You wish to increase the security of all of the routers within your network. What can be done to secure the virtual terminal interfaces on a router?() A. Administratively shut down the interface.B. Physically secure the interface.C. Create an access list and apply it to the virtual terminal interfaces with the access-group command.D. Configure a virtual terminal password and login process.E. Enter an access list and apply it to the virtual terminal interfaces using the access-class command.

You wish to increase the security of all of the routers within your network. What can be done to secure the virtual terminal interfaces on a router?()

A. Administratively shut down the interface.

B. Physically secure the interface.

C. Create an access list and apply it to the virtual terminal interfaces with the access-group command.

D. Configure a virtual terminal password and login process.

E. Enter an access list and apply it to the virtual terminal interfaces using the access-class command.


相关考题:

You are logged into a router and wish to view the layer 3 information about your neighboring Cisco routers. What IOS command gives layer 3 information for of the directly connected router interfaces?A. show ip linksB. show cdp neighborC. show cdp neighbor detailD. show ip clientsE. show ip routeF. None of the above

Your ERX router is supporting 100 virtual routers.A specific line module supports IP interfaces in 5 virtual routers.How many routing tables are maintained on that module?() A.0B.1C.5D.100

A new router, named TK1, is being installed. You wish to add this router to your existing OSPF network. In doing so, you configure the following:TK1(config) router ospf 1TK1(config-router) network 10.10.10.0 255.255.255.0 area 0After making this change, you notice that the networks attached to TK1 are not being learned by the other OSPF routers. What could be the cause of this?()A. The AS is not correctly configuredB. The network subnet mask is incorrectly configuredC. The network wildcard mask is configured incorrectlyD. The network number is not correctly configuredE. The process id is configured incorrectlyF. None of the above

You need to upgrade the IOS of an existing router on your network. The new IOS image is located on a TFTP server that you have set up within the network. What command should you issue in order to download the new IOS version?()A. Router# copy tftp flashB. Router# copy flash runC. Router(config)# restore flashD. Router(config)# repair flashE. Router#copy flash tftpF. Router# copy start flash

You wish to limit telnet access into your Cisco router to only a single host. In order to accomplish this, access list 1 has been written to allow host 172.16.1.224 access to the router vty lines.What command would assign this access- list to the Virtual Terminal Lines?()A. router(config-line)# ip access-group 1 inB. router(config-line)# access-class 1 inC. router(config-line)# ip access-list 1 inD. router(config-line)# access-line 1 in

What can be done to secure the virtual terminal interfaces on a router?() A. Administratively shut down the interface.B. Physically secure the interface.C. Create an access list and apply it to the virtual terminal interfaces with the access-group command.D. Configure a virtual terminal password and login process.E. Enter an access list and apply it to the virtual terminal interfaces using the access-class command.

A new router, named TK1, is being installed. You wish to add this router to your existing OSPF network. In doing so, you configure the following: TK1(config)# router ospf 1 TK1(config-router)# network 10.10.10.0 255.255.255.0 area 0 After making this change, you notice that the networks attached to TK1 are not being learned by the other OSPF routers. What could be the cause of this?()A、The AS is not correctly configuredB、The network subnet mask is incorrectly configuredC、The network wildcard mask is configured incorrectlyD、The network number is not correctly configuredE、The process id is configured incorrectlyF、None of the above

You need to upgrade the IOS of an existing router on your network. The new IOS image is located on a TFTP server that you have set up within the network. What command should you issue in order to download the new IOS version?()A、Router# copy tftp flashB、Router# copy flash runC、Router(config)# restore flashD、Router(config)# repair flashE、Router#copy flash tftpF、Router# copy start flash

Which description regarding OSPF Network LSAs is correct?()A、They are originated by Area Border Router and are sent into a single area to advertise an Autonomous System Border Router.B、They are originat ed by Area Border Routers and are sent into a single area to advertise destinations outside that area.C、They are originated by the DR on every multi - access network. They include all attached routers including the DR itself.D、They are originated by every router in the OPSF network. They include all routers on the link, interfaces, the cost of the link, and any known neighbor on the link.

When policy - based routing (PBR) is being configured, which three criteria can the set command specify?()A、all interfaces in the path toward the destinationB、all networks in the path toward the destinationC、adjacent next hop router in the path toward the destinationD、all routers in the path toward the destinationE、all interfaces through which the packets can be routedF、type of service and precedence in the IP packets

Your ERX router is supporting 100 virtual routers. A specific line module supports IP interfaces in 5 virtual routers.How many routing tables are maintained on that module?()A、0B、1C、5D、100

Which can be done to secure the virtual terminal interfaces on a router?()A、Administratively shut down the interfaces.B、Physically secure the interfaces.C、Configure a virtual terminal password and login process.D、Enter an access list and apply it to the terminal interfaces using the access-class command.E、Create an access list and apply it to the terminal interfaces using the access-group command

Which can be done to secure the virtual terminal interfaces on a router?()A、Administratively shut down the interfaces.B、Physically secure the interfaces.C、Configure a virtual terminal password and login process.D、Enter an access list and apply it to the terminal interfaces using the access-class command.E、Create an access list and apply it to the terminal interfaces using the access-group command.

You are logged into a router and with to view the layer 3 information about your neighboring Cisco routers. What IOS command gives layer 3 information for of the directly connected router interfaces?()A、show ip linksB、show cdp neighborC、show cdp neighbor detailD、show ip clientsE、show ip routeF、None of the above

You wish to limit telnet access into your Cisco router to only a single host. In order to accomplish this, access list 1 has been written to allow host 172.16.1.224 access to the router vty lines. What command would assign this access- list to the Virtual Terminal Lines?()A、router(config-line)# ip access-group 1 inB、router(config-line)# access-class 1 inC、router(config-line)# ip access-list 1 inD、router(config-line)# access-line 1 in

What are four uses of the USB ports in the Cisco integrated services routers?()A、Secure Device AuthenticationB、Remote AdministrationC、Bulk Flash storageD、Secure Configuration Files DistributionE、Storage of Removable CredentialsF、Increase RAM Memory for the Router

What can be done to secure the virtual terminal interfaces on a router? ()A、Administratively shut down the interface.B、Physically secure the interface.C、Create an access list and apply it to the virtual terminal interfaces with the access-group command.D、Configure a virtual terminal password and login process.E、Enter an access list and apply it to the virtual terminal interfaces using the access-class command.

Active Directory Rights Management Services (AD RMS) is deployed on your network. Users who have Windows Mobile 6 devices report that they cannot access documents that are protected by  AD RMS.   You need to ensure that all users can access AD RMS protected content by using Windows  Mobile 6 devices.  What should you do()A、Modify the security of the ServerCertification.asmx file.B、Modify the security of the MobileDeviceCertification.asmx file.C、Enable anonymous authentication for the _wmcs virtual directory.D、Enable anonymous authentication for the certification virtual directory.

You are a network administrator for your company. The network contains a perimeter network. The perimeter network contains four Windows Server 2003, Web Edition computers that are configured as a Network Load Balancing cluster.   The cluster hosts an e-commerce Web site that must be available 24 hours per day. The cluster is located in a physically secure data center and uses an Internet-addressable virtual IP address. All servers in the cluster are configured with the Hisecws.inf template.   You need to implement protective measures against the cluster’s most significant security vulnerability.   What should you do?  ()A、 Use Encrypting File System (EFS) for all files that contain confidential data stored on the cluster.B、 Use packet filtering on all inbound traffic to the cluster.C、 Use Security Configuration and Analysis regularly to compare the security settings on all servers in the cluster with the baseline settings.D、 Use intrusion detection on the perimeter network.

单选题Your ERX router is supporting 100 virtual routers.A specific line module supports IP interfaces in 5 virtual routers.How many routing tables are maintained on that module?()A0B1C5D100

单选题Which description regarding OSPF Network LSAs is correct?()AThey are originated by Area Border Router and are sent into a single area to advertise an Autonomous System Border Router.BThey are originat ed by Area Border Routers and are sent into a single area to advertise destinations outside that area.CThey are originated by the DR on every multi - access network. They include all attached routers including the DR itself.DThey are originated by every router in the OPSF network. They include all routers on the link, interfaces, the cost of the link, and any known neighbor on the link.

单选题Your network contains a Terminal Services server named Server1 that runs Windows Server 2003 Service Pack 2 (SP2).  Server1 has a server certificate from a trusted authority installed. All Terminal Services clients have the RDP client version 5.2 installed. You need to ensure that all Terminal Services connections to Server1 use Transport Layer Security.  What should you do?()AIn Terminal Services Configuration, change the permissions for Remote Desktop Users to Full Control.BIn Terminal Services Configuration, change the security layer setting to Negotiate and set the encryption level to High.CIn Local Security Policy, enable Domain Member: Require strong (Windows 2000 or later) session key.DIn Local Security Policy, enable Domain Member: Digitally encrypt or sign secure channel data (always).

单选题You are a network administrator for your company. The network contains a perimeter network. The perimeter network contains four Windows Server 2003, Web Edition computers that are configured as a Network Load Balancing cluster.   The cluster hosts an e-commerce Web site that must be available 24 hours per day. The cluster is located in a physically secure data center and uses an Internet-addressable virtual IP address. All servers in the cluster are configured with the Hisecws.inf template.   You need to implement protective measures against the cluster’s most significant security vulnerability.   What should you do?  ()A Use Encrypting File System (EFS) for all files that contain confidential data stored on the cluster.B Use packet filtering on all inbound traffic to the cluster.C Use Security Configuration and Analysis regularly to compare the security settings on all servers in the cluster with the baseline settings.D Use intrusion detection on the perimeter network.

多选题You wish to increase the security of all of the routers within your network. What can be done to secure the virtual terminal interfaces on a router?()AAdministratively shut down the interface.BPhysically secure the interface.CCreate an access list and apply it to the virtual terminal interfaces with the access-group command.DConfigure a virtual terminal password and login process.EEnter an access list and apply it to the virtual terminal interfaces using the access-class command.

单选题You are logged into a router and with to view the layer 3 information about your neighboring Cisco routers. What IOS command gives layer 3 information for of the directly connected router interfaces?()Ashow ip linksBshow cdp neighborCshow cdp neighbor detailDshow ip clientsEshow ip routeFNone of the above

单选题You are the network administrator for TestKing. Your network consists of a single Active Directory domain. You manage a Terminal Server farm that includes five terminal servers and a Terminal Services Licensing server named testking9. All servers run Windows 2000 Server. There are 2,500 users who log on to the terminal servers to access a custom human resource (HR) application. You install Windows Server 2003 on a new server named testking10. Testking10 is configured with all default settings enabled. You install Terminal Services and the HR application on testking10. You instruct some users to access the HR application on testking10. Four months later, users report that they can no longer establish Terminal Services sessions to testking10. You verify that users can connect to the other terminal servers in your Terminal Server farm. You need to ensure that users can run the HR application on all terminal servers on the network. What should you do?()AOn testking10, set the License Logging service to Automatic, and the start the service.BOn testking10, install Terminal Service Licensing. Activate the Terminal Services Licensing server.CInstall Windows Server 2003 on all domain controllers on the network.DDeactivate and activate Terminal Service Licensing on Testking9.

单选题A new router, named TK1, is being installed. You wish to add this router to your existing OSPF network. In doing so, you configure the following: TK1(config)# router ospf 1 TK1(config-router)# network 10.10.10.0 255.255.255.0 area 0 After making this change, you notice that the networks attached to TK1 are not being learned by the other OSPF routers. What could be the cause of this?()AThe AS is not correctly configuredBThe network subnet mask is incorrectly configuredCThe network wildcard mask is configured incorrectlyDThe network number is not correctly configuredEThe process id is configured incorrectlyFNone of the above