What are two recommended ways of protecting network device configuration files from outside network security threats (Choose two.)()。A.Allow unrestricted access to the console or VTY portsB.Use a firewall to restrict access from the outside to the network

题目
What are two recommended ways of protecting network device configuration files from outside network security threats (Choose two.)()。

A.Allow unrestricted access to the console or VTY ports

B.Use a firewall to restrict access from the outside to the network devices

C.Always use Telnet to access the device command line because its data is automatically encrypted

D.Use SSH or another encrypted and authenticated transport to access device configurations

E.Prevent the loss of passwords by disabling password encryption


相似考题
更多“What are two recommended ways of protecting network device configuration files from outside network security threats (Choose two.)()。 ”相关问题
  • 第1题:

    What are two reasons that a network administrator would use access lists (Choose two.)()。

    • A、to control vty access into a router
    • B、to control broadcast traffic through a router
    • C、to filter traffic as it passes through a router
    • D、to filter traffic that originates from the router
    • E、to replace passwords as a line of defense against security incursions

    正确答案:A,C

  • 第2题:

    Which two statements are true regarding firewall user authentication?() (Choose two.)

    • A、When configured for pass-through firewall user authentication, the user must first open a connection to the Junos security remote network resource.
    • B、When configured for Web firewall user authentication only, the user must first open a connection to the Junos security remote network resource.
    • C、If a Junos security device is configured for pass-through firewall user authentication, new sessions are automatically intercepted .
    • D、If a Junos security device is configured for Web firewall user authentication, new sessions are automatically intercepted.

    正确答案:B,C

  • 第3题:

    A company is installing IP phones. The phones and office computers connect to the same device. To ensure maximum throughput for the phone data, the company needs to make sure that the phone traffic is on a different network from that of the office computer data traffic. What is the best network device to which to directly connect the phones and computers, and what technology should be implemented on this device? (Choose two.)()

    • A、hub
    • B、router
    • C、switch
    • D、STP
    • E、subinterfaces
    • F、VLAN

    正确答案:C,F

  • 第4题:

    What are two reasons that a network administrator would use access lists? (Choose two.) ()。

    • A、to control vty access into a router  
    • B、to control broadcast traffic through a router  
    • C、to filter traffic as it passes through a router  
    • D、to filter traffic that originates from the router  
    • E、to replace passwords as a line of defense against security incursions 

    正确答案:A,C

  • 第5题:

    What are two reasons a network administrator would use CDP (Choose two.)()。

    • A、to verify the type of cable interconnecting two devices
    • B、to determine the status of network services on a remote device
    • C、to obtain VLAN information from directly connected switches
    • D、to verify Layer 2 connectivity between two devices when Layer 3 fails
    • E、to obtain the IP address of a connected device in order to telnet to the device
    • F、to determine the status of the routing protocols between directly connected routers

    正确答案:D,E

  • 第6题:

    What are two ways to verify if a WX device is configured as a hub, a spoke, or a mesh device? ()(Choose two.)

    • A、Admin > Device
    • B、Device Setup > Topology
    • C、Compression > Endpoints
    • D、Device Setup > Advanced > Topology

    正确答案:C,D

  • 第7题:

    What are two ways to view the system log files on a WX device? ()(Choose two.)

    • A、Use the CLI and enter show log.
    • B、Use the CLI and enter show all.
    • C、Use the CLI and enter show logging.
    • D、In WebView, choose Admin > Tools > Display System Log.

    正确答案:A,D

  • 第8题:

    多选题
    What are two recommended ways of protecting network device configuration files from outside network security threats (Choose two.)()。
    A

    Allow unrestricted access to the console or VTY ports

    B

    Use a firewall to restrict access from the outside to the network devices

    C

    Always use Telnet to access the device command line because its data is automatically encrypted

    D

    Use SSH or another encrypted and authenticated transport to access device configurations

    E

    Prevent the loss of passwords by disabling password encryption


    正确答案: E,D
    解析: 暂无解析

  • 第9题:

    单选题
    You are tasked with designing a security solution for your network.  What information should be gathered prior to designing the solution?()
    A

    IP addressing design plans so that the network can be appropriately segmented to mitigate potential network threats

    B

    detailed security device specifications

    C

    results from pilot network testing

    D

    results from a network audit


    正确答案: C
    解析: 暂无解析

  • 第10题:

    多选题
    A company is installing IP phones. The phones and office computers connect to the same device. To ensure maximum throughput for the phone data, the company needs to make sure that the phone traffic is on a different network from that of the office computer data traffic. What is the best network device to which to directly connect the phones and computers, and what technology should be implemented on this device (Choose two.)()。
    A

    hub

    B

    router

    C

    switch

    D

    STP

    E

    subinterfaces

    F

    VLAN


    正确答案: D,B
    解析: 暂无解析

  • 第11题:

    多选题
    What are two ways to view the system log files on a WX device? ()(Choose two.)
    A

    Use the CLI and enter show log.

    B

    Use the CLI and enter show all.

    C

    Use the CLI and enter show logging.

    D

    In WebView, choose Admin > Tools > Display System Log.


    正确答案: B,C
    解析: 暂无解析

  • 第12题:

    多选题
    What are two characteristics of the SDM Security Audit wizard?()
    A

    displays a screen with Fix-it check boxes to let you choose which potential security-related configuration changes to implement

    B

    has two modes of operationinteractive and non-interactive

    C

    automatically enables Cisco IOS firewall and Cisco IOS IPS to secure the router

    D

    uses interactive dialogs and prompts to implement role-based CLI

    E

    requires users to first identify which router interfaces connect to the inside network and which connectto the outside network


    正确答案: D,B
    解析: 暂无解析

  • 第13题:

    What are two characteristics of Telnet? (Choose two.)()

    • A、It sends data in clear text format.
    • B、It is no longer supported on Cisco network devices.
    • C、It is more secure than SSH
    • D、It requires an enterprise license in order to be implemented.
    • E、It requires that the destination device be configured to support Telnet connections.

    正确答案:A,E

  • 第14题:

    What are two recommended ways of protecting network device configuration files from outside network security threats? (Choose two.)()

    • A、Allow unrestricted access to the console or VTY ports.
    • B、Use a firewall to restrict access from the outside to the network devices.
    • C、Always use Telnet to access the device command line because its data is automatically encrypted.
    • D、Use SSH or another encrypted and authenticated transport to access device configurations.
    • E、Prevent the loss of passwords by disabling password encryption. 

    正确答案:B,D

  • 第15题:

    You are tasked with designing a security solution for your network.  What information should be gathered prior to designing the solution?()

    • A、IP addressing design plans so that the network can be appropriately segmented to mitigate potential network threats
    • B、a list of the customer requirements
    • C、detailed security device specifications
    • D、results from pilot network testing

    正确答案:B

  • 第16题:

    What are two security appliances that can be installed in a network? (Choose two.)()  

    • A、ATM
    • B、IDS
    • C、IOS
    • D、IOX
    • E、IPS
    • F、SDM

    正确答案:B,E

  • 第17题:

    As a Network Engineer, you decide to apply Cisco enterprise solution throughout the CIS network. What are the two advantages? ()(Choose two.)

    • A、cost savings
    • B、product variety
    • C、well-tested interoperability
    • D、regular upgrade process

    正确答案:A,C

  • 第18题:

    Which two types of optimization does the WX 60 device perform when Exchange 2003 and Outlook 2003 areused in the network? ()(Choose two.)

    • A、Packet Flow Acceleration
    • B、Network Sequence Caching
    • C、AppFlow's MAPI acceleration
    • D、Molecular Sequence Reduction

    正确答案:A,D

  • 第19题:

    多选题
    What are two ways to verify if a WX device is configured as a hub, a spoke, or a mesh device? ()(Choose two.)
    A

    Admin > Device

    B

    Device Setup > Topology

    C

    Compression > Endpoints

    D

    Device Setup > Advanced > Topology


    正确答案: A,B
    解析: 暂无解析

  • 第20题:

    多选题
    The network administrator of the Oregon router adds the following command to the router configuration: ip route 192.168.12.0 255.255.255.0 172.16.12.1. What are the results of adding this command (Choose two.)()。
    A

    The command establishes a static route.

    B

    The command invokes a dynamic routing protocol for 192.168.12.0.

    C

    Traffic for network 192.168.12.0 is forwarded to 172.16.12.1.

    D

    Traffic for all networks is forwarded to 172.16.12.1.

    E

    This route is automatically propagated throughout the entire network.

    F

    Trafficfor network 172.16.12.0 is forwarded to the 192.168.12.0 network.


    正确答案: D,E
    解析: 暂无解析

  • 第21题:

    多选题
    Which two statements are true regarding firewall user authentication?() (Choose two.)
    A

    When configured for pass-through firewall user authentication, the user must first open a connection to the Junos security remote network resource.

    B

    When configured for Web firewall user authentication only, the user must first open a connection to the Junos security remote network resource.

    C

    If a Junos security device is configured for pass-through firewall user authentication, new sessions are automatically intercepted .

    D

    If a Junos security device is configured for Web firewall user authentication, new sessions are automatically intercepted.


    正确答案: D,A
    解析: 暂无解析

  • 第22题:

    多选题
    What are two reasons a network administrator would use CDP (Choose two.)()。
    A

    to verify the type of cable interconnecting two devices

    B

    to determine the status of network services on a remote device

    C

    to obtain VLAN information from directly connected switches

    D

    to verify Layer 2 connectivity between two devices when Layer 3 fails

    E

    to obtain the IP address of a connected device in order to telnet to the device

    F

    to determine the status of the routing protocols between directly connected routers


    正确答案: C,D
    解析: 暂无解析

  • 第23题:

    多选题
    What are two security appliances that can be installed in a network (Choose two.)()。
    A

    ATM

    B

    IDS

    C

    IOS

    D

    IOX

    E

    IPS

    F

    SDM


    正确答案: A,E
    解析: 暂无解析