试题详情
- 多项选择题What are two recommended ways of protecting network device configuration files from outside network security threats? (Choose two.)()
A、Allow unrestricted access to the console or VTY ports.
B、Use a firewall to restrict access from the outside to the network devices.
C、Always use Telnet to access the device command line because its data is automatically encrypted.
D、Use SSH or another encrypted and authenticated transport to access device configurations.
E、Prevent the loss of passwords by disabling password encryption.
- B,D
关注下方微信公众号,在线模考后查看
热门试题
- By default,
- Which of
- A customerQ
- 局域网中的一台PC机,其IP地址为10.
- Refer to t
- Cisco Catalyst switc
- What is the goal of
- 下列关于地址转换的描述,正确的是()。
- When creating&
- What is the effect o
- What can
- Refertothetopologysh
- Refer to t
- Which of
- Where does routing o
- Which of the followi
- Which of the followi
- 请参见图示。在路由器R1的特权模式下输入
- The cisco ironport p
- 在“打印机和传真”窗口中,选择其窗口左侧