Which can be done to secure the

题目

Which can be done to secure the virtual terminal interfaces on a router?()

  • A、Administratively shut down the interfaces.
  • B、Physically secure the interfaces.
  • C、Configure a virtual terminal password and login process.
  • D、Enter an access list and apply it to the terminal interfaces using the access-class command.
  • E、Create an access list and apply it to the terminal interfaces using the access-group command.
如果没有搜索结果或未解决您的问题,请直接 联系老师 获取答案。
相似问题和答案

第1题:

You wish to increase the security of all of the routers within your network. What can be done to secure the virtual terminal interfaces on a router?()

A. Administratively shut down the interface.

B. Physically secure the interface.

C. Create an access list and apply it to the virtual terminal interfaces with the access-group command.

D. Configure a virtual terminal password and login process.

E. Enter an access list and apply it to the virtual terminal interfaces using the access-class command.


参考答案:D, E

第2题:

Which three statements about the secure domain router are true?()

  • A、The logical router can span across chassis.
  • B、The fabric and system controller module are shared by all logical routers.
  • C、Each logical router has a distinct fabric and system controller module
  • D、The logical router can share a route processor
  • E、The logical router cannot share a route processor

正确答案:A,B,E

第3题:

Which of the following can secure a term loan?

A.Securities.

B.Land and building.

C.Accounts receivable.

D.Inventory.


正确答案:B
解析:倒数第三句Term loans normally are secured by fixed assets...owned by the borrower and...意指定期贷款通常由借款人的固定资产来提供可靠的保证,例如固定设备和房地产等。

第4题:

Which can be done to secure the virtual terminal interfaces on a router?()

  • A、Administratively shut down the interfaces.
  • B、Physically secure the interfaces.
  • C、Configure a virtual terminal password and login process.
  • D、Enter an access list and apply it to the terminal interfaces using the access-class command.
  • E、Create an access list and apply it to the terminal interfaces using the access-group command

正确答案:C,D

第5题:

A network administrator needs to configure port security on a switch.which two statements are true?()

  • A、The network administrator can apply port security to dynamic access ports
  • B、The network administrator can configure static secure or sticky secure mac addresses in the voice vlan.
  • C、The sticky learning feature allows the addition of dynamically learned addresses to the running configuration.
  • D、The network administrator can apply port security to EtherChannels.
  • E、When dynamic mac address learning is enabled on an interface,the switch can learn new addresses,up to the maximum defined.

正确答案:C,E

第6题:

What can be done to secure the virtual terminal interfaces on a router?()

A. Administratively shut down the interface.

B. Physically secure the interface.

C. Create an access list and apply it to the virtual terminal interfaces with the access-group command.

D. Configure a virtual terminal password and login process.

E. Enter an access list and apply it to the virtual terminal interfaces using the access-class command.


参考答案:D, E

第7题:

A network administrator needs to configure port security on a switch.which two statements are true?()

  • A、The network administrator can apply port security to dynamic access ports
  • B、The network administrator can configure static secure or sticky secure mac addresses in the voice vlan.
  • C、The sticky learning feature allows the addition of dynamically learned addresses to the runningconfiguration.
  • D、The network administrator can apply port security to EtherChannels.
  • E、When dynamic mac address learning is enabled on an interface,the switch can learn new addresses,up to the maximum defined.

正确答案:C,E

第8题:

Which statement is true regarding online redefinition for the migration of BasicFile LOBs to SecureFile LOBs?()

A. It cannot be done in parallel.

B. It can be done at the table level or partition level.

C. It does not require additional storage because the operation is done online.

D. Local and global indexes are maintained automatically during the operation.


参考答案:B

第9题:

What are two ways with which a small business can keep a wireless business separate and secure from a wireless guest access network? () 

  • A、 auto-channel selection
  • B、 WMM QoS
  • C、 802.11F roaming
  • D、 multiple BSSIDs
  • E、 802.1Q VLANs
  • F、 AP detection

正确答案:D,E

第10题:

Which two statements about the Cisco AutoSecure feature are true?()

  • A、All passwords entered during the AutoSecure configuration must be a minimum of 8 characters in length.
  • B、Cisco123 would be a valid password for both the enable password and the enable secret commands.
  • C、The auto secure command can be used to secure the router login as well as the NTP and SSH protocols.
  • D、For an interactive full session of AutoSecure, the auto secure login command should be used.
  • E、If the SSH server was configured, the 1024 bit RSA keys are generated after the auto secure commandis enabled.

正确答案:C,E

更多相关问题