试题详情
- 多项选择题What are two recommended ways of protecting network device configuration files from outside network security threats (Choose two.)()。
A、Allow unrestricted access to the console or VTY ports
B、Use a firewall to restrict access from the outside to the network devices
C、Always use Telnet to access the device command line because its data is automatically encrypted
D、Use SSH or another encrypted and authenticated transport to access device configurations
E、Prevent the loss of passwords by disabling password encryption
- B,D
关注下方微信公众号,在线模考后查看
热门试题
- Which three statemen
- The TestKing.com adm
- Whataddressshouldbec
- Internet中的用户远程登录,是指用
- Which one̳
- What is
- Which one̳
- Which statement abou
- A mobility&ens
- ClicktheExhibitbutto
- In the I
- Which one of the fol
- A standard three-yea
- What level&ensp
- You have
- Which three
- Which addition
- 单击某一物体两次后,可对其四角的控制点进
- Which three
- 有一台交换机上的所有用户都获取不了IP地