单选题Which protocol should be used to establish a secure terminal connection to a remote network device?Select the best response.()AARPBSSHCTelnetDWEPESNMPv1FSNMPv2
单选题
Which protocol should be used to establish a secure terminal connection to a remote network device?Select the best response.()
A
ARP
B
SSH
C
Telnet
D
WEP
E
SNMPv1
F
SNMPv2
参考解析
解析:
暂无解析
相关考题:
Which method should be used to dynamically elect an RP when your network is using PIM version1?() A. auto-RPB. static RPC. discovery modeD. bootstrap protocol
Which IPsec security protocol should be used when confidentiality is required?() A. AHB. MD5C. PSKD. ESP
Which protocol should be used to establish a secure terminal connection to a remote network device? Select the best response.() A. ARPB. SSHC. TelnetD. WEPE. SNMPv1F. SNMPv2
Which protocol is an open standard protocol framework that is commonly used in VPNs,to provid secure end-to-end communication?() A. L2TPB. IPsecC. PPTPD.RSA
Which of the following is true regarding Label Distribution Protocol (LDP)?()A、It is a label distribution protocol for MPLSB、It is a set of procedures and messages by which LSRs establish Label Switch Paths (LSPs) through a networkC、Tag distribution Protocol (TDP) was the basis for LDPD、All of the above are true
Which protocol should be used to establish a secure terminal connection to a remote network device?Select the best response.()A、ARPB、SSHC、TelnetD、WEPE、SNMPv1F、SNMPv2
Which IPsec security protocol should be used when confidentiality is required?()A、AHB、MD5C、PSKD、ESP
Which statement describes the FIP function of the FCoE Initiation Protocol? ()A、 It is required to establish the point-to-point FCoE links with the first switch in the path.B、 It is required to establish the point-to-point FCoE links with any switch across multiple Ethernet segments.C、 It is not used to build the FCoE links.D、 It is used to ensure lossless transport.
Which protocol is an open standard protocol framework that is commonly used in VPNs,to provid secure end-to-end communication?()A、L2TPB、IPsecC、PPTPD、RSA
Which can be done to secure the virtual terminal interfaces on a router?()A、Administratively shut down the interfaces.B、Physically secure the interfaces.C、Configure a virtual terminal password and login process.D、Enter an access list and apply it to the terminal interfaces using the access-class command.E、Create an access list and apply it to the terminal interfaces using the access-group command
Which can be done to secure the virtual terminal interfaces on a router?()A、Administratively shut down the interfaces.B、Physically secure the interfaces.C、Configure a virtual terminal password and login process.D、Enter an access list and apply it to the terminal interfaces using the access-class command.E、Create an access list and apply it to the terminal interfaces using the access-group command.
Which two statements about the Cisco AutoSecure feature are true?()A、All passwords entered during the AutoSecure configuration must be a minimum of 8 characters in length.B、Cisco123 would be a valid password for both the enable password and the enable secret commands.C、The auto secure command can be used to secure the router login as well as the NTP and SSH protocols.D、For an interactive full session of AutoSecure, the auto secure login command should be used.E、If the SSH server was configured, the 1024 bit RSA keys are generated after the auto secure commandis enabled.
You work as a exchange administrator at TestKing.com. The TestKing.com network contains an internalnetwork as well as a perimeter network. The primeter network contains an Exchange Server 2010 EdgeTransport Server named TESTKING-EX. During the course of day you receive an instruction form the CIO to formulate a remote managementsolution for TESTKING-EX01 based on the set criteria below: You need to ensure that management traffic is encypted. You nedd to ensure that remote administration is permitted fron the Internet network.You need to ensure that Exchange Management Console (EMC) is supported. What should you do?()A、You should recommend that Windows Management Instrumentation Command-line (WMIC) be used.B、You should recommend that Lightweight Directory Access Protocol(LDAP)over Secure Socket Layer(SSL) be used.C、You should recommend that Windows Remote Management (WinRM) over SSL be used.D、You should recommend that Remote Desktop Protocol(RDP)over Secure Socket Layer(SSL)be used.
单选题You have a network containing 120 routers. You must establish and maintain connectivity between the loopback interfaces of all routers. Because of the critical services using the network, you need redundancy and fast failover. Which routing protocol should you use in this scenario?()AOSPFBRIPCBGPDstatic
单选题Your network consists of a single Active Directory domain. Remote Assistance is enabled on all computers. You need to ensure that you can establish Remote Assistance connections to all computers without a Remote Assistance invitation. Which group policy setting should you configure? ()AOffer Remote AssistanceBSolicited Remote AssistanceCAllow users to connect remotely using Terminal ServicesDSets rules for remote control of Terminal Services user sessions
单选题Which material should NOT be used to secure cargo on deck for a voyage().ASteel chainBWire ropeCSteel strappingDFiber rope
单选题Which method should be used to dynamically elect an RP when your network is using PIM version1?()Aauto-RPBstatic RPCdiscovery modeDbootstrap protocol
单选题Which protocol should be used to establish a secure terminal connection to a remote network device? Select the best response.()AARPBSSHCTelnetDWEPESNMPv1FSNMPv2
单选题Which of the following is true regarding Label Distribution Protocol (LDP)?()AIt is a label distribution protocol for MPLSBIt is a set of procedures and messages by which LSRs establish Label Switch Paths (LSPs) through a networkCTag distribution Protocol (TDP) was the basis for LDPDAll of the above are true
单选题Which statement describes the FIP function of the FCoE Initiation Protocol? ()A It is required to establish the point-to-point FCoE links with the first switch in the path.B It is required to establish the point-to-point FCoE links with any switch across multiple Ethernet segments.C It is not used to build the FCoE links.D It is used to ensure lossless transport.