网友您好, 请在下方输入框内输入要搜索的题目:

题目内容 (请给出正确答案)
多选题
What are two recommended ways of protecting network device configuration files from outside network security threats (Choose two.)()。
A

Allow unrestricted access to the console or VTY ports

B

Use a firewall to restrict access from the outside to the network devices

C

Always use Telnet to access the device command line because its data is automatically encrypted

D

Use SSH or another encrypted and authenticated transport to access device configurations

E

Prevent the loss of passwords by disabling password encryption


参考答案

参考解析
解析: 暂无解析
更多 “多选题What are two recommended ways of protecting network device configuration files from outside network security threats (Choose two.)()。AAllow unrestricted access to the console or VTY portsBUse a firewall to restrict access from the outside to the network devicesCAlways use Telnet to access the device command line because its data is automatically encryptedDUse SSH or another encrypted and authenticated transport to access device configurationsEPrevent the loss of passwords by disabling password encryption” 相关考题
考题 CDP is being used throughout the Ezonexam network. What are two reasons why the Ezonexam network administrator would use CDP? (Choose two)A. To determine the status of network services on a remote deviceB. To obtain the IP Address of a connected device in order to telnet to the deviceC. To verify the type of cable interconnecting two devicesD. To verify Layer 2 connectivity between two devices when Layer 3 failsE. To obtain VLAN information from directly connected swticehsF. To determine the status of the routing protocols between directly connected routersG. To support automatic network failover during outages

考题 You are the administrator of a Windows Server 2003 computer named Server1. The hardware vendor forServer1 notifies you that a critical hotfix is available. This hotfix is required for all models of this computer thathave a certain network interface card.You need to find out if the network interface card that requires the hotfix is installed in Server1.What are two possible ways to achieve this goal? ()(Each correct answer presents a complete solution. Choose two.)A. Open Network Connections, and then examine the properties of each connection that is listed.B. Open the Component Services snap-in, expand Computers, expand My Computer, and then examine the list.C. Run the netsh interface command, and then examine the list.D. Open Device Manager, expand Network adapters, and then examine the list

考题 Ezonexam is installing IP phones in a new office. The phones and office computers connect to the same device. To ensure maximum throughout for the phone data sessions, the company needs to make sure that the phone traffic is on a different network from that of the office computer data traffic. What is the best network device to which to directly connect the phones and computers and what technology should be implemented on this device? (Choose two)A. VLANB. SubinterfaceC. STPD. HubE. SwitchF. RouterG. Wireless Access PointH. VTP

考题 What are two ways to verify if a WX device is configured as a hub, a spoke, or a mesh device? ()(Choose two.) A. Admin DeviceB. Device Setup TopologyC. Compression EndpointsD. Device Setup Advanced Topology

考题 What are two ways to view the system log files on a WX device? ()(Choose two.) A. Use the CLI and enter show log.B. Use the CLI and enter show all.C. Use the CLI and enter show logging.D. In WebView, choose Admin Tools Display System Log.

考题 You are unable to connect your computer to a wireless network projector. The wireless network projector does not appear in the list of available network projectors provided by the Connect to a Network Projector wizard.You need to connect to the network projector.What are two possible ways to achieve this goal?()A.AB.BC.CD.D

考题 What are two recommended ways of protecting network device configuration files from outside network security threats (Choose two.)()。 A.Allow unrestricted access to the console or VTY portsB.Use a firewall to restrict access from the outside to the network devicesC.Always use Telnet to access the device command line because its data is automatically encryptedD.Use SSH or another encrypted and authenticated transport to access device configurationsE.Prevent the loss of passwords by disabling password encryption

考题 What are two ways in which the Cisco Security Monitoring, Analysis, and Response System provides superior network protection? ()A、 reports financial losses from attacksB、 providessecutiy command and controlC、 provides VPN connectivity to clientsD、 expedites reporting of incidentsE、 manage rogue wireless signals

考题 What are two characteristics of Telnet? (Choose two.)()A、It sends data in clear text format.B、It is no longer supported on Cisco network devices.C、It is more secure than SSHD、It requires an enterprise license in order to be implemented.E、It requires that the destination device be configured to support Telnet connections.

考题 What are two recommended ways of protecting network device configuration files from outside network security threats? (Choose two.)()A、Allow unrestricted access to the console or VTY ports.B、Use a firewall to restrict access from the outside to the network devices.C、Always use Telnet to access the device command line because its data is automatically encrypted.D、Use SSH or another encrypted and authenticated transport to access device configurations.E、Prevent the loss of passwords by disabling password encryption. 

考题 A company is installing IP phones. The phones and office computers connect to the same device. To ensure maximum throughput for the phone data, the company needs to make sure that the phone traffic is on a different network from that of the office computer data traffic. What is the best network device to which to directly connect the phones and computers, and what technology should be implemented on this device? (Choose two.)()A、hubB、routerC、switchD、STPE、subinterfacesF、VLAN

考题 What are two reasons a network administrator would use CDP (Choose two.)()。A、to verify the type of cable interconnecting two devicesB、to determine the status of network services on a remote deviceC、to obtain VLAN information from directly connected switchesD、to verify Layer 2 connectivity between two devices when Layer 3 failsE、to obtain the IP address of a connected device in order to telnet to the deviceF、to determine the status of the routing protocols between directly connected routers

考题 What are two reasons a network administrator would use CDP?()A、to verify the type of cable interconnecting two devicesB、to determine the status of network services on a remote deviceC、to obtain VLAN information from directly connected switchesD、to verify Layer 2 connectivity between two devices when Layer 3 failsE、to obtain the IP address of a connected device in order to telnet to the deviceF、to determine the status of the routing protocols between directly connected routers

考题 What are two ways to verify if a WX device is configured as a hub, a spoke, or a mesh device? ()(Choose two.)A、Admin DeviceB、Device Setup TopologyC、Compression EndpointsD、Device Setup Advanced Topology

考题 What are two ways to view the system log files on a WX device? ()(Choose two.)A、Use the CLI and enter show log.B、Use the CLI and enter show all.C、Use the CLI and enter show logging.D、In WebView, choose Admin Tools Display System Log.

考题 You are the network administrator for You administer a Windows Server 2003 computer named TestKing5. The hardware vendor for TestKing5 notifies you that a critical hotfix is available. This hotfix is required for all models of this computer that have a certain network interface card. You need to find out if the network interface card that requires the hotfix is installed in TestKing5. What are two possible ways to achieve this goal? (Each correct answer presents a complete solution. Choose two.)()A、Open Network Connections, and then examine the properties of each connection that is listed.B、Open the Component Services snap-in, expand Computers, expand My Computer, and then examine the list.C、Run the netsh interface command, and then examine the list.D、Open Device Manager, expand Network adapters, and then examine the list.

考题 多选题You are the administrator of a Windows Server 2003 computer named Server1. The hardware vendor for Server1 notifies you that a critical hotfix is available. This hotfix is required for all models of this computer that have a certain network interface card. You need to find out if the network interface card that requires the hotfix is installed in Server1. What are two possible ways to achieve this goal? ()(Each correct answer presents a complete solution. Choose two.)AOpen Network Connections, and then examine the properties of each connection that is listed.BOpen the Component Services snap-in, expand Computers, expand My Computer, and then examine the list.CRun the netsh interface command, and then examine the list.DOpen Device Manager, expand Network adapters, and then examine the list

考题 多选题What are two ways to verify if a WX device is configured as a hub, a spoke, or a mesh device? ()(Choose two.)AAdmin DeviceBDevice Setup TopologyCCompression EndpointsDDevice Setup Advanced Topology

考题 多选题You are the network administrator for You administer a Windows Server 2003 computer named TestKing5. The hardware vendor for TestKing5 notifies you that a critical hotfix is available. This hotfix is required for all models of this computer that have a certain network interface card. You need to find out if the network interface card that requires the hotfix is installed in TestKing5. What are two possible ways to achieve this goal? (Each correct answer presents a complete solution. Choose two.)()AOpen Network Connections, and then examine the properties of each connection that is listed.BOpen the Component Services snap-in, expand Computers, expand My Computer, and then examine the list.CRun the netsh interface command, and then examine the list.DOpen Device Manager, expand Network adapters, and then examine the list.

考题 多选题What are two reasons a network administrator would use CDP? ()Ato verify the type of cable interconnecting two devicesBto determine the status of network services on a remote deviceCto obtain VLAN information from directly connected switchesDto verify Layer 2 connectivity between two devices when Layer 3 failsEto obtain the IP address of a connected device in order to telnet to the deviceFto determine the status of the routing protocols between directly connected routers

考题 多选题What are two ways in which the Cisco Security Monitoring, Analysis, and Response System provides superior network protection? ()Areports financial losses from attacksBprovidessecutiy command and controlCprovides VPN connectivity to clientsDexpedites reporting of incidentsEmanage rogue wireless signals

考题 多选题What are two recommended ways of protecting network device configuration files from outside network security threats (Choose two.)()。AAllow unrestricted access to the console or VTY portsBUse a firewall to restrict access from the outside to the network devicesCAlways use Telnet to access the device command line because its data is automatically encryptedDUse SSH or another encrypted and authenticated transport to access device configurationsEPrevent the loss of passwords by disabling password encryption

考题 多选题What are two recommended ways of protecting network device configuration files from outside network security threats? (Choose two.)()AAllow unrestricted access to the console or VTY ports.BUse a firewall to restrict access from the outside to the network devices.CAlways use Telnet to access the device command line because its data is automatically encrypted.DUse SSH or another encrypted and authenticated transport to access device configurations.EPrevent the loss of passwords by disabling password encryption.

考题 多选题A company is installing IP phones. The phones and office computers connect to the same device. To ensure maximum throughput for the phone data, the company needs to make sure that the phone traffic is on a different network from that of the office computer data traffic. What is the best network device to which to directly connect the phones and computers, and what technology should be implemented on this device (Choose two.)()。AhubBrouterCswitchDSTPEsubinterfacesFVLAN

考题 多选题In which two locations in an enterprise network can an IPS sensor be placed?()Abridging VLANs on two switchesBbridging two VLANs on one switchCbetween two Layer 2 devices withtrunkingDbetween two Layer 2 devices withouttrunkingEbetween a Layer 2 device and a Layer 3 device withtrunking

考题 多选题In which two locations in an enterprise network can an IPS sensor be placed?()Abridging VLANs on two switchesBbridging two VLANs on one switchCbetween two Layer 2 devices with trunkingDbetween two Layer 2 devices without trunkingEbetween a Layer 2 device and a Layer 3 device with trunking

考题 多选题What are two reasons a network administrator would use CDP (Choose two.)()。Ato verify the type of cable interconnecting two devicesBto determine the status of network services on a remote deviceCto obtain VLAN information from directly connected switchesDto verify Layer 2 connectivity between two devices when Layer 3 failsEto obtain the IP address of a connected device in order to telnet to the deviceFto determine the status of the routing protocols between directly connected routers

考题 多选题What are two ways to view the system log files on a WX device? ()(Choose two.)AUse the CLI and enter show log.BUse the CLI and enter show all.CUse the CLI and enter show logging.DIn WebView, choose Admin Tools Display System Log.