Which commands is necessary to permit SSH or Telnet access to a cisco switch that is otherwiseconfigured for these vty line protocols?()A.transport type allB.transport output allC.transport preferred allD.transport input all

题目
Which commands is necessary to permit SSH or Telnet access to a cisco switch that is otherwiseconfigured for these vty line protocols?()

A.transport type all

B.transport output all

C.transport preferred all

D.transport input all


相似考题
更多“Which commands is necessary to permit SSH or Telnet access to a cisco switch that is otherwiseconfigured for these vty line protocols?() ”相关问题
  • 第1题:

    Which of the following is a secure method of remote access via command line?()

    A.RCP

    B.Telnet

    C.RSH

    D.SSH


    参考答案:D

  • 第2题:

    The network administrator cannot to switch 1 over a telnet session,although the hosts attached to switch 1 can ping the interface Fa0/0 of the router.Given the information in the graphic and assuming that the router and switch2 are configured properly,which of the following commands should be issued on switch 1 to correct this problem?()

    A. Switch1(config)# i nterface fa0 /1 Switch1(config-if)# ip address 192.168.24.3.255.255.255.0

    B. Switch1 (config)#interface fa0/1 Switch1 (config-if)# switchport mode trunk

    C. Switch 1 (config)# i nterface fa0 /1 Switch1 (config-if)# duplex full Switch1 (config-if)# speed 100

    D. Switch1 (config-if)# default-gateway 192.168.24.1

    E. Switch1 (config)# line con 0 Switch1(config-line)# password cisco Switch1 (config-line)#login


    参考答案:D

  • 第3题:

    Which commands is necessary to permit SSH or Telnet access to a cisco switch that is otherwise configured for these vty line protocols?()

    A. transport type all

    B. transport output all

    C. transport preferred all

    D. transport input all


    参考答案:D

  • 第4题:

    配置Cisco路由器时,进入路由器第一到第四个telnet线路配置状态的cisco的命令是()。

    • A、line vty 1 4
    • B、line vty 0 3
    • C、line vty 0 4
    • D、line con 0 4

    正确答案:B

  • 第5题:

    配置路由器的telnet,只允许三个人同时以telnet访问该路由器,则正确的配置为()。

    • A、line vty 0 1
    • B、line vty 0 2
    • C、line vty 0 3
    • D、line vty 0 4

    正确答案:B

  • 第6题:

    Which statement best describes configuring access control lists to control Telnet traffic destined to therouter itself?()

    • A、The ACL applied to the vty lines has no in or out option like ACL being applied to an interface.
    • B、The ACL is applied to the Telnet port with the ip access-group command.
    • C、The ACL must be applied to each vty line individually.
    • D、The ACL should be applied to all vty lines in the in direction to prevent an unwanted user from connecting to an unsecured port.

    正确答案:D

  • 第7题:

    Which two statements about the Cisco AutoSecure feature are true?()

    • A、All passwords entered during the AutoSecure configuration must be a minimum of 8 characters in length.
    • B、Cisco123 would be a valid password for both the enable password and the enable secret commands.
    • C、The auto secure command can be used to secure the router login as well as the NTP and SSH protocols.
    • D、For an interactive full session of AutoSecure, the auto secure login command should be used.
    • E、If the SSH server was configured, the 1024 bit RSA keys are generated after the auto secure commandis enabled.

    正确答案:C,E

  • 第8题:

    Which commands is necessary to permit SSH or Telnet access to a cisco switch that is otherwise configured for these vty line protocols?()

    • A、transport type all
    • B、transport output all
    • C、transport preferred all
    • D、transport input all

    正确答案:D

  • 第9题:

    Refer to the exhibit.What is the effect of the configuration that is shown?()

    • A、It tells the router or switch to try establish an SSH connection first and if that fail to use telnet.
    • B、It configures a cisco network device to use the SSH protocol on incoming communications via the virtual terminal ports.
    • C、It allows seven failed login attempts before the VTY lines are temporarily shutdown.
    • D、It configures the virtual terminal lines with the password 030752180500.
    • E、It configures SSH globally for all logins.

    正确答案:B

  • 第10题:

    Company.com has encountered a problem on the HMC, which requires access to the root shell on the HMC. Which of the following is necessary to access the root userid on the HMC?()

    • A、Enable remote commands on the HMC Configuration menu,then use ssh to login to theHMC,enter su - root
    • B、Login to the HMC as hscpe and run pesh,using a temporary password from IBM Support,afterward, enter su - root
    • C、Login to the HMC as hscroot,then run pesh,using a temporary password from IBM Support, afterward,enter su - root
    • D、Enable remote commands on the HMC Configuration menu,then telnet in as hscroot,entersu - root

    正确答案:B

  • 第11题:

    单选题
    Which statement best describes configuring access control lists to control Telnet traffic destined to therouter itself?()
    A

    The ACL applied to the vty lines has no in or out option like ACL being applied to an interface.

    B

    The ACL is applied to the Telnet port with the ip access-group command.

    C

    The ACL must be applied to each vty line individually.

    D

    The ACL should be applied to all vty lines in the in direction to prevent an unwanted user from connecting to an unsecured port.


    正确答案: A
    解析: 暂无解析

  • 第12题:

    单选题
    Refer to the exhibit.What is the effect of the configuration that is shown?()
    A

    It tells the router or switch to try establish an SSH connection first and if that fail to use telnet.

    B

    It configures a cisco network device to use the SSH protocol on incoming communications via the virtual terminal ports.

    C

    It allows seven failed login attempts before the VTY lines are temporarily shutdown.

    D

    It configures the virtual terminal lines with the password 030752180500.

    E

    It configures SSH globally for all logins.


    正确答案: A
    解析: 暂无解析

  • 第13题:

    You wish to limit telnet access into your Cisco router to only a single host. In order to accomplish this, access list 1 has been written to allow host 172.16.1.224 access to the router vty lines.What command would assign this access- list to the Virtual Terminal Lines?()

    A. router(config-line)# ip access-group 1 in

    B. router(config-line)# access-class 1 in

    C. router(config-line)# ip access-list 1 in

    D. router(config-line)# access-line 1 in


    参考答案:B

  • 第14题:

    This graphic shows the results of an attempt to open a Telnet connection to router ACCESS1 from router Remote27. Which of the following command sequences will correct this problem? ()

    A. ACCESS1(config)# line console 0 ACCESS1(config-line)# password cisco

    B. Remote27(config)# line console 0 Remote27(config-line)# login Remote27(config-line)# password cisco

    C. ACCESS1(config)# line vty 0 4 ACCESS1(config-line)# login ACCESS1(config-line)# password cisco

    D. Remote27(config)# line vty 0 4 Remote27(config-line)# login Remote27(config-line)# password cisco

    E. ACCESS1(config)# enable password cisco

    F. Remote27(config)# enable password cisco


    参考答案:C

  • 第15题:

    What are two recommended ways of protecting network device configuration files from outside network security threats (Choose two.)()。

    A.Allow unrestricted access to the console or VTY ports

    B.Use a firewall to restrict access from the outside to the network devices

    C.Always use Telnet to access the device command line because its data is automatically encrypted

    D.Use SSH or another encrypted and authenticated transport to access device configurations

    E.Prevent the loss of passwords by disabling password encryption


    参考答案:B, D

  • 第16题:

    Which one of the following commands would you enter to terminate a VTY line session?()

    • A、close
    • B、disable
    • C、disconnect
    • D、suspend
    • E、exit
    • F、None of the above

    正确答案:E

  • 第17题:

    What are two recommended ways of protecting network device configuration files from outside network security threats? (Choose two.)()

    • A、Allow unrestricted access to the console or VTY ports.
    • B、Use a firewall to restrict access from the outside to the network devices.
    • C、Always use Telnet to access the device command line because its data is automatically encrypted.
    • D、Use SSH or another encrypted and authenticated transport to access device configurations.
    • E、Prevent the loss of passwords by disabling password encryption. 

    正确答案:B,D

  • 第18题:

    Which commands is necessary to permit SSH or Telnet access to a cisco switch that is otherwiseconfigured for these vty line protocols?()

    • A、transport type all
    • B、transport output all
    • C、transport preferred all
    • D、transport input all

    正确答案:D

  • 第19题:

    You wish to limit telnet access into your Cisco router to only a single host. In order to accomplish this, access list 1 has been written to allow host 172.16.1.224 access to the router vty lines. What command would assign this access- list to the Virtual Terminal Lines?()

    • A、router(config-line)# ip access-group 1 in
    • B、router(config-line)# access-class 1 in
    • C、router(config-line)# ip access-list 1 in
    • D、router(config-line)# access-line 1 in

    正确答案:B

  • 第20题:

    Which two passwords must be supplied in order to connect by Telnet to a properly secured Cisco switch and make changes to the device configuration? (Choose two.)()

    • A、console password
    • B、vty password
    • C、aux password
    • D、tty password
    • E、enable secret password
    • F、username password

    正确答案:B,E

  • 第21题:

    Which of the following is a secure method of remote access via command line?()

    • A、RCP
    • B、Telnet
    • C、RSH
    • D、SSH

    正确答案:D

  • 第22题:

    单选题
    Which one of the following commands would you enter to terminate a VTY line session?()
    A

    close

    B

    disable

    C

    disconnect

    D

    suspend

    E

    exit

    F

    None of the above


    正确答案: B
    解析: 暂无解析

  • 第23题:

    多选题
    What are two recommended ways of protecting network device configuration files from outside network security threats (Choose two.)()。
    A

    Allow unrestricted access to the console or VTY ports

    B

    Use a firewall to restrict access from the outside to the network devices

    C

    Always use Telnet to access the device command line because its data is automatically encrypted

    D

    Use SSH or another encrypted and authenticated transport to access device configurations

    E

    Prevent the loss of passwords by disabling password encryption


    正确答案: E,D
    解析: 暂无解析