单选题Which of the following is a secure method of copying information over a public network?()ASCPBSMTPCSNMPDTFTP
单选题
Which of the following is a secure method of copying information over a public network?()
A
SCP
B
SMTP
C
SNMP
D
TFTP
参考解析
解析:
暂无解析
相关考题:
Which of the following services use TCP? (Choose three)A. DHCPB. SMTPC. SNMPD. FTPE. HTTPF. TFTP
Which protocols are used to export and import configurations?() A. FTP or SCPB. FTP or TFTPC. TFTP or SCPD. TFTP or SMTP
Which of the following is a secure method of remote access via command line?() A.RCPB.TelnetC.RSHD.SSH
An administrator is implementing a wireless network. Which of the following encryption technologies is the MOST secure method and will authenticate devices to the network?() A.SSHB.WEPC.VPND.WPA
Which of the following protocols is the LEAST secure and should be avoided on a wireless network?() A.WEPB.PEAPC.WPAD.TKIP
Which of the following is a secure method of copying information over a public network?() A.SCPB.SMTPC.SNMPD.TFTP
Which of the following protocols should be used to monitor network performance?() A.SNTPB.SMTPC.HTTPD.SNMP
You are an administrator of a switched network and your goal is to reduce some of the administrative overhead on your network. You plan on achieving this by configuring a new VLAN for each department in your network. However, you need to share the VLAN information across numerous switches throughout your network.Which of the following would allow you accomplish this?()A.STPB.GVRPC.SNMPD.VTPE.DHCP
Which of the following are valid ports for printing over a network? ()A、USB 001B、//computername/sharenameC、SNMPD、IP_ip_addressE、IEEE 1394
For the following options, which feature is the foundation of Cisco Self-Defending Network technology?()A、secure network platformB、secure connectivityC、threat control and containmentD、policy management
Which of the following protocols is the LEAST secure and should be avoided on a wireless network?()A、WEPB、PEAPC、WPAD、TKIP
An administrator is concerned about users utilizing the company's wireless signal with their personal laptops. Which of the following is the BEST method to use to prevent unauthorized devices from using the company's wireless network?()A、Secure VPNB、MAC filteringC、IP filteringD、Static IP addresses
Which protocols are used to export and import configurations?()A、FTP or SCPB、FTP or TFTPC、TFTP or SCPD、TFTP or SMTP
Which of the following is a secure method of copying information over a public network?()A、SCPB、SMTPC、SNMPD、TFTP
Which of the following describes a secure connection over the Internet between two sites?()A、FTPB、VLANC、VPND、HTTP
Which of the following protocols should be used to monitor network performance?()A、SNTPB、SMTPC、HTTPD、SNMP
An administrator is implementing a wireless network. Which of the following encryption technologies is the MOST secure method and will authenticate devices to the network?()A、SSHB、WEPC、VPND、WPA
Which of the following is a secure method of remote access via command line?()A、RCPB、TelnetC、RSHD、SSH
Which of the following provides the underlying trust infrastructure to enable easy and secure sharing of information organizations and in cross-premises organizations?()A、Public Key InfrastructureB、Role-based access controlC、FederationD、Digital certificate
单选题Which of the following is a secure method of remote access via command line?()ARCPBTelnetCRSHDSSH
单选题Which of the following protocols is the LEAST secure and should be avoided on a wireless network?()AWEPBPEAPCWPADTKIP
单选题Which of the following logical network topologies is used to provide a secure connection acrossthe Internet?()AVLANBPeer to PeerCVTPDVPN
单选题Which of the following describes a secure connection over the Internet between two sites?()AFTPBVLANCVPNDHTTP
单选题An administrator is implementing a wireless network. Which of the following encryption technologies is the MOST secure method and will authenticate devices to the network?()ASSHBWEPCVPNDWPA