多选题Which can be done to secure the virtual terminal interfaces on a router?()AAdministratively shut down the interfaces.BPhysically secure the interfaces.CConfigure a virtual terminal password and login process.DEnter an access list and apply it to the te

题目
多选题
Which can be done to secure the virtual terminal interfaces on a router?()
A

Administratively shut down the interfaces.

B

Physically secure the interfaces.

C

Configure a virtual terminal password and login process.

D

Enter an access list and apply it to the terminal interfaces using the access-class command.

E

Create an access list and apply it to the terminal interfaces using the access-group command.


相似考题
参考答案和解析
正确答案: C,E
解析: 暂无解析
更多“Which can be done to secure the virtual terminal interfaces”相关问题
  • 第1题:

    What can be done to secure the virtual terminal interfaces on a router?()

    A. Administratively shut down the interface.

    B. Physically secure the interface.

    C. Create an access list and apply it to the virtual terminal interfaces with the access-group command.

    D. Configure a virtual terminal password and login process.

    E. Enter an access list and apply it to the virtual terminal interfaces using the access-class command.


    参考答案:D, E

  • 第2题:

    Which two commands can be used to verify a trunk link configurationt status on a given cisco switch?()

    A.show interfaces interface

    B.show interfaces interface trunk

    C.show interfaces interface switchport

    D.show ip interface brief

    E.show interfaces vlan


    参考答案:B, C

  • 第3题:

    Which statement is true about the SDM QoS wizard and its ability to enable a QoS policy on router interfaces?()

    • A、QoS can be enabled on interfaces used for Easy VPN clients
    • B、QoS can be enabled on IPsec VPN interfaces and tunnels
    • C、QoS can be enabled on interfaces with an existing QoS policy
    • D、the QoS policy can be enabled for incoming and outgoing traffic on the interface

    正确答案:B

  • 第4题:

    Which protocol should be used to establish a secure terminal connection to a remote network device?Select the best response.()

    • A、ARP
    • B、SSH
    • C、Telnet
    • D、WEP
    • E、SNMPv1
    • F、SNMPv2

    正确答案:B

  • 第5题:

    Which can be done to secure the virtual terminal interfaces on a router?()

    • A、Administratively shut down the interfaces.
    • B、Physically secure the interfaces.
    • C、Configure a virtual terminal password and login process.
    • D、Enter an access list and apply it to the terminal interfaces using the access-class command.
    • E、Create an access list and apply it to the terminal interfaces using the access-group command.

    正确答案:C,D

  • 第6题:

    Which two commands can be used to verify a trunk link configurationt status on a given cisco switch?()

    • A、show interfaces interface
    • B、show interfaces interface trunk
    • C、show interfaces interface switchport
    • D、show ip interface brief
    • E、show interfaces vlan

    正确答案:B,C

  • 第7题:

    What can be done to secure the virtual terminal interfaces on a router? ()

    • A、Administratively shut down the interface.
    • B、Physically secure the interface.
    • C、Create an access list and apply it to the virtual terminal interfaces with the access-group command.
    • D、Configure a virtual terminal password and login process.
    • E、Enter an access list and apply it to the virtual terminal interfaces using the access-class command.

    正确答案:D,E

  • 第8题:

    Regarding secure tunnel (st) interfaces, which statement is true?()

    • A、You cannot assign st interfaces to a security zone.
    • B、You cannot apply static NAT on an st interface logical unit.
    • C、st interfaces are optional when configuring a route-based VPN
    • D、A static route can reference the st interface logical unit as the next-hop

    正确答案:D

  • 第9题:

    多选题
    Which two commands can be used to verify a trunk link configuration status on a given cisco switch?()
    A

    show interfaces interface

    B

    show interfaces trunk

    C

    show interfaces switchport

    D

    show ip interface brief

    E

    show interfaces vlan


    正确答案: A,E
    解析: 暂无解析

  • 第10题:

    多选题
    When policy - based routing (PBR) is being configured, which three criteria can the set command specify?()
    A

    all interfaces in the path toward the destination

    B

    all networks in the path toward the destination

    C

    adjacent next hop router in the path toward the destination

    D

    all routers in the path toward the destination

    E

    all interfaces through which the packets can be routed

    F

    type of service and precedence in the IP packets


    正确答案: F,C
    解析: 暂无解析

  • 第11题:

    单选题
    Which protocol should be used to establish a secure terminal connection to a remote network device? Select the best response.()
    A

    ARP

    B

    SSH

    C

    Telnet

    D

    WEP

    E

    SNMPv1

    F

    SNMPv2


    正确答案: C
    解析: 暂无解析

  • 第12题:

    单选题
    RMAN provides more granular catalog security through which feature?()
    A

     Virtual private database

    B

     Virtual private catalog

    C

     RMAN virtual database

    D

     RMAN secure catalog

    E

     Oracle Database Vault


    正确答案: C
    解析: 暂无解析

  • 第13题:

    Which two commands can be used to verify a trunk link configuration status on a given cisco switch?()

    A.show interfaces interface

    B.show interfaces trunk

    C.show interfaces switchport

    D.show ip interface brief

    E.show interfaces vlan


    参考答案:B, C

  • 第14题:

    Which two factors determine the recommended maximum number of virtual interfaces on a Cisco UCSsystem?()

    • A、the number of computer blades in the system
    • B、the number of interfaces sharing the uplinks
    • C、the driver version on the OS running on the computer blade
    • D、the number of uplinks between I/O Module and Fabric Interconnect

    正确答案:B,D

  • 第15题:

    RMAN provides more granular catalog security through which feature?()

    • A、Virtual private database
    • B、Virtual private catalog
    • C、RMAN virtual database
    • D、RMAN secure catalog
    • E、Oracle Database Vault

    正确答案:B

  • 第16题:

    Which can be done to secure the virtual terminal interfaces on a router?()

    • A、Administratively shut down the interfaces.
    • B、Physically secure the interfaces.
    • C、Configure a virtual terminal password and login process.
    • D、Enter an access list and apply it to the terminal interfaces using the access-class command.
    • E、Create an access list and apply it to the terminal interfaces using the access-group command

    正确答案:C,D

  • 第17题:

    Which two commands can be used to verify a trunk link configuration status on a given cisco switch?()

    • A、show interfaces interface
    • B、show interfaces trunk
    • C、show interfaces switchport
    • D、show ip interface brief
    • E、show interfaces vlan

    正确答案:B,C

  • 第18题:

    Which statement about SAN port channels configured on Cisco Nexus 5000 Series Switches is true?()  

    • A、 A single SAN port channel can have both Fibre Channel and virtual Fibre Channel interfaces. 
    • B、 SAN port channels can include up to 16 interfaces.
    • C、 SAN port channels distribute traffic across all links in the port channel when source ID and destination ID load balancing are used.
    • D、 The links in SAN port channels can be connected to different sets of switches.
    • E、 The On mode of operation means ports only operate as part of a SAN port channel or remain inactive.

    正确答案:E

  • 第19题:

    When creating a Virtual Ethernet adapter, which of the following steps is done FIRST?()

    • A、Generate a unique MAC address.
    • B、Run cfgmgr to create device special files.
    • C、Create a virtual device with "smitty vlan".
    • D、Add a virtual Ethernet adapter to the partition profile.

    正确答案:D

  • 第20题:

    单选题
    Which statement describes a security zone?()
    A

    A security zone can contain one or more interfaces.

    B

    A security zone can contain interfaces in multiple routing instances.

    C

    A security zone must contain two or more interfaces.

    D

    A security zone must contain bridge groups.


    正确答案: B
    解析: 暂无解析

  • 第21题:

    多选题
    You wish to increase the security of all of the routers within your network. What can be done to secure the virtual terminal interfaces on a router?()
    A

    Administratively shut down the interface.

    B

    Physically secure the interface.

    C

    Create an access list and apply it to the virtual terminal interfaces with the access-group command.

    D

    Configure a virtual terminal password and login process.

    E

    Enter an access list and apply it to the virtual terminal interfaces using the access-class command.


    正确答案: D,E
    解析: 暂无解析

  • 第22题:

    单选题
    Companycom will be using Virtual IO Server to share Ethernet adapters. What can be done to prevent network failure of the client if a Virtual IO Server goes down?()
    A

    Create two virtual adapters on the client, each one from a separate Virtual IO Server

    B

    Enable dead gateway detection on the client so that the network traffic can be rerouted

    C

    Have a spare network card on standby in the client in case the Virtual IO Server goes down

    D

    Create an etherchannel adapter on the client using one Virtual Ethernet adapter from two  separate Virtual IO Servers


    正确答案: C
    解析: 暂无解析

  • 第23题:

    多选题
    Which two commands can be used to verify a trunk link configurationt status on a given cisco switch?()
    A

    show interfaces interface

    B

    show interfaces interface trunk

    C

    show interfaces interface switchport

    D

    show ip interface brief

    E

    show interfaces vlan


    正确答案: A,C
    解析: 暂无解析

  • 第24题:

    单选题
    Which statement about SAN port channels configured on Cisco Nexus 5000 Series Switches is true?()
    A

     A single SAN port channel can have both Fibre Channel and virtual Fibre Channel interfaces. 

    B

     SAN port channels can include up to 16 interfaces.

    C

     SAN port channels distribute traffic across all links in the port channel when source ID and destination ID load balancing are used.

    D

     The links in SAN port channels can be connected to different sets of switches.

    E

     The On mode of operation means ports only operate as part of a SAN port channel or remain inactive.


    正确答案: A
    解析: 暂无解析