多选题Which three techniques should be used to secure management protocols?()AConfigure SNMP with only read-only community strings.BEncrypt TFTP and syslog traffic in an IPSec tunnel.CImplement RFC 3704 filtering at the perimeter router when allowing syslog access from devices on the outside of a firewall.DSynchronize the NTP master clock with an Internet atomic clock.EUse SNMP version 2.FUse TFTP version 3 or above because these versions support a cryptographic authentication mechanism between peers.

多选题
Which three techniques should be used to secure management protocols?()
A

Configure SNMP with only read-only community strings.

B

Encrypt TFTP and syslog traffic in an IPSec tunnel.

C

Implement RFC 3704 filtering at the perimeter router when allowing syslog access from devices on the outside of a firewall.

D

Synchronize the NTP master clock with an Internet atomic clock.

E

Use SNMP version 2.

F

Use TFTP version 3 or above because these versions support a cryptographic authentication mechanism between peers.


参考解析

解析: 暂无解析

相关考题:

Which protocol should be used to establish a secure terminal connection to a remote network device? Select the best response.() A. ARPB. SSHC. TelnetD. WEPE. SNMPv1F. SNMPv2

A()is a set of procedures or a collection of techniques used in a systematic way which it is hoped will result in efficient learning.

For the following options, which feature is the foundation of Cisco Self-Defending Network technology?()A、secure network platformB、secure connectivityC、threat control and containmentD、policy management

Which three critical elements does the Cisco Integrated Security Solution incorporate?()A、Cisco Storage SolutionB、Cisco Threat Defense SolutionC、Cisco Trust and Identity Management SolutionD、Cisco Switching SolutionE、Cisco Content Networking SolutionF、Cisco Secure Connectivity

You are a network technician at Certpaper.com. Which description is correct when you have generated RSA keys on your Cisco router to prepare for secure device management?()A、You must then specify the general-purpose key size used for authentication with the crypto key generaters a general-keys modulus command.B、You must then zeroize the keys to reset secure shell before configuring other parameters.C、All vty ports are automatically enabled for SSH to provide secure management.D、The SSH protocol is automatically enabled.

Which protocol should be used to establish a secure terminal connection to a remote network device?Select the best response.()A、ARPB、SSHC、TelnetD、WEPE、SNMPv1F、SNMPv2

Which three of the following network features are methods used to achieve high availability()A、Spanning Tree Protocol(STP)B、Delay reductionC、Hot Standby Routing Protocol(HSRP)D、Dynamic routing protocolsE、Quality of Service(QoS)F、Jitter management

Which two statements about the Cisco AutoSecure feature are true?()A、All passwords entered during the AutoSecure configuration must be a minimum of 8 characters in length.B、Cisco123 would be a valid password for both the enable password and the enable secret commands.C、The auto secure command can be used to secure the router login as well as the NTP and SSH protocols.D、For an interactive full session of AutoSecure, the auto secure login command should be used.E、If the SSH server was configured, the 1024 bit RSA keys are generated after the auto secure commandis enabled.

Which three mechanisms are used to secure management traffic from outside IPS sensors?()A、secure tunnelsB、a separate management VLANC、secure VLANs to isolate sensorsD、an out-of-band path around the firewallE、asymmetric traffic flows to isolate sensorsF、private VLANs to put all sensors on isolated ports

Your company plans on migrating their network from IPv4 to IPv6 in the near future. Which three techniques can be used to transition from IPv4 to IPv6?()A、Dual stackB、NATC、Flow labelD、Mobile IPE、6to4 tunnelingF、AnycastG、MBGP

When trying to sell a security solution to an e-commerce business, which three business needs should you address?()A、secure transactionsB、time to marketC、maximum uptimeD、database backupsE、revenue growthF、scalability for future growth

A server is configured with two network cards. To utilize the bandwidth of both network cards at the same time without assigning more than one IP address, which of the following load balancing techniques should be used?()A、ClusteringB、NIC teamingC、OSPFD、VLAN tagging

A server is configured with two network cards. To utilize the band width of both network cards at the same time without assigning more than one IP address,which of the following load balancing techniques should be used?()A、 ClusteringB、 NIC teamingC、 OSPFD、 VLAN tagging

Which of the following should be changed to secure access to a WAPs configuration management interface?()A、SSIDB、WPA2C、DHCPD、Password

In the customer’s environment, a group of five employees work within a room that has three PCs. The PCs have excellent hardware configurations, with considerable RAM and a fast CPU. The employees use these PCs only when they need to access an application, which is for a short duration of time. For the rest of the time, they work with their tools on their desks. Which IBM Tivoli Access Manager for Enterprise Single Sign-On session management configuration should be used for these three PCs for optimum performance?()A、Citrix workstationB、personal workstationC、shared workstation, private desktopD、shared workstation, shared desktop

You are creating a locally managed tablespace to meet the following requirements: All the extents should be of the same size.  The data should be spread across two data files.  A bitmap should be used to record the free space within the allocated extents. Which three options would you choose?()A、set PCTFREE and PCTUSED to 50B、specify extent allocation as UniformC、specify extent allocation as AutomaticD、create the tablespace as bigfile tablespaceE、create the tablespace as smallfile tablespaceF、set segment space management to AutomaticG、use the RESIZE clause while creating the tablespace

You work as a exchange administrator at TestKing.com. The TestKing.com network contains an internalnetwork as well as a perimeter network. The primeter network contains an Exchange Server 2010 EdgeTransport Server named TESTKING-EX. During the course of day you receive an instruction form the CIO to formulate a remote managementsolution for TESTKING-EX01 based on the set criteria below: You need to ensure that management traffic is encypted. You nedd to ensure that remote administration is permitted fron the Internet network.You need to ensure that Exchange Management Console (EMC) is supported. What should you do?()A、You should recommend that Windows Management Instrumentation Command-line (WMIC) be used.B、You should recommend that Lightweight Directory Access Protocol(LDAP)over Secure Socket Layer(SSL) be used.C、You should recommend that Windows Remote Management (WinRM) over SSL be used.D、You should recommend that Remote Desktop Protocol(RDP)over Secure Socket Layer(SSL)be used.

Service Focal Point, Inventory Scout, and DLPAR rely on correct setup and networking between the HMC and the logical partitions. Which authentication method is used to control session management, but also authentication between network peers?()A、KerberosB、Domain Name ServerC、Secure Sockets LayerD、Resource Monitoring and Control

多选题Which three mechanisms are used to secure management traffic from outside IPS sensors?()Asecure tunnelsBa separate management VLANCsecure VLANs to isolate sensorsDan out-of-band path around the firewallEasymmetric traffic flows to isolate sensorsFprivate VLANs to put all sensors on isolated ports

单选题Which material should NOT be used to secure cargo on deck for a voyage().ASteel chainBWire ropeCSteel strappingDFiber rope

多选题Which two statements about the Cisco AutoSecure feature are true?()AAll passwords entered during the AutoSecure configuration must be a minimum of 8 characters in length.BCisco123 would be a valid password for both the enable password and the enable secret commands.CThe auto secure command can be used to secure the router login as well as the NTP and SSH protocols.DFor an interactive full session of AutoSecure, the auto secure login command should be used.EIf the SSH server was configured, the 1024 bit RSA keys are generated after the auto secure commandis enabled.

多选题Which three critical elements does the Cisco Integrated Security Incorporate?()ACisco Trust and Identity Management SolutionBCisco Secure Connectivity SolutionCCisco Threat Defense SolutionDCisco Switching SolutionECisco Storage SolutionFCisco Content Networking Solution

单选题You are a network technician at Certpaper.com. Which description is correct when you have generated RSA keys on your Cisco router to prepare for secure device management?()AYou must then specify the general-purpose key size used for authentication with the crypto key generaters a general-keys modulus command.BYou must then zeroize the keys to reset secure shell before configuring other parameters.CAll vty ports are automatically enabled for SSH to provide secure management.DThe SSH protocol is automatically enabled.

多选题Which three of the following network features are methods used to achieve high availability?()ASpanning Tree Protocol (STP)BDelay reductionCHot Standby Routing Protocol (HSRP)DDynamic routing protocolsEQuality of Service (QoS)FJitter management

单选题Which protocol should be used to establish a secure terminal connection to a remote network device? Select the best response.()AARPBSSHCTelnetDWEPESNMPv1FSNMPv2

多选题Which three techniques should be used to secure management protocols?()AConfigure SNMP with only read-only community strings.BEncrypt TFTP and syslog traffic in an IPSec tunnel.CImplement RFC 3704 filtering at the perimeter router when allowing syslog access from devices on the outside of a firewall.DSynchronize the NTP master clock with an Internet atomic clock.EUse SNMP version 2.FUse TFTP version 3 or above because these versions support a cryptographic authentication mechanism between peers.

多选题Your company plans on migrating their network from IPv4 to IPv6 in the near future. Which three techniques can be used to transition from IPv4 to IPv6?()ADual stackBNATCFlow labelDMobile IPE6to4 tunnelingFAnycastGMBGP

多选题Which three statements are true about the Internet Group Management Protocol (IGMP)? ()AThere are three IGMP modes: dense mode, sparse mode, and sparse - dense modeBIGMP is used to register individual hosts with a multicast groupCIGMP version 3 enables a multicast receiving host to specify to the router which sources it should forward traffic fromDIGMP messages a re IP datagrams with a protocol value of 2, destination address of 224.0.0.2, and a TTL value of 1EIGMP is a multicast routing protocol that makes packet - forwarding decisions independent of other routing protocols such as EIGRPFIGMP snooping ru ns on Layer 3 routers