Which can be done to secure the virtual terminal interfaces on a router?() A.Administratively shut down the interfaces.B.Physically secure the interfaces.C.Configure a virtual terminal password and login process.D.Enter an access list and apply it to the terminal interfaces using the access-class command.E.Create an access list and apply it to the terminal interfaces using the access-group command.

Which can be done to secure the virtual terminal interfaces on a router?()

A.Administratively shut down the interfaces.

B.Physically secure the interfaces.

C.Configure a virtual terminal password and login process.

D.Enter an access list and apply it to the terminal interfaces using the access-class command.

E.Create an access list and apply it to the terminal interfaces using the access-group command.


相关考题:

阅读下面的短文,回答问题 [When an IP packet arrives at a router, generally the router looks at the destination address of the packet, and forwards the packet to one of its network interfaces. The forwarding decision is usually done by looking up the destination address from another data structure called a forwarding table. The forwarding table is created by the router using the routing table and possible routing policies existing in the router. The router then creates a table where it lists which networks are accessible through which of the routers network interfaces. An IP router looks at every IP packet individually and does the forwarding decision on a packet-by-packet basis. If something changes in the routers routing table, a packet can take a different route from a preceding packet even if it has the same destination.] From the paragraph above,we can see that the router ( ) a forwarding table according to the routing table and possible routing policies existing in the router. When an IP packet arrives at a router, the ( ) part of packet is normally checked by the router. An IP router checks every IP Packet individually and makes the forwarding decision based on ( ).A.is generating B.generate C.is generated D.generates A.forwarding table B.network interfaces C.routing policies D.destination address A.the destination address and network interfaces B.forwarding table and network interfaces C.the destination address and forward table D.routing policies and routing table

When policy - based routing (PBR) is being configured, which three criteria can the set command specify?() A. all interfaces in the path toward the destinationB. all networks in the path toward the destinationC. adjacent next hop router in the path toward the destinationD. all routers in the path toward the destinationE. all interfaces through which the packets can be routedF. type of service and precedence in the IP packets

Which router IOS commands can be used to troubleshoot LAN connectivity problems?() A. PingB. TracertC. IpconfigD. Show ip routeE. WinipcfgF. Show interfaces

You wish to increase the security of all of the routers within your network. What can be done to secure the virtual terminal interfaces on a router?() A. Administratively shut down the interface.B. Physically secure the interface.C. Create an access list and apply it to the virtual terminal interfaces with the access-group command.D. Configure a virtual terminal password and login process.E. Enter an access list and apply it to the virtual terminal interfaces using the access-class command.

What can be done to secure the virtual terminal interfaces on a router?() A. Administratively shut down the interface.B. Physically secure the interface.C. Create an access list and apply it to the virtual terminal interfaces with the access-group command.D. Configure a virtual terminal password and login process.E. Enter an access list and apply it to the virtual terminal interfaces using the access-class command.

Which router IOS commands can be used to troubleshoot LAN connectivity problems? () A.pingB.tracertC.ipconfigD.show ip routeE.winipcfgF.show interfaces

When policy - based routing (PBR) is being configured, which three criteria can the set command specify?()A、all interfaces in the path toward the destinationB、all networks in the path toward the destinationC、adjacent next hop router in the path toward the destinationD、all routers in the path toward the destinationE、all interfaces through which the packets can be routedF、type of service and precedence in the IP packets

Which three statements about the secure domain router are true?()A、The logical router can span across chassis.B、The fabric and system controller module are shared by all logical routers.C、Each logical router has a distinct fabric and system controller moduleD、The logical router can share a route processorE、The logical router cannot share a route processor

Which statement is true about the SDM QoS wizard and its ability to enable a QoS policy on router interfaces?()A、QoS can be enabled on interfaces used for Easy VPN clientsB、QoS can be enabled on IPsec VPN interfaces and tunnelsC、QoS can be enabled on interfaces with an existing QoS policyD、the QoS policy can be enabled for incoming and outgoing traffic on the interface

What is a method by which an IP interface can be assigned to a virtual router in a PPP over ATM environment?()A、policy listB、RADIUS VSAC、classifier ACLD、LCP negotiation

Which router IOS commands can be used to troubleshoot LAN connectivity problems?()A、pingB、tracertC、ipconfigD、show ip routeE、winipcfgF、show interfaces

Which can be done to secure the virtual terminal interfaces on a router?()A、Administratively shut down the interfaces.B、Physically secure the interfaces.C、Configure a virtual terminal password and login process.D、Enter an access list and apply it to the terminal interfaces using the access-class command.E、Create an access list and apply it to the terminal interfaces using the access-group command

Which can be done to secure the virtual terminal interfaces on a router?()A、Administratively shut down the interfaces.B、Physically secure the interfaces.C、Configure a virtual terminal password and login process.D、Enter an access list and apply it to the terminal interfaces using the access-class command.E、Create an access list and apply it to the terminal interfaces using the access-group command.

What can be done to secure the virtual terminal interfaces on a router? ()A、Administratively shut down the interface.B、Physically secure the interface.C、Create an access list and apply it to the virtual terminal interfaces with the access-group command.D、Configure a virtual terminal password and login process.E、Enter an access list and apply it to the virtual terminal interfaces using the access-class command.

Regarding secure tunnel (st) interfaces, which statement is true?()A、You cannot assign st interfaces to a security zone.B、You cannot apply static NAT on an st interface logical unit.C、st interfaces are optional when configuring a route-based VPND、A static route can reference the st interface logical unit as the next-hop

单选题Refer to the exhibit. Which Virtual Router Redundancy Protocol (VRRP) statement is true about the roles of the master virtual router and the backup virtual router?()A Router A is the master virtual router, and Router B is the backup virtual router. When Router A fails, Router B will become the master virtual router. When Router A recovers, Router B will maintain the role of master virtual routeB Router A is the master virtual router, and Router B is the backup virtual router. When Router A fails, Router B will become the master virtual router. When Router A recovers, it will regain the master virtual router roleC Router B is the master virtual router, and Router A is the backup virtual router. When Router B fails, Router A will become the master virtual router. When Router B recovers, Router A will maintain the role of master virtual router.D Router B is the master virtual router, and Router A is the backup virtual router. When Router B fails, Router A will become the master virtual router. When Router B recovers, it will regain the master virtual router role

多选题Which three statements about the secure domain router are true?()AThe logical router can span across chassis.BThe fabric and system controller module are shared by all logical routers.CEach logical router has a distinct fabric and system controller moduleDThe logical router can share a route processorEThe logical router cannot share a route processor

多选题Which three of these items are found within the router advertisement message of IPv6 stateless autoconfiguration?() (Choose three.)Aflags indicating the kind of autoconfiguration that can be done by hostsBdefault router informationC/64 prefix that can be used on the link and the lifetime of the prefixDIPv6 DHCP server address information

多选题You wish to increase the security of all of the routers within your network. What can be done to secure the virtual terminal interfaces on a router?()AAdministratively shut down the interface.BPhysically secure the interface.CCreate an access list and apply it to the virtual terminal interfaces with the access-group command.DConfigure a virtual terminal password and login process.EEnter an access list and apply it to the virtual terminal interfaces using the access-class command.

多选题When policy - based routing (PBR) is being configured, which three criteria can the set command specify?()Aall interfaces in the path toward the destinationBall networks in the path toward the destinationCadjacent next hop router in the path toward the destinationDall routers in the path toward the destinationEall interfaces through which the packets can be routedFtype of service and precedence in the IP packets

单选题What is a method by which an IP interface can be assigned to a virtual router in a PPP over ATM environment?()AprofileBpolicylistCclassifier ACLDLCP negotiation

单选题When you are troubleshooting an ACL issue on a router,which command can help you to verify which interfaces are affected by the ACL?()Ashow ip access-listBshow access-listClist ip interfaceDshow interfaceEshow ip interface

多选题Which router IOS commands can be used to troubleshoot LAN connectivity problems?()ApingBtracertCipconfigDshow ip routeEwinipcfgFshow interfaces