多项选择题
What are two recommended ways of protecting network device configuration files from outside network security threats? (Choose two.)()
A.Allow unrestricted access to the console or VTY ports.
B.Use a firewall to restrict access from the outside to the network devices.
C.Always use Telnet to access the device command line because its data is automatically encrypted.
D.Use SSH or another encrypted and authenticated transport to access device configurations.
E.Prevent the loss of passwords by disabling password encryption.
点击查看答案
相关考题
-
单项选择题
Forsecurityreasons,thenetworkadministratorneedstopreventpingsintothecorporatenetworksfromhostsoutsidetheinternetwork.Whichprotocolshouldbeblockedwithaccesscontrollists?()
A.IP
B.ICMP
C.TCP
D.UDP -
多项选择题
WhichofthefollowingareassociatedwiththeapplicationlayeroftheOSImodel?(two.)()
A.ping
B.Telnet
C.FTP
D.TCP
E.IP -
单项选择题
WhichtypeofattackischaracterizedbyafloodofpacketsthatarerequestingaTCPconnectiontoaserver?()
A.denial of service
B.brute force
C.reconnaissance
D.Trojan horse
