网友您好, 请在下方输入框内输入要搜索的题目:
题目内容
(请给出正确答案)
单选题
Which of the following is a secure method of remote access via command line?()
A
RCP
B
Telnet
C
RSH
D
SSH
参考答案
参考解析
解析:
暂无解析
更多 “单选题Which of the following is a secure method of remote access via command line?()A RCPB TelnetC RSHD SSH” 相关考题
考题
Which three types of policies must you configure to allow remote users transparent access to protected resources using IF-MAP Federation between a Junos Pulse Secure Access Service and a Junos Pulse Access Control Service?()A. Session-Export policies on the Junos Pulse Secure Access ServiceB. Session-Export policies on the Junos Pulse Access Control ServiceC. Session-Import policies on the Junos Pulse Secure Access ServiceD. Session-Import policies on the Junos Pulse Access Control ServiceE. Resource access policies on the Junos Pulse Access Control Service
考题
Which of the following is a secure method of remote access via command line?()
A.RCPB.TelnetC.RSHD.SSH
考题
A company wants to secure access to its internal wireless network. The company wants to use themost secure means to access the network. Which of the following is the BEST choice for wireless security in this situation?()A. WEP encryptionB. Channel rotationC. Disable SSIDD. WPA encryption
考题
An administrator is implementing a wireless network. Which of the following encryption technologies is the MOST secure method and will authenticate devices to the network?()
A.SSHB.WEPC.VPND.WPA
考题
Which of the following is a secure method of copying information over a public network?()
A.SCPB.SMTPC.SNMPD.TFTP
考题
When designing remote access to the Enterprise Campus network for teleworkers and mobileworkers, which of the following should the designer consider?()A、 It is recommended to place the VPN termination device in line with the Enterprise Edge 1B、 Maintaining access rules, based on the source IP of the client, on an internal firewall drawnfrom a headend RADIUS server is the most secure deploymentC、 VPN Headend routing using Reverse Route Injection (RRI) with distribution is recommended when the remote user community is small and dedicated DHCP scopes are in placeD、 Clientless SSL VPNs provide more granular access control than SSL VPN clients (thin or thick),including at Layer 7
考题
Which of the following technologies can be used to remotely gain access to a server console?()A、PS/2 KVMB、LDAPC、VNCD、Remote desktopE、VPN
考题
Which of the following is a secure method of copying information over a public network?()A、SCPB、SMTPC、SNMPD、TFTP
考题
Which of the following is the access level of a user that belongs to both the Administrators andUsers groups?()A、UserB、AdministratorC、Power UserD、Remote Desktop User
考题
What is the primary use of a remote access VPN?()A、to secure communication between two remote PCsB、to secure communication between two remote officesC、to secure communication betweenan remote PC and the corporate intranetD、to secure communication between a corporate intranet and the public internet
考题
An administrator is implementing a wireless network. Which of the following encryption technologies is the MOST secure method and will authenticate devices to the network?()A、SSHB、WEPC、VPND、WPA
考题
Which of the following is a secure method of remote access via command line?()A、RCPB、TelnetC、RSHD、SSH
考题
Which of the following should be changed to secure access to a WAPs configuration management interface?()A、SSIDB、WPA2C、DHCPD、Password
考题
Which of the following protocols would BEST grant the user secure access to a remote location?()A、VPNB、FTPC、POP3D、DNS
考题
Which of the following has NO effect on controlling the access permissions needed to run the "date" command on the remote machine "Earth" using the following syntax?rsh Earth date()。A、The local file: /etc/.netrcB、The remote file: ~/ .rhostsC、The securetcpip commandD、The remote file: /etc/hosts.equiv
考题
A customer wants to have employees work from remote locations as well as in the office. All communications must be secure and files must be protected from access by unauthorized people. The employee’s applications (database inserts and reads) are only accessed with a web browser. Which of the following capabilities is necessary?()A、SSLB、PGPC、File encryption programD、Public key encryption
考题
You are designing a remote access strategy to meet the business and technical Requirement. What should you do?()A、 Configure each server running Routing and Remote Access as a RADIUS Client.B、 Add a Remote Access policy to each server running Routing and Remote Access. Configure the Access method as VPN access.C、 Add a Remote Access policy to each server running Routing and Remote Access. Configure the Access method as dialup access.D、 Add a Remote Access policy to each server running Routing and Remote Access. Configure the Access method as wireless access.
考题
Which of the following ensures the MOST secure access to a server room?()A、 ID card readersB、 Server rack doorsC、 Biometric devicesD、 Locked doors
考题
单选题You are designing a remote access strategy to meet the business and technical Requirement. What should you do?()A
Configure each server running Routing and Remote Access as a RADIUS Client.B
Add a Remote Access policy to each server running Routing and Remote Access. Configure the Access method as VPN access.C
Add a Remote Access policy to each server running Routing and Remote Access. Configure the Access method as dialup access.D
Add a Remote Access policy to each server running Routing and Remote Access. Configure the Access method as wireless access.
考题
单选题Which of the following has NO effect on controlling the access permissions needed to run the "date" command on the remote machine "Earth" using the following syntax?rsh Earth date()。A
The local file: /etc/.netrcB
The remote file: ~/ .rhostsC
The securetcpip commandD
The remote file: /etc/hosts.equiv
考题
单选题Which routing method is used to determine the forwarding paths for IP traffic in a Secure Cisco Single-Site Network foundation solution with remote teleworkers?()A
RIPB
EIGRPC
OSPFD
Static and default routes
考题
多选题Which two secure remote access methods are available on the WX platforms?() (Choose two.)ASSLBSSHCTelnetDHTTP
考题
单选题You have a Junos Pulse Secure Access Service acting as an IF-MAP client, configured to federate all user roles to a Junos Pulse Access Control Service acting as an IF-MAP Federation server. A remote user using Junos Pulse logs in to the Junos Pulse Secure Access Service; the Junos Pulse Secure Access Service provisions a remote access session for that user.What happens next?()A
The Junos Pulse Secure Access Service redirects the user to the Junos Pulse Secure Access Service for authenticationB
The Junos Pulse Access Control Service provisions enforcement points to enable resource access for that user.C
The Junos Pulse Secure Access Service publishes user session and role information to the IF- MAP Federation server,D
The Junos Pulse Secure Access Service provisions enforcement points to enable resource access for that user.
考题
单选题A company wants to secure access to its internal wireless network. The company wants to use themost secure means to access the network. Which of the following is the BEST choice for wireless security in this situation?()A
WEP encryptionB
Channel rotationC
Disable SSIDD
WPA encryption
考题
单选题Which of the following ensures the MOST secure access to a server room?()A
ID card readersB
Server rack doorsC
Biometric devicesD
Locked doors
考题
单选题What is the primary use of a remote access VPN?()A
to secure communication between two remote PCsB
to secure communication between two remote officesC
to secure communication betweenan remote PC and the corporate intranetD
to secure communication between a corporate intranet and the public internet
考题
多选题Which three types of policies must you configure to allow remote users transparent access to protected resources using IF-MAP Federation between a Junos Pulse Secure Access Service and a Junos Pulse Access Control Service?()ASession-Export policies on the Junos Pulse Secure Access ServiceBSession-Export policies on the Junos Pulse Access Control ServiceCSession-Import policies on the Junos Pulse Secure Access ServiceDSession-Import policies on the Junos Pulse Access Control ServiceEResource access policies on the Junos Pulse Access Control Service
考题
单选题On the WLSE, which of the following fault policies would be used to verify that access to thecommand-line interface of the access point is secure?()A
registration errorB
authentication failures thresholdC
HTTP disabledD
Telnet disabled
热门标签
最新试卷