第1题:
A.Secure shell
B.Secure sessionhost
C.Secure session home
D.Session shell
第2题:
第3题:
Which of the following is a secure method of copying information over a public network?()
第4题:
Which protocol should be used to establish a secure terminal connection to a remote network device?Select the best response.()
第5题:
Which two statements about the Cisco AutoSecure feature are true?()
第6题:
SSH是下面哪个英语词缩写().
第7题:
Which of the following is a secure method of remote access via command line?()
第8题:
You work as a exchange administrator at TestKing.com. The TestKing.com network contains an internalnetwork as well as a perimeter network. The primeter network contains an Exchange Server 2010 EdgeTransport Server named TESTKING-EX. During the course of day you receive an instruction form the CIO to formulate a remote managementsolution for TESTKING-EX01 based on the set criteria below: You need to ensure that management traffic is encypted. You nedd to ensure that remote administration is permitted fron the Internet network.You need to ensure that Exchange Management Console (EMC) is supported. What should you do?()
第9题:
WEP encryption
Channel rotation
Disable SSID
WPA encryption
第10题:
All passwords entered during the AutoSecure configuration must be a minimum of 8 characters in length.
Cisco123 would be a valid password for both the enable password and the enable secret commands.
The auto secure command can be used to secure the router login as well as the NTP and SSH protocols.
For an interactive full session of AutoSecure, the auto secure login command should be used.
If the SSH server was configured, the 1024 bit RSA keys are generated after the auto secure commandis enabled.
第11题:
You must then specify the general-purpose key size used for authentication with the crypto key generaters a general-keys modulus command.
You must then zeroize the keys to reset secure shell before configuring other parameters.
All vty ports are automatically enabled for SSH to provide secure management.
The SSH protocol is automatically enabled.
第12题:
Deploy one Microsoft SharePoint Foundation 2010 site. Require users to access the SharePoint site by using a Secure Socket Transmission Protocol (SSTP) connection.
Deploy two Microsoft SharePoint Foundation 2010 sites.Configure one site for internal users. Configure the other site for remote users. Publish the SharePoint sites by using HTTPS.
Configure a Network Policy and Access Services (NPAS) server to act as a VPN server. Require remote users to access the files by using an IPsec connection to the VPN server.
Store all sensitive files in folders that are encrypted by using Encrypting File System (EFS). Require remote users to access the files by using Secure Socket Transmission Protocol (SSTP).
第13题:
第14题:
You are a network technician at Certpaper.com. Which description is correct when you have generated RSA keys on your Cisco router to prepare for secure device management?()
第15题:
SSH协议作为一种安全的远程登录协议,被广泛应用,关于SSH正确的是()。
第16题:
The Testking network is implementing dialup services for their remote employees.Testking uses several different Layer 3 protocols on the network. Authentication ofthe users connecting to the network is required for security. Additionally, some employees will be dialing long distance and will need callback support.Which protocol is the best choice for these remote access services?()
第17题:
As a network technician, do you know what is a recommended practice for secure configurationmanagement?()
第18题:
Refer to the exhibit.What is the effect of the configuration that is shown?()
第19题:
Companycom informs the system administrator that there is concern about the Electronic Service Agent and security. What can be said about Electronic Service Agent that will address concerns about security?()
第20题:
Your network contains a server named Server1 that has the Routing role service installed. Server1 has two network connections. One network connection connects to the internal network. The other network connection connects to the Internet.All network connections connected to the internal network use private IP addresses. You install a Web server named Web1. Web1 hosts a secured Web site that only allows connections over TCP port 8281. Web1 is connected to the internal network.You need to ensure that the secure Web site can be accessed from the Internet.What should you do from the Routing and Remote Access console?()
第21题:
It tells the router or switch to try establish an SSH connection first and if that fail to use telnet.
It configures a cisco network device to use the SSH protocol on incoming communications via the virtual terminal ports.
It allows seven failed login attempts before the VTY lines are temporarily shutdown.
It configures the virtual terminal lines with the password 030752180500.
It configures SSH globally for all logins.
第22题:
802.1
Framerelay
HDLC
PPP
SLIP
PAP
第23题:
ARP
SSH
Telnet
WEP
SNMPv1
SNMPv2