A.Allow unrestricted access to the console or VTY ports
B.Use a firewall to restrict access from the outside to the network devices
C.Always use Telnet to access the device command line because its data is automatically encrypted
D.Use SSH or another encrypted and authenticated transport to access device configurations
E.Prevent the loss of passwords by disabling password encryption
第1题:
What are two reasons that a network administrator would use access lists (Choose two.)()。
第2题:
Which two statements are true regarding firewall user authentication?() (Choose two.)
第3题:
A company is installing IP phones. The phones and office computers connect to the same device. To ensure maximum throughput for the phone data, the company needs to make sure that the phone traffic is on a different network from that of the office computer data traffic. What is the best network device to which to directly connect the phones and computers, and what technology should be implemented on this device? (Choose two.)()
第4题:
What are two reasons that a network administrator would use access lists? (Choose two.) ()。
第5题:
What are two reasons a network administrator would use CDP (Choose two.)()。
第6题:
What are two ways to verify if a WX device is configured as a hub, a spoke, or a mesh device? ()(Choose two.)
第7题:
What are two ways to view the system log files on a WX device? ()(Choose two.)
第8题:
Allow unrestricted access to the console or VTY ports
Use a firewall to restrict access from the outside to the network devices
Always use Telnet to access the device command line because its data is automatically encrypted
Use SSH or another encrypted and authenticated transport to access device configurations
Prevent the loss of passwords by disabling password encryption
第9题:
IP addressing design plans so that the network can be appropriately segmented to mitigate potential network threats
detailed security device specifications
results from pilot network testing
results from a network audit
第10题:
hub
router
switch
STP
subinterfaces
VLAN
第11题:
Use the CLI and enter show log.
Use the CLI and enter show all.
Use the CLI and enter show logging.
In WebView, choose Admin > Tools > Display System Log.
第12题:
displays a screen with Fix-it check boxes to let you choose which potential security-related configuration changes to implement
has two modes of operationinteractive and non-interactive
automatically enables Cisco IOS firewall and Cisco IOS IPS to secure the router
uses interactive dialogs and prompts to implement role-based CLI
requires users to first identify which router interfaces connect to the inside network and which connectto the outside network
第13题:
What are two characteristics of Telnet? (Choose two.)()
第14题:
What are two recommended ways of protecting network device configuration files from outside network security threats? (Choose two.)()
第15题:
You are tasked with designing a security solution for your network. What information should be gathered prior to designing the solution?()
第16题:
What are two security appliances that can be installed in a network? (Choose two.)()
第17题:
As a Network Engineer, you decide to apply Cisco enterprise solution throughout the CIS network. What are the two advantages? ()(Choose two.)
第18题:
Which two types of optimization does the WX 60 device perform when Exchange 2003 and Outlook 2003 areused in the network? ()(Choose two.)
第19题:
Admin > Device
Device Setup > Topology
Compression > Endpoints
Device Setup > Advanced > Topology
第20题:
The command establishes a static route.
The command invokes a dynamic routing protocol for 192.168.12.0.
Traffic for network 192.168.12.0 is forwarded to 172.16.12.1.
Traffic for all networks is forwarded to 172.16.12.1.
This route is automatically propagated throughout the entire network.
Trafficfor network 172.16.12.0 is forwarded to the 192.168.12.0 network.
第21题:
When configured for pass-through firewall user authentication, the user must first open a connection to the Junos security remote network resource.
When configured for Web firewall user authentication only, the user must first open a connection to the Junos security remote network resource.
If a Junos security device is configured for pass-through firewall user authentication, new sessions are automatically intercepted .
If a Junos security device is configured for Web firewall user authentication, new sessions are automatically intercepted.
第22题:
to verify the type of cable interconnecting two devices
to determine the status of network services on a remote device
to obtain VLAN information from directly connected switches
to verify Layer 2 connectivity between two devices when Layer 3 fails
to obtain the IP address of a connected device in order to telnet to the device
to determine the status of the routing protocols between directly connected routers
第23题:
ATM
IDS
IOS
IOX
IPS
SDM