搜题
用户您好, 请在下方输入框内搜索其它题目:
搜题
题目内容 (请给出正确答案)
提问人:网友 发布时间:
【多选题】

What are two recommended ways of protecting network device configuration files from outside network security threats (Choose two.)()。

A、Allow unrestricted access to the console or VTY ports

B、Use a firewall to restrict access from the outside to the network devices

C、Always use Telnet to access the device command line because its data is automatically encrypted

D、Use SSH or another encrypted and authenticated transport to access device configurations

E、Prevent the loss of passwords by disabling password encryption

更多“What are two recommended ways of protecting network device configuration files from outside network security threats (Choose two.)()。”相关的问题
第3题

A、Do-Not-Fragment flag is set.  B、Both SYN and FIN flags are set.  C、Both ACK and PSH flags are set.  D、FIN flag is set and ACK flag is not set.  

点击查看答案
第4题

A、caching  B、prefetch  C、header caching  D、content or entity caching  

点击查看答案
第5题

A、urlhash  B、backup chaining  C、least connections  D、fewest outstanding requests  

点击查看答案
第7题

A、Itsendsdataincleartextformat.  B、ItisnolongersupportedonCisconetworkdevices.  C、ItismoresecurethanSSH  D、Itrequiresanenterpriselicenseinordertobeimplemented.  E、ItrequiresthatthedestinationdevicebeconfiguredtosupportTelnetconnections.  

点击查看答案
第8题

A、multihop  B、communities  C、confederations  D、route reflection  

点击查看答案
第9题

A、Policy-Based Multipath  B、TCP Acceleration (AFP)  C、Forward Error Correction  D、Molecular Sequence Reduction  

点击查看答案
客服
TOP

请使用微信扫码支付

订单号:
遇到问题请联系在线客服