多选题Which can be done to secure the virtual terminal interfaces on a router?()AAdministratively shut down the interfaces.BPhysically secure the interfaces.CConfigure a virtual terminal password and login process.DEnter an access list and apply it to the terminal interfaces using the access-class command.ECreate an access list and apply it to the terminal interfaces using the access-groupc ommand.

多选题
Which can be done to secure the virtual terminal interfaces on a router?()
A

Administratively shut down the interfaces.

B

Physically secure the interfaces.

C

Configure a virtual terminal password and login process.

D

Enter an access list and apply it to the terminal interfaces using the access-class command.

E

Create an access list and apply it to the terminal interfaces using the access-groupc ommand.


参考解析

解析: 暂无解析

相关考题:

Each student can have a terminal to use now, which can help them study.()

RMAN provides more granular catalog security through which feature?() A. Virtual private databaseB. Virtual private catalogC. RMAN virtual databaseD. RMAN secure catalogE. Oracle Database Vault

Which statement describes a security zone?() A. A security zone can contain one or more interfaces.B. A security zone can contain interfaces in multiple routing instances.C. A security zone must contain two or more interfaces.D. A security zone must contain bridge groups.

You wish to increase the security of all of the routers within your network. What can be done to secure the virtual terminal interfaces on a router?() A. Administratively shut down the interface.B. Physically secure the interface.C. Create an access list and apply it to the virtual terminal interfaces with the access-group command.D. Configure a virtual terminal password and login process.E. Enter an access list and apply it to the virtual terminal interfaces using the access-class command.

What can be done to secure the virtual terminal interfaces on a router?() A. Administratively shut down the interface.B. Physically secure the interface.C. Create an access list and apply it to the virtual terminal interfaces with the access-group command.D. Configure a virtual terminal password and login process.E. Enter an access list and apply it to the virtual terminal interfaces using the access-class command.

Which two commands can be used to verify a trunk link configuration status on a given cisco switch?() A.show interfaces interfaceB.show interfaces trunkC.show interfaces switchportD.show ip interface briefE.show interfaces vlan

Which two commands can be used to verify a trunk link configurationt status on a given cisco switch?() A.show interfaces interfaceB.show interfaces interface trunkC.show interfaces interface switchportD.show ip interface briefE.show interfaces vlan

Which two factors determine the recommended maximum number of virtual interfaces on a Cisco UCSsystem?()A、the number of computer blades in the systemB、the number of interfaces sharing the uplinksC、the driver version on the OS running on the computer bladeD、the number of uplinks between I/O Module and Fabric Interconnect

Which statement is true about the SDM QoS wizard and its ability to enable a QoS policy on router interfaces?()A、QoS can be enabled on interfaces used for Easy VPN clientsB、QoS can be enabled on IPsec VPN interfaces and tunnelsC、QoS can be enabled on interfaces with an existing QoS policyD、the QoS policy can be enabled for incoming and outgoing traffic on the interface

RMAN provides more granular catalog security through which feature?()A、Virtual private databaseB、Virtual private catalogC、RMAN virtual databaseD、RMAN secure catalogE、Oracle Database Vault

Which protocol should be used to establish a secure terminal connection to a remote network device?Select the best response.()A、ARPB、SSHC、TelnetD、WEPE、SNMPv1F、SNMPv2

Which can be done to secure the virtual terminal interfaces on a router?()A、Administratively shut down the interfaces.B、Physically secure the interfaces.C、Configure a virtual terminal password and login process.D、Enter an access list and apply it to the terminal interfaces using the access-class command.E、Create an access list and apply it to the terminal interfaces using the access-group command

Which can be done to secure the virtual terminal interfaces on a router?()A、Administratively shut down the interfaces.B、Physically secure the interfaces.C、Configure a virtual terminal password and login process.D、Enter an access list and apply it to the terminal interfaces using the access-class command.E、Create an access list and apply it to the terminal interfaces using the access-group command.

Which two commands can be used to verify a trunk link configuration status on a given cisco switch?()A、show interfaces interfaceB、show interfaces trunkC、show interfaces switchportD、show ip interface briefE、show interfaces vlan

Which two commands can be used to verify a trunk link configurationt status on a given cisco switch?()A、show interfaces interfaceB、show interfaces interface trunkC、show interfaces interface switchportD、show ip interface briefE、show interfaces vlan

Which statement about SAN port channels configured on Cisco Nexus 5000 Series Switches is true?()  A、 A single SAN port channel can have both Fibre Channel and virtual Fibre Channel interfaces. B、 SAN port channels can include up to 16 interfaces.C、 SAN port channels distribute traffic across all links in the port channel when source ID and destination ID load balancing are used.D、 The links in SAN port channels can be connected to different sets of switches.E、 The On mode of operation means ports only operate as part of a SAN port channel or remain inactive.

What can be done to secure the virtual terminal interfaces on a router? ()A、Administratively shut down the interface.B、Physically secure the interface.C、Create an access list and apply it to the virtual terminal interfaces with the access-group command.D、Configure a virtual terminal password and login process.E、Enter an access list and apply it to the virtual terminal interfaces using the access-class command.

When creating a Virtual Ethernet adapter, which of the following steps is done FIRST?()A、Generate a unique MAC address.B、Run cfgmgr to create device special files.C、Create a virtual device with "smitty vlan".D、Add a virtual Ethernet adapter to the partition profile.

Regarding secure tunnel (st) interfaces, which statement is true?()A、You cannot assign st interfaces to a security zone.B、You cannot apply static NAT on an st interface logical unit.C、st interfaces are optional when configuring a route-based VPND、A static route can reference the st interface logical unit as the next-hop

单选题Which statement describes a security zone?()AA security zone can contain one or more interfaces.BA security zone can contain interfaces in multiple routing instances.CA security zone must contain two or more interfaces.DA security zone must contain bridge groups.

多选题Which two commands can be used to verify a trunk link configuration status on a given cisco switch?()Ashow interfaces interfaceBshow interfaces trunkCshow interfaces switchportDshow ip interface briefEshow interfaces vlan

多选题You wish to increase the security of all of the routers within your network. What can be done to secure the virtual terminal interfaces on a router?()AAdministratively shut down the interface.BPhysically secure the interface.CCreate an access list and apply it to the virtual terminal interfaces with the access-group command.DConfigure a virtual terminal password and login process.EEnter an access list and apply it to the virtual terminal interfaces using the access-class command.

多选题When policy - based routing (PBR) is being configured, which three criteria can the set command specify?()Aall interfaces in the path toward the destinationBall networks in the path toward the destinationCadjacent next hop router in the path toward the destinationDall routers in the path toward the destinationEall interfaces through which the packets can be routedFtype of service and precedence in the IP packets

单选题Companycom will be using Virtual IO Server to share Ethernet adapters. What can be done to prevent network failure of the client if a Virtual IO Server goes down?()ACreate two virtual adapters on the client, each one from a separate Virtual IO ServerBEnable dead gateway detection on the client so that the network traffic can be reroutedCHave a spare network card on standby in the client in case the Virtual IO Server goes downDCreate an etherchannel adapter on the client using one Virtual Ethernet adapter from two separate Virtual IO Servers

单选题Which protocol should be used to establish a secure terminal connection to a remote network device? Select the best response.()AARPBSSHCTelnetDWEPESNMPv1FSNMPv2

多选题Which two commands can be used to verify a trunk link configurationt status on a given cisco switch?()Ashow interfaces interfaceBshow interfaces interface trunkCshow interfaces interface switchportDshow ip interface briefEshow interfaces vlan

单选题RMAN provides more granular catalog security through which feature?()A Virtual private databaseB Virtual private catalogC RMAN virtual databaseD RMAN secure catalogE Oracle Database Vault

单选题Which statement about SAN port channels configured on Cisco Nexus 5000 Series Switches is true?()A A single SAN port channel can have both Fibre Channel and virtual Fibre Channel interfaces. B SAN port channels can include up to 16 interfaces.C SAN port channels distribute traffic across all links in the port channel when source ID and destination ID load balancing are used.D The links in SAN port channels can be connected to different sets of switches.E The On mode of operation means ports only operate as part of a SAN port channel or remain inactive.