单选题Which of the following is a secure method of copying information over a public network?()A SCPB SMTPC SNMPD TFTP

题目
单选题
Which of the following is a secure method of copying information over a public network?()
A

SCP

B

SMTP

C

SNMP

D

TFTP


相似考题
参考答案和解析
正确答案: A
解析: 暂无解析
更多“单选题Which of the following is a secure method of copying information over a public network?()A SCPB SMTPC SNMPD TFTP”相关问题
  • 第1题:

    An administrator is implementing a wireless network. Which of the following encryption technologies is the MOST secure method and will authenticate devices to the network?()

    A.SSH

    B.WEP

    C.VPN

    D.WPA


    参考答案:D

  • 第2题:

    Which of the following is a secure method of copying information over a public network?()

    A.SCP

    B.SMTP

    C.SNMP

    D.TFTP


    参考答案:A

  • 第3题:

    You are an administrator of a switched network and your goal is to reduce some of the administrative overhead on your network. You plan on achieving this by configuring a new VLAN for each department in your network. However, you need to share the VLAN information across numerous switches throughout your network.Which of the following would allow you accomplish this?()

    A.STP

    B.GVRP

    C.SNMP

    D.VTP

    E.DHCP


    参考答案:D

  • 第4题:

    For the following options, which feature is the foundation of Cisco Self-Defending Network technology?()

    • A、secure network platform
    • B、secure connectivity
    • C、threat control and containment
    • D、policy management

    正确答案:A

  • 第5题:

    Which of the following protocols is the LEAST secure and should be avoided on a wireless network?()

    • A、WEP
    • B、PEAP
    • C、WPA
    • D、TKIP

    正确答案:A

  • 第6题:

    Which protocols are used to export and import configurations?()

    • A、FTP or SCP
    • B、FTP or TFTP
    • C、TFTP or SCP
    • D、TFTP or SMTP

    正确答案:C

  • 第7题:

    Which of the following is a secure method of copying information over a public network?()

    • A、SCP
    • B、SMTP
    • C、SNMP
    • D、TFTP

    正确答案:A

  • 第8题:

    Which of the following protocols should be used to monitor network performance?()

    • A、SNTP
    • B、SMTP
    • C、HTTP
    • D、SNMP

    正确答案:D

  • 第9题:

    Which of the following is a secure method of remote access via command line?()

    • A、RCP
    • B、Telnet
    • C、RSH
    • D、SSH

    正确答案:D

  • 第10题:

    单选题
    Which of the following is a secure method of remote access via command line?()
    A

    RCP

    B

    Telnet

    C

    RSH

    D

    SSH


    正确答案: B
    解析: 暂无解析

  • 第11题:

    单选题
    Which of the following logical network topologies is used to provide a secure connection acrossthe Internet?()
    A

    VLAN

    B

    Peer to Peer

    C

    VTP

    D

    VPN


    正确答案: D
    解析: 暂无解析

  • 第12题:

    单选题
    An administrator is implementing a wireless network. Which of the following encryption technologies is the MOST secure method and will authenticate devices to the network?()
    A

    SSH

    B

    WEP

    C

    VPN

    D

    WPA


    正确答案: D
    解析: 暂无解析

  • 第13题:

    Which of the following protocols is the LEAST secure and should be avoided on a wireless network?()

    A.WEP

    B.PEAP

    C.WPA

    D.TKIP


    参考答案:A

  • 第14题:

    Which of the following protocols should be used to monitor network performance?()

    A.SNTP

    B.SMTP

    C.HTTP

    D.SNMP


    参考答案:D

  • 第15题:

    Which of the following are valid ports for printing over a network? ()

    • A、USB 001
    • B、//computername/sharename
    • C、SNMP
    • D、IP_ip_address
    • E、IEEE 1394

    正确答案:B,D

  • 第16题:

    Which of the following services use TCP?()

    • A、DHCP
    • B、SMTP
    • C、SNMP
    • D、FTP
    • E、HTTP
    • F、TFTP

    正确答案:B,D,E

  • 第17题:

    An administrator is concerned about users utilizing the company's wireless signal with their personal laptops. Which of the following is the BEST method to use to prevent unauthorized devices from using the company's wireless network?()

    • A、Secure VPN
    • B、MAC filtering
    • C、IP filtering
    • D、Static IP addresses

    正确答案:B

  • 第18题:

    Which protocol is used to transfer files to on the ERX Edge Router?()

    • A、SCP
    • B、FTP
    • C、RCP
    • D、TFTP

    正确答案:B,D

  • 第19题:

    Which of the following describes a secure connection over the Internet between two sites?()

    • A、FTP
    • B、VLAN
    • C、VPN
    • D、HTTP

    正确答案:C

  • 第20题:

    An administrator is implementing a wireless network. Which of the following encryption technologies is the MOST secure method and will authenticate devices to the network?()

    • A、SSH
    • B、WEP
    • C、VPN
    • D、WPA

    正确答案:D

  • 第21题:

    Which of the following provides the underlying trust infrastructure to enable easy and secure sharing of information organizations and in cross-premises organizations?()

    • A、Public Key Infrastructure
    • B、Role-based access control
    • C、Federation
    • D、Digital certificate

    正确答案:C

  • 第22题:

    单选题
    Which of the following protocols is the LEAST secure and should be avoided on a wireless network?()
    A

    WEP

    B

    PEAP

    C

    WPA

    D

    TKIP


    正确答案: A
    解析: 暂无解析

  • 第23题:

    单选题
    Which of the following describes a secure connection over the Internet between two sites?()
    A

    FTP

    B

    VLAN

    C

    VPN

    D

    HTTP


    正确答案: D
    解析: 暂无解析