A. transport type all
B. transport output all
C. transport preferred all
D. transport input all
第1题:
The network administrator cannot to switch 1 over a telnet session,although the hosts attached to switch 1 can ping the interface Fa0/0 of the router.Given the information in the graphic and assuming that the router and switch2 are configured properly,which of the following commands should be issued on switch 1 to correct this problem?()

A. Switch1(config)# i nterface fa0 /1 Switch1(config-if)# ip address 192.168.24.3.255.255.255.0
B. Switch1 (config)#interface fa0/1 Switch1 (config-if)# switchport mode trunk
C. Switch 1 (config)# i nterface fa0 /1 Switch1 (config-if)# duplex full Switch1 (config-if)# speed 100
D. Switch1 (config-if)# default-gateway 192.168.24.1
E. Switch1 (config)# line con 0 Switch1(config-line)# password cisco Switch1 (config-line)#login
第2题:
A.transport type all
B.transport output all
C.transport preferred all
D.transport input all
第3题:
配置Cisco路由器时,进入路由器第一到第四个telnet线路配置状态的cisco的命令是()。
第4题:
Which two Aironet enterprise solution statements are true?()
第5题:
What are two recommended ways of protecting network device configuration files from outside network security threats? (Choose two.)()
第6题:
Which commands is necessary to permit SSH or Telnet access to a cisco switch that is otherwiseconfigured for these vty line protocols?()
第7题:
You wish to limit telnet access into your Cisco router to only a single host. In order to accomplish this, access list 1 has been written to allow host 172.16.1.224 access to the router vty lines. What command would assign this access- list to the Virtual Terminal Lines?()
第8题:
Which two passwords must be supplied in order to connect by Telnet to a properly secured Cisco switch and make changes to the device configuration? (Choose two.)()
第9题:
Which of the following is a secure method of remote access via command line?()
第10题:
close
disable
disconnect
suspend
exit
None of the above
第11题:
Allow unrestricted access to the console or VTY ports
Use a firewall to restrict access from the outside to the network devices
Always use Telnet to access the device command line because its data is automatically encrypted
Use SSH or another encrypted and authenticated transport to access device configurations
Prevent the loss of passwords by disabling password encryption
第12题:
A Cisco Aironet AP handles the transmission of beacon frames and also handles responses to probe-request frames from clients
A Cisco Aironet solution includes intelligent Cisco Aironet access points (APs) and Cisco Catalyst switches
In the Cisco Aironet solution, each AP is locally configured by the use of either a web interface or the command line interface
The Cisco Aironet AP handles real-time portions of the LWAPP protocol, and the WLAN controller handles those items which are not time sensitive
Virtual MAC architecture allows the splitting of the 802.11 protocol between the Cisco Aironet AP and a LAN switch
第13题:

A. ACCESS1(config)# line console 0 ACCESS1(config-line)# password cisco
B. Remote27(config)# line console 0 Remote27(config-line)# login Remote27(config-line)# password cisco
C. ACCESS1(config)# line vty 0 4 ACCESS1(config-line)# login ACCESS1(config-line)# password cisco
D. Remote27(config)# line vty 0 4 Remote27(config-line)# login Remote27(config-line)# password cisco
E. ACCESS1(config)# enable password cisco
F. Remote27(config)# enable password cisco
第14题:
A.Allow unrestricted access to the console or VTY ports
B.Use a firewall to restrict access from the outside to the network devices
C.Always use Telnet to access the device command line because its data is automatically encrypted
D.Use SSH or another encrypted and authenticated transport to access device configurations
E.Prevent the loss of passwords by disabling password encryption
第15题:
Which one of the following commands would you enter to terminate a VTY line session?()
第16题:
配置路由器的telnet,只允许三个人同时以telnet访问该路由器,则正确的配置为()。
第17题:
Which statement best describes configuring access control lists to control Telnet traffic destined to therouter itself?()
第18题:
Which two statements about the Cisco AutoSecure feature are true?()
第19题:
Which commands is necessary to permit SSH or Telnet access to a cisco switch that is otherwise configured for these vty line protocols?()
第20题:
Refer to the exhibit.What is the effect of the configuration that is shown?()
第21题:
Company.com has encountered a problem on the HMC, which requires access to the root shell on the HMC. Which of the following is necessary to access the root userid on the HMC?()
第22题:
The ACL applied to the vty lines has no in or out option like ACL being applied to an interface.
The ACL is applied to the Telnet port with the ip access-group command.
The ACL must be applied to each vty line individually.
The ACL should be applied to all vty lines in the in direction to prevent an unwanted user from connecting to an unsecured port.
第23题:
It tells the router or switch to try establish an SSH connection first and if that fail to use telnet.
It configures a cisco network device to use the SSH protocol on incoming communications via the virtual terminal ports.
It allows seven failed login attempts before the VTY lines are temporarily shutdown.
It configures the virtual terminal lines with the password 030752180500.
It configures SSH globally for all logins.