Which commands is necessary to permit SSH or Telnet access to a cisco switch that is otherwise configured for these vty line protocols?() A. transport type allB. transport output allC. transport preferred allD. transport input all

Which commands is necessary to permit SSH or Telnet access to a cisco switch that is otherwise configured for these vty line protocols?()

A. transport type all

B. transport output all

C. transport preferred all

D. transport input all


相关考题:

用标准访问控制列表配置212.33.127.0/24子网主机登录到路由表,虚拟的配置是A.Router(config)#access-list 10 permit 212.33.127.0 255.255.255.0 Router(config)#line vty 0 5 Router(config-line)#access-class 10 inB.Router(config)#access-list 20 permit 212.33.127.0 0.0.0.255 Router(config)#line vty 0 5 Router(config-line)#access-class 20 inC.Router(config)#access-list 99 permit 212.33.127.0 0.0.0.255 Router(config)#line vty 0 5 Router(config-line)#access-class 99 inD.Router(config)#access-list 100 permit 212.33.127.0 0.0.0.255 Router(config)#line vty 0 5 Router(config-line)#access-class 100 in

用标准访问控制列表配置只允许212.33.127.0/24子网主机登录到路由表,正确的配置是______。A.Router(config) #access-list 10 permit 212.33.127.0 255.255.255.0 Router(config) #line vty 0 5 Router(config-line) #access-class 10 inB.Router(config) #access-list 20 permit 212.33.127.0 0.0.0.255 Router(config) #line vty 0 5 Router(config-line) #access-class 20 outC.Router(config) #access-list 99 permit 212.33.127.0 0.0.0.255 Router(config) #line vty 0 5 Router(config-line) #access-class 99 inD.Router(config) #access-list 100 permit 212.33.127.0 0.0.0.255 Router(config) #line vty 0 5 Router(config-line) #access-class 100 in

The network administrator has configured port security on a Ezonexam switch. Why would a network administrator configure port security on this Ezonexam device?A.To prevent unauthorized hosts from getting access to the LANB.To limit the number of Layer 2 broadcasts on a particular switch portC.To prevent unauthorized Telnet or SSH access to a switch portD.To prevent the IP and MAC address of the switch and associated portsE.None of the above

You wish to limit telnet access into your Cisco router to only a single host. In order to accomplish this, access list 1 has been written to allow host 172.16.1.224 access to the router vty lines.What command would assign this access- list to the Virtual Terminal Lines?()A. router(config-line)# ip access-group 1 inB. router(config-line)# access-class 1 inC. router(config-line)# ip access-list 1 inD. router(config-line)# access-line 1 in

The network administrator cannot to switch 1 over a telnet session,although the hosts attached to switch 1 can ping the interface Fa0/0 of the router.Given the information in the graphic and assuming that the router and switch2 are configured properly,which of the following commands should be issued on switch 1 to correct this problem?()A. Switch1(config)# i nterface fa0 /1 Switch1(config-if)# ip address 192.168.24.3.255.255.255.0B. Switch1 (config)#interface fa0/1 Switch1 (config-if)# switchport mode trunkC. Switch 1 (config)# i nterface fa0 /1 Switch1 (config-if)# duplex full Switch1 (config-if)# speed 100D. Switch1 (config-if)# default-gateway 192.168.24.1E. Switch1 (config)# line con 0 Switch1(config-line)# password cisco Switch1 (config-line)#login

This graphic shows the results of an attempt to open a Telnet connection to router ACCESS1 from router Remote27. Which of the following command sequences will correct this problem? () A. ACCESS1(config)# line console 0 ACCESS1(config-line)# password ciscoB. Remote27(config)# line console 0 Remote27(config-line)# login Remote27(config-line)# password ciscoC. ACCESS1(config)# line vty 0 4 ACCESS1(config-line)# login ACCESS1(config-line)# password ciscoD. Remote27(config)# line vty 0 4 Remote27(config-line)# login Remote27(config-line)# password ciscoE. ACCESS1(config)# enable password ciscoF. Remote27(config)# enable password cisco

Which commands is necessary to permit SSH or Telnet access to a cisco switch that is otherwiseconfigured for these vty line protocols?() A.transport type allB.transport output allC.transport preferred allD.transport input all

What are two recommended ways of protecting network device configuration files from outside network security threats (Choose two.)()。 A.Allow unrestricted access to the console or VTY portsB.Use a firewall to restrict access from the outside to the network devicesC.Always use Telnet to access the device command line because its data is automatically encryptedD.Use SSH or another encrypted and authenticated transport to access device configurationsE.Prevent the loss of passwords by disabling password encryption

配置Cisco路由器时,进入路由器第一到第四个telnet线路配置状态的cisco的命令是()。A、line vty 1 4B、line vty 0 3C、line vty 0 4D、line con 0 4

Which one of the following commands would you enter to terminate a VTY line session?()A、closeB、disableC、disconnectD、suspendE、exitF、None of the above

Which two Aironet enterprise solution statements are true?()A、A Cisco Aironet AP handles the transmission of beacon frames and also handles responses to probe-request frames from clientsB、A Cisco Aironet solution includes intelligent Cisco Aironet access points (APs) and Cisco Catalyst switchesC、In the Cisco Aironet solution, each AP is locally configured by the use of either a web interface or the command line interfaceD、The Cisco Aironet AP handles real-time portions of the LWAPP protocol, and the WLAN controller handles those items which are not time sensitiveE、Virtual MAC architecture allows the splitting of the 802.11 protocol between the Cisco Aironet AP and a LAN switch

配置路由器的telnet,只允许三个人同时以telnet访问该路由器,则正确的配置为()。A、line vty 0 1B、line vty 0 2C、line vty 0 3D、line vty 0 4

What are two recommended ways of protecting network device configuration files from outside network security threats? (Choose two.)()A、Allow unrestricted access to the console or VTY ports.B、Use a firewall to restrict access from the outside to the network devices.C、Always use Telnet to access the device command line because its data is automatically encrypted.D、Use SSH or another encrypted and authenticated transport to access device configurations.E、Prevent the loss of passwords by disabling password encryption.

Which statement best describes configuring access control lists to control Telnet traffic destined to therouter itself?()A、The ACL applied to the vty lines has no in or out option like ACL being applied to an interface.B、The ACL is applied to the Telnet port with the ip access-group command.C、The ACL must be applied to each vty line individually.D、The ACL should be applied to all vty lines in the in direction to prevent an unwanted user from connecting to an unsecured port.

Which commands is necessary to permit SSH or Telnet access to a cisco switch that is otherwiseconfigured for these vty line protocols?()A、transport type allB、transport output allC、transport preferred allD、transport input all

Which two statements about the Cisco AutoSecure feature are true?()A、All passwords entered during the AutoSecure configuration must be a minimum of 8 characters in length.B、Cisco123 would be a valid password for both the enable password and the enable secret commands.C、The auto secure command can be used to secure the router login as well as the NTP and SSH protocols.D、For an interactive full session of AutoSecure, the auto secure login command should be used.E、If the SSH server was configured, the 1024 bit RSA keys are generated after the auto secure commandis enabled.

You wish to limit telnet access into your Cisco router to only a single host. In order to accomplish this, access list 1 has been written to allow host 172.16.1.224 access to the router vty lines. What command would assign this access- list to the Virtual Terminal Lines?()A、router(config-line)# ip access-group 1 inB、router(config-line)# access-class 1 inC、router(config-line)# ip access-list 1 inD、router(config-line)# access-line 1 in

Which commands is necessary to permit SSH or Telnet access to a cisco switch that is otherwise configured for these vty line protocols?()A、transport type allB、transport output allC、transport preferred allD、transport input all

Which two passwords must be supplied in order to connect by Telnet to a properly secured Cisco switch and make changes to the device configuration? (Choose two.)()A、console passwordB、vty passwordC、aux passwordD、tty passwordE、enable secret passwordF、username password

Refer to the exhibit.What is the effect of the configuration that is shown?()A、It tells the router or switch to try establish an SSH connection first and if that fail to use telnet.B、It configures a cisco network device to use the SSH protocol on incoming communications via the virtual terminal ports.C、It allows seven failed login attempts before the VTY lines are temporarily shutdown.D、It configures the virtual terminal lines with the password 030752180500.E、It configures SSH globally for all logins.

Which of the following is a secure method of remote access via command line?()A、RCPB、TelnetC、RSHD、SSH

Company.com has encountered a problem on the HMC, which requires access to the root shell on the HMC. Which of the following is necessary to access the root userid on the HMC?()A、Enable remote commands on the HMC Configuration menu,then use ssh to login to theHMC,enter su - rootB、Login to the HMC as hscpe and run pesh,using a temporary password from IBM Support,afterward, enter su - rootC、Login to the HMC as hscroot,then run pesh,using a temporary password from IBM Support, afterward,enter su - rootD、Enable remote commands on the HMC Configuration menu,then telnet in as hscroot,entersu - root

单选题Which one of the following commands would you enter to terminate a VTY line session?()AcloseBdisableCdisconnectDsuspendEexitFNone of the above

单选题Which statement best describes configuring access control lists to control Telnet traffic destined to therouter itself?()AThe ACL applied to the vty lines has no in or out option like ACL being applied to an interface.BThe ACL is applied to the Telnet port with the ip access-group command.CThe ACL must be applied to each vty line individually.DThe ACL should be applied to all vty lines in the in direction to prevent an unwanted user from connecting to an unsecured port.

多选题What are two recommended ways of protecting network device configuration files from outside network security threats (Choose two.)()。AAllow unrestricted access to the console or VTY portsBUse a firewall to restrict access from the outside to the network devicesCAlways use Telnet to access the device command line because its data is automatically encryptedDUse SSH or another encrypted and authenticated transport to access device configurationsEPrevent the loss of passwords by disabling password encryption

单选题Refer to the exhibit.What is the effect of the configuration that is shown?()AIt tells the router or switch to try establish an SSH connection first and if that fail to use telnet.BIt configures a cisco network device to use the SSH protocol on incoming communications via the virtual terminal ports.CIt allows seven failed login attempts before the VTY lines are temporarily shutdown.DIt configures the virtual terminal lines with the password 030752180500.EIt configures SSH globally for all logins.

多选题Which two Aironet enterprise solution statements are true?()AA Cisco Aironet AP handles the transmission of beacon frames and also handles responses to probe-request frames from clientsBA Cisco Aironet solution includes intelligent Cisco Aironet access points (APs) and Cisco Catalyst switchesCIn the Cisco Aironet solution, each AP is locally configured by the use of either a web interface or the command line interfaceDThe Cisco Aironet AP handles real-time portions of the LWAPP protocol, and the WLAN controller handles those items which are not time sensitiveEVirtual MAC architecture allows the splitting of the 802.11 protocol between the Cisco Aironet AP and a LAN switch