单选题Which of the following is a secure method of copying information over a public network?()ASCPBSMTPCSNMPDTFTP

单选题
Which of the following is a secure method of copying information over a public network?()
A

SCP

B

SMTP

C

SNMP

D

TFTP


参考解析

解析: 暂无解析

相关考题:

Which of the following services use TCP? (Choose three)A. DHCPB. SMTPC. SNMPD. FTPE. HTTPF. TFTP

Which protocols are used to export and import configurations?() A. FTP or SCPB. FTP or TFTPC. TFTP or SCPD. TFTP or SMTP

Which protocol is used to transfer files to on the ERX Edge Router?() A.SCPB.FTPC.RCPD.TFTP

Which of the following is a secure method of remote access via command line?() A.RCPB.TelnetC.RSHD.SSH

An administrator is implementing a wireless network. Which of the following encryption technologies is the MOST secure method and will authenticate devices to the network?() A.SSHB.WEPC.VPND.WPA

Which of the following protocols is the LEAST secure and should be avoided on a wireless network?() A.WEPB.PEAPC.WPAD.TKIP

Which of the following is a secure method of copying information over a public network?() A.SCPB.SMTPC.SNMPD.TFTP

Which of the following protocols should be used to monitor network performance?() A.SNTPB.SMTPC.HTTPD.SNMP

You are an administrator of a switched network and your goal is to reduce some of the administrative overhead on your network. You plan on achieving this by configuring a new VLAN for each department in your network. However, you need to share the VLAN information across numerous switches throughout your network.Which of the following would allow you accomplish this?()A.STPB.GVRPC.SNMPD.VTPE.DHCP

Which of the following are valid ports for printing over a network? ()A、USB 001B、//computername/sharenameC、SNMPD、IP_ip_addressE、IEEE 1394

For the following options, which feature is the foundation of Cisco Self-Defending Network technology?()A、secure network platformB、secure connectivityC、threat control and containmentD、policy management

Which of the following services use TCP?()A、DHCPB、SMTPC、SNMPD、FTPE、HTTPF、TFTP

Which of the following protocols is the LEAST secure and should be avoided on a wireless network?()A、WEPB、PEAPC、WPAD、TKIP

An administrator is concerned about users utilizing the company's wireless signal with their personal laptops. Which of the following is the BEST method to use to prevent unauthorized devices from using the company's wireless network?()A、Secure VPNB、MAC filteringC、IP filteringD、Static IP addresses

Which protocols are used to export and import configurations?()A、FTP or SCPB、FTP or TFTPC、TFTP or SCPD、TFTP or SMTP

Which protocol is used to transfer files to on the ERX Edge Router?()A、SCPB、FTPC、RCPD、TFTP

Which of the following is a secure method of copying information over a public network?()A、SCPB、SMTPC、SNMPD、TFTP

Which of the following describes a secure connection over the Internet between two sites?()A、FTPB、VLANC、VPND、HTTP

Which of the following protocols should be used to monitor network performance?()A、SNTPB、SMTPC、HTTPD、SNMP

An administrator is implementing a wireless network. Which of the following encryption technologies is the MOST secure method and will authenticate devices to the network?()A、SSHB、WEPC、VPND、WPA

Which of the following is a secure method of remote access via command line?()A、RCPB、TelnetC、RSHD、SSH

Which of the following provides the underlying trust infrastructure to enable easy and secure sharing of information organizations and in cross-premises organizations?()A、Public Key InfrastructureB、Role-based access controlC、FederationD、Digital certificate

单选题Which of the following is a secure method of remote access via command line?()ARCPBTelnetCRSHDSSH

单选题Which of the following protocols is the LEAST secure and should be avoided on a wireless network?()AWEPBPEAPCWPADTKIP

单选题Which of the following logical network topologies is used to provide a secure connection acrossthe Internet?()AVLANBPeer to PeerCVTPDVPN

单选题Which of the following describes a secure connection over the Internet between two sites?()AFTPBVLANCVPNDHTTP

单选题An administrator is implementing a wireless network. Which of the following encryption technologies is the MOST secure method and will authenticate devices to the network?()ASSHBWEPCVPNDWPA