Which can be done to secure the virtual terminal interfaces on a router?()A、Administratively shut down the interfaces.B、Physically secure the interfaces.C、Configure a virtual terminal password and login process.D、Enter an access list and apply it to the terminal interfaces using the access-class command.E、Create an access list and apply it to the terminal interfaces using the access-groupc ommand.
Which can be done to secure the virtual terminal interfaces on a router?()
- A、Administratively shut down the interfaces.
- B、Physically secure the interfaces.
- C、Configure a virtual terminal password and login process.
- D、Enter an access list and apply it to the terminal interfaces using the access-class command.
- E、Create an access list and apply it to the terminal interfaces using the access-groupc ommand.
相关考题:
Which of the following can secure a term loan?A.Securities.B.Land and building.C.Accounts receivable.D.Inventory.
Which statement is true regarding online redefinition for the migration of BasicFile LOBs to SecureFile LOBs?() A. It cannot be done in parallel.B. It can be done at the table level or partition level.C. It does not require additional storage because the operation is done online.D. Local and global indexes are maintained automatically during the operation.
You wish to increase the security of all of the routers within your network. What can be done to secure the virtual terminal interfaces on a router?() A. Administratively shut down the interface.B. Physically secure the interface.C. Create an access list and apply it to the virtual terminal interfaces with the access-group command.D. Configure a virtual terminal password and login process.E. Enter an access list and apply it to the virtual terminal interfaces using the access-class command.
What can be done to secure the virtual terminal interfaces on a router?() A. Administratively shut down the interface.B. Physically secure the interface.C. Create an access list and apply it to the virtual terminal interfaces with the access-group command.D. Configure a virtual terminal password and login process.E. Enter an access list and apply it to the virtual terminal interfaces using the access-class command.
Which three statements about the secure domain router are true?()A、The logical router can span across chassis.B、The fabric and system controller module are shared by all logical routers.C、Each logical router has a distinct fabric and system controller moduleD、The logical router can share a route processorE、The logical router cannot share a route processor
A network administrator needs to configure port security on a switch.which two statements are true?()A、The network administrator can apply port security to dynamic access portsB、The network administrator can configure static secure or sticky secure mac addresses in the voice vlan.C、The sticky learning feature allows the addition of dynamically learned addresses to the runningconfiguration.D、The network administrator can apply port security to EtherChannels.E、When dynamic mac address learning is enabled on an interface,the switch can learn new addresses,up to the maximum defined.
A network administrator needs to configure port security on a switch.which two statements are true?()A、The network administrator can apply port security to dynamic access portsB、The network administrator can configure static secure or sticky secure mac addresses in the voice vlan.C、The sticky learning feature allows the addition of dynamically learned addresses to the running configuration.D、The network administrator can apply port security to EtherChannels.E、When dynamic mac address learning is enabled on an interface,the switch can learn new addresses,up to the maximum defined.
What are two ways with which a small business can keep a wireless business separate and secure from a wireless guest access network? () A、 auto-channel selectionB、 WMM QoSC、 802.11F roamingD、 multiple BSSIDsE、 802.1Q VLANsF、 AP detection
Which can be done to secure the virtual terminal interfaces on a router?()A、Administratively shut down the interfaces.B、Physically secure the interfaces.C、Configure a virtual terminal password and login process.D、Enter an access list and apply it to the terminal interfaces using the access-class command.E、Create an access list and apply it to the terminal interfaces using the access-group command
Which can be done to secure the virtual terminal interfaces on a router?()A、Administratively shut down the interfaces.B、Physically secure the interfaces.C、Configure a virtual terminal password and login process.D、Enter an access list and apply it to the terminal interfaces using the access-class command.E、Create an access list and apply it to the terminal interfaces using the access-group command.
Which two statements about the Cisco AutoSecure feature are true?()A、All passwords entered during the AutoSecure configuration must be a minimum of 8 characters in length.B、Cisco123 would be a valid password for both the enable password and the enable secret commands.C、The auto secure command can be used to secure the router login as well as the NTP and SSH protocols.D、For an interactive full session of AutoSecure, the auto secure login command should be used.E、If the SSH server was configured, the 1024 bit RSA keys are generated after the auto secure commandis enabled.
Of the threats discussed below, what is the main advantage of using Cisco Secure Desktop which is part of the Cisco ASA VPN solution?()A、 Secure desktop will create a completely separate computing environment thatwill be deleted when you are done.This ensures that no confidential data has been left on the shared/public computer.B、 Secure desktop is used to protect access to your registry and systemfiles when browsing to SSL/VPN protectedpages.C、 Secure Desktop ensures that an SSLprotected password cannotbe exploitedby a man in the middle attackusing a spoofed certificate.D、 Secure desktop hardens the operating system of the machines you are using at the time secure desktop islaunched.
What can be done to secure the virtual terminal interfaces on a router? ()A、Administratively shut down the interface.B、Physically secure the interface.C、Create an access list and apply it to the virtual terminal interfaces with the access-group command.D、Configure a virtual terminal password and login process.E、Enter an access list and apply it to the virtual terminal interfaces using the access-class command.
多选题Which three table transformations can be done using online redefinition of tables?()AABBCCDDEE
问答题Which same three letter word can be placed in front of the following words to make a new word? SIGN, DONE, DUCT, FOUND, FIRM, TRACT, DENSE
单选题Which statement is true regarding online redefinition for the migration of BasicFile LOBs to SecureFile LOBs?()A It cannot be done in parallel.B It can be done at the table level or partition level.C It does not require additional storage because the operation is done online.D Local and global indexes are maintained automatically during the operation.
单选题Which one of the Cisco IOS commands can be used to verify that either the Cisco IOS image, theconfiguration files,or both have been properly backed up and secured?()Ashow archiveBshow flashCshow file systemsDshow secure bootset
多选题Which three of these items are found within the router advertisement message of IPv6 stateless autoconfiguration?() (Choose three.)Aflags indicating the kind of autoconfiguration that can be done by hostsBdefault router informationC/64 prefix that can be used on the link and the lifetime of the prefixDIPv6 DHCP server address information
多选题You wish to increase the security of all of the routers within your network. What can be done to secure the virtual terminal interfaces on a router?()AAdministratively shut down the interface.BPhysically secure the interface.CCreate an access list and apply it to the virtual terminal interfaces with the access-group command.DConfigure a virtual terminal password and login process.EEnter an access list and apply it to the virtual terminal interfaces using the access-class command.
单选题Of the threats discussed below, what is the main advantage of using Cisco Secure Desktop which is part of the Cisco ASA VPN solution?()A Secure desktop will create a completely separate computing environment thatwill be deleted when you are done.This ensures that no confidential data has been left on the shared/public computer.B Secure desktop is used to protect access to your registry and systemfiles when browsing to SSL/VPN protectedpages.C Secure Desktop ensures that an SSLprotected password cannotbe exploitedby a man in the middle attackusing a spoofed certificate.D Secure desktop hardens the operating system of the machines you are using at the time secure desktop islaunched.
单选题Which type of MAC address is dynamically learned by a switch port and then added to the switch’s runningconfiguration?()AStatic secure MAC addressBDynamic secure MAC addressCPervasive secure MAC addressDSticky secure MAC address
单选题Which of the following needs to be done before a hard drive can be formatted?()ALabeledBRebootedCInitializedDDefragmented
单选题Which of the following statements may NOT be the weakness of payment in cash?AIt’s easily affected by mistakes.BIt may be distributed irregularly.CThere is possibility of robbery.DIt can be done conveniently.