administrator can configure static secure or sticky secure mac addresses in the voice vlan.
    • C、The sticky learning feature allows the addition of dynamically learned addresses to the running configuration.
    • D、The network administrator can apply port security to EtherChannels.
    • E、When dynamic mac address learning is enabled on an interface,the switch can learn new addresses,up to the maximum defined.

    正确答案:C,E

  • 第3题:

    Which can be done to secure the virtual terminal interfaces on a router?()

    • A、Administratively shut down the interfaces.
    • B、Physically secure the interfaces.
    • C、Configure a virtual terminal password and login process.
    • D、Enter an access list and apply it to the terminal interfaces using the access-class command.
    • E、Create an access list and apply it to the terminal interfaces using the access-group command

    正确答案:C,D

  • 第4题:

    Which two statements about the Cisco AutoSecure feature are true?()

    • A、All passwords entered during the AutoSecure configuration must be a minimum of 8 characters in length.
    • B、Cisco123 would be a valid password for both the enable password and the enable secret commands.
    • C、The auto secure command can be used to secure the router login as well as the NTP and SSH protocols.
    • D、For an interactive full session of AutoSecure, the auto secure login command should be used.
    • E、If the SSH server was configured, the 1024 bit RSA keys are generated after the auto secure commandis enabled.

    正确答案:C,E

  • 第5题:

    What can be done to secure the virtual terminal interfaces on a router? ()

    • A、Administratively shut down the interface.
    • B、Physically secure the interface.
    • C、Create an access list and apply it to the virtual terminal interfaces with the access-group command.
    • D、Configure a virtual terminal password and login process.
    • E、Enter an access list and apply it to the virtual terminal interfaces using the access-class command.

    正确答案:D,E

  • 第6题:

    问答题
    Which same three letter word can be placed in front of the following words to make a new word?  SIGN, DONE, DUCT, FOUND, FIRM, TRACT, DENSE

    正确答案: Con.
    解析:
    consign托运,委托。condone宽恕,赦免。conduct行为,操行。confound使混淆。confirm确定。contract合同。condense浓缩,精简。

  • 第7题:

    单选题
    Which one of the Cisco IOS commands can be used to verify that either the Cisco IOS image, theconfiguration files,or both have been properly backed up and secured?()
    A

    show archive

    B

    show flash

    C

    show file systems

    D

    show secure bootset


    正确答案: D
    解析: 暂无解析

  • 第8题:

    多选题
    You wish to increase the security of all of the routers within your network. What can be done to secure the virtual terminal interfaces on a router?()
    A

    Administratively shut down the interface.

    B

    Physically secure the interface.

    C

    Create an access list and apply it to the virtual terminal interfaces with the access-group command.

    D

    Configure a virtual terminal password and login process.

    E

    Enter an access list and apply it to the virtual terminal interfaces using the access-class command.


    正确答案: D,E
    解析: 暂无解析

  • 第9题:

    单选题
    Which type of MAC address is dynamically learned by a switch port and then added to the switch’s runningconfiguration?()
    A

    Static secure MAC address

    B

    Dynamic secure MAC address

    C

    Pervasive secure MAC address

    D

    Sticky secure MAC address


    正确答案: B
    解析: 暂无解析

  • 第10题:

    单选题
    Which of the following statements may NOT be the weakness of payment in cash?
    A

    It’s easily affected by mistakes.

    B

    It may be distributed irregularly.

    C

    There is possibility of robbery.

    D

    It can be done conveniently.


    正确答案: C
    解析:
    本题的依据句是文章第三段的第二句话“This form of payment is more easily influenced by errors, irregularities, and robbery than payment by check”。从中可知D项为正确答案。

  • 第11题:

    A network administrator needs to configure port security on a switch.which two statements are true?()

    • A、The network administrator can apply port security to dynamic access ports
    • B、The network administrator can configure static secure or sticky secure mac addresses in the voice vlan.
    • C、The sticky learning feature allows the addition of dynamically learned addresses to the runningconfiguration.
    • D、The network administrator can apply port security to EtherChannels.
    • E、When dynamic mac address learning is enabled on an interface,the switch can learn new addresses,up to the maximum defined.

    正确答案:C,E

  • 第12题:

    What are two ways with which a small business can keep a wireless business separate and secure from a wireless guest access network? () 

    • A、 auto-channel selection
    • B、 WMM QoS
    • C、 802.11F roaming
    • D、 multiple BSSIDs
    • E、 802.1Q VLANs
    • F、 AP detection

    正确答案:D,E

  • 第13题:

    Which can be done to secure the virtual terminal interfaces on a router?()

    • A、Administratively shut down the interfaces.
    • B、Physically secure the interfaces.
    • C、Configure a virtual terminal password and login process.
    • D、Enter an access list and apply it to the terminal interfaces using the access-class command.
    • E、Create an access list and apply it to the terminal interfaces using the access-group command.

    正确答案:C,D

  • 第14题:

    Of the threats discussed below, what is the main advantage of using Cisco Secure Desktop which is part of the Cisco ASA VPN solution?()

    • A、 Secure desktop will create a completely separate computing environment thatwill be deleted when you are done.This ensures that no confidential data has been left on the shared/public computer.
    • B、 Secure desktop is used to protect access to your registry and systemfiles when browsing to SSL/VPN protectedpages.
    • C、 Secure Desktop ensures that an SSLprotected password cannotbe exploitedby a man in the middle attackusing a spoofed certificate.
    • D、 Secure desktop hardens the operating system of the machines you are using at the time secure desktop islaunched.

    正确答案:A

  • 第15题:

    多选题
    Which three table transformations can be done using online redefinition of tables?()
    A

    A

    B

    B

    C

    C

    D

    D

    E

    E


    正确答案: D,C
    解析: 暂无解析

  • 第16题:

    单选题
    Which statement is true regarding online redefinition for the migration of BasicFile LOBs to SecureFile LOBs?()
    A

     It cannot be done in parallel.

    B

     It can be done at the table level or partition level.

    C

     It does not require additional storage because the operation is done online.

    D

     Local and global indexes are maintained automatically during the operation.


    正确答案: B
    解析: 暂无解析

  • 第17题:

    多选题
    Which three of these items are found within the router advertisement message of IPv6 stateless autoconfiguration?() (Choose three.)
    A

    flags indicating the kind of autoconfiguration that can be done by hosts

    B

    default router information

    C

    /64 prefix that can be used on the link and the lifetime of the prefix

    D

    IPv6 DHCP server address information


    正确答案: C,A
    解析: 暂无解析

  • 第18题:

    单选题
    Of the threats discussed below, what is the main advantage of using Cisco Secure Desktop which is part of the Cisco ASA VPN solution?()
    A

     Secure desktop will create a completely separate computing environment thatwill be deleted when you are done.This ensures that no confidential data has been left on the shared/public computer.

    B

     Secure desktop is used to protect access to your registry and systemfiles when browsing to SSL/VPN protectedpages.

    C

     Secure Desktop ensures that an SSLprotected password cannotbe exploitedby a man in the middle attackusing a spoofed certificate.

    D

     Secure desktop hardens the operating system of the machines you are using at the time secure desktop islaunched.


    正确答案: A
    解析: 暂无解析

  • 第19题:

    单选题
    Which of the following needs to be done before a hard drive can be formatted?()
    A

    Labeled

    B

    Rebooted

    C

    Initialized

    D

    Defragmented


    正确答案: A
    解析: 暂无解析