网友您好, 请在下方输入框内输入要搜索的题目:
题目内容
(请给出正确答案)
What can be done to secure the virtual terminal interfaces on a router? ()
- A、Administratively shut down the interface.
- B、Physically secure the interface.
- C、Create an access list and apply it to the virtual terminal interfaces with the access-group command.
- D、Configure a virtual terminal password and login process.
- E、Enter an access list and apply it to the virtual terminal interfaces using the access-class command.
参考答案
更多 “What can be done to secure the virtual terminal interfaces on a router? ()A、Administratively shut down the interface.B、Physically secure the interface.C、Create an access list and apply it to the virtual terminal interfaces with the access-group command.D、Configure a virtual terminal password and login process.E、Enter an access list and apply it to the virtual terminal interfaces using the access-class command.” 相关考题
考题
– What a poor job I’ve done! –()
(A) Do it again.(B) You can do it.(C) Do your best next time!(D) Don’t be upset. No one can do it better than you.
考题
-Oh, no! It's raining. We can't go skating on the square. - ____________
A、Well done !B、What a shame !C、What a surprise !
考题
Within the team, a work plan can tell each member what()and why.A. is being doneB. has doneC. has been done
考题
________ can be done ________ been done.
A.All that...hasB.All that...haveC.All...hasD.All...have
考题
You wish to increase the security of all of the routers within your network. What can be done to secure the virtual terminal interfaces on a router?()
A. Administratively shut down the interface.B. Physically secure the interface.C. Create an access list and apply it to the virtual terminal interfaces with the access-group command.D. Configure a virtual terminal password and login process.E. Enter an access list and apply it to the virtual terminal interfaces using the access-class command.
考题
What can be done to secure the virtual terminal interfaces on a router?()
A. Administratively shut down the interface.B. Physically secure the interface.C. Create an access list and apply it to the virtual terminal interfaces with the access-group command.D. Configure a virtual terminal password and login process.E. Enter an access list and apply it to the virtual terminal interfaces using the access-class command.
考题
What can be inferred from the passage A.The author was happy to see the test result.
B.What the students said was hardly true.
C.Wolfe would remember forever what the author had done.
D.Wolfe felt joyful after he had been tested.
考题
Because of the systems-level approach, Cisco security can defend against widespread attacks from hackers and viruses. What describes the Cisco network security strategy?()A、 Cisco Trust AgentB、 Cisco Self-Defending NetworkC、 Cisco Secure Access ControlD、 Cisco Network Admission Control
考题
A consulting firm is locating 30 consultants at a client site for a nine-month project. What need does the firm have that can be met by a wireless solution?()A、Providing a temporary network needB、Ensuring secure presentationsC、Having freedom of movement within a network rangeD、Augmenting an existing network
考题
What are two ways with which a small business can keep a wireless business separate and secure from a wireless guest access network? () A、 auto-channel selectionB、 WMM QoSC、 802.11F roamingD、 multiple BSSIDsE、 802.1Q VLANsF、 AP detection
考题
Which can be done to secure the virtual terminal interfaces on a router?()A、Administratively shut down the interfaces.B、Physically secure the interfaces.C、Configure a virtual terminal password and login process.D、Enter an access list and apply it to the terminal interfaces using the access-class command.E、Create an access list and apply it to the terminal interfaces using the access-group command
考题
Which can be done to secure the virtual terminal interfaces on a router?()A、Administratively shut down the interfaces.B、Physically secure the interfaces.C、Configure a virtual terminal password and login process.D、Enter an access list and apply it to the terminal interfaces using the access-class command.E、Create an access list and apply it to the terminal interfaces using the access-group command.
考题
Of the threats discussed below, what is the main advantage of using Cisco Secure Desktop which is part of the Cisco ASA VPN solution?()A、 Secure desktop will create a completely separate computing environment thatwill be deleted when you are done.This ensures that no confidential data has been left on the shared/public computer.B、 Secure desktop is used to protect access to your registry and systemfiles when browsing to SSL/VPN protectedpages.C、 Secure Desktop ensures that an SSLprotected password cannotbe exploitedby a man in the middle attackusing a spoofed certificate.D、 Secure desktop hardens the operating system of the machines you are using at the time secure desktop islaunched.
考题
What is the primary use of a remote access VPN?()A、to secure communication between two remote PCsB、to secure communication between two remote officesC、to secure communication betweenan remote PC and the corporate intranetD、to secure communication between a corporate intranet and the public internet
考题
Customer is asking if new IBM UEFI recognizes their Windows 2003 Enterprise Operational System. What is the correct answer?()A、UEFI can support Windows 2003 Enterprise in native modeB、UEFI can emulate BIOS and support Windows 2003 with no performance impactC、An upgrade must be done to Windows 2003 Enterprise x64D、Only supports Windows 2003 as a virtual machine guest (VMware or Hyper-V)
考题
单选题What can we infer(推断) from the story?A
Aunt Polly gave Tom a lot of pocket money for what he had done.B
Ben and the other boys might feel unhappy when they found out the truth.C
Tom believed that he had discovered how to deal with different people.D
Everyone thought Tom clever when they realized what had happened.
考题
单选题What is the main consideration when deciding to invest in shares?A
how much you pay for the sharesB
how quickly you can make a profitC
how willing you are to take risksD
how financially secure you are
考题
单选题What is the main consideration when deciding to invest in shares?A
How much you pay for the shares.B
How quickly you can make a profit.C
How willing you are to take risks.D
How financially secure you are.
考题
多选题You wish to increase the security of all of the routers within your network. What can be done to secure the virtual terminal interfaces on a router?()AAdministratively shut down the interface.BPhysically secure the interface.CCreate an access list and apply it to the virtual terminal interfaces with the access-group command.DConfigure a virtual terminal password and login process.EEnter an access list and apply it to the virtual terminal interfaces using the access-class command.
考题
单选题Of the threats discussed below, what is the main advantage of using Cisco Secure Desktop which is part of the Cisco ASA VPN solution?()A
Secure desktop will create a completely separate computing environment thatwill be deleted when you are done.This ensures that no confidential data has been left on the shared/public computer.B
Secure desktop is used to protect access to your registry and systemfiles when browsing to SSL/VPN protectedpages.C
Secure Desktop ensures that an SSLprotected password cannotbe exploitedby a man in the middle attackusing a spoofed certificate.D
Secure desktop hardens the operating system of the machines you are using at the time secure desktop islaunched.
考题
单选题What is the primary use of a remote access VPN?()A
to secure communication between two remote PCsB
to secure communication between two remote officesC
to secure communication betweenan remote PC and the corporate intranetD
to secure communication between a corporate intranet and the public internet
考题
多选题What are two use cases enabled by IF-MAP Federation?()AUsers authenticated to one Junos Pulse Access Control Service can transparently access resources protected by another Junos Pulse Access Control Service.BUsers authenticated to a Junos Pulse Access Control Service can transparently access resources protected by a Junos Pulse Secure Access Service.CRemote access users authenticated to a Junos Pulse Secure Access Service can transparently access resources protected by a Junos Pulse Access Control Service.DRemote access users authenticated to one Junos Pulse Secure Access Service can transparently access resources protected by another Junos Pulse Secure Access Service.
考题
单选题Customer is asking if new IBM UEFI recognizes their Windows 2003 Enterprise Operational System. What is the correct answer?()A
UEFI can support Windows 2003 Enterprise in native modeB
UEFI can emulate BIOS and support Windows 2003 with no performance impactC
An upgrade must be done to Windows 2003 Enterprise x64D
Only supports Windows 2003 as a virtual machine guest (VMware or Hyper-V)
考题
单选题A seaman has a small,gaping laceration of the arm that is not bleeding excessively. What can be done as an alternative to suturing to close the wound?()A
Wrap a tight bandage around the woundB
Apply a compression bandageC
Use temporary stitches of sail twineD
Apply butterfly strips,then a sterile dressing
考题
单选题To keep performance optimal on a lightweight access point, what can be done?()A
Disable Auto RF and configure manually.B
Disable all 802.11b data rates.C
Power access point to full power.D
Hard code the channel.
热门标签
最新试卷