网友您好, 请在下方输入框内输入要搜索的题目:
题目内容
(请给出正确答案)
单选题
Which protocol should be used to establish a secure terminal connection to a remote network device? Select the best response.()
A
ARP
B
SSH
C
Telnet
D
WEP
E
SNMPv1
F
SNMPv2
参考答案
参考解析
解析:
暂无解析
更多 “单选题Which protocol should be used to establish a secure terminal connection to a remote network device? Select the best response.()A ARPB SSHC TelnetD WEPE SNMPv1F SNMPv2” 相关考题
考题
Which method should be used to dynamically elect an RP when your network is using PIM version1?()
A. auto-RPB. static RPC. discovery modeD. bootstrap protocol
考题
Which IPsec security protocol should be used when confidentiality is required?()
A. AHB. MD5C. PSKD. ESP
考题
Which protocol should be used to establish a secure terminal connection to a remote network device? Select the best response.()
A. ARPB. SSHC. TelnetD. WEPE. SNMPv1F. SNMPv2
考题
Which protocol is an open standard protocol framework that is commonly used in VPNs,to provid secure end-to-end communication?()
A. L2TPB. IPsecC. PPTPD.RSA
考题
Which of the following is true regarding Label Distribution Protocol (LDP)?()A、It is a label distribution protocol for MPLSB、It is a set of procedures and messages by which LSRs establish Label Switch Paths (LSPs) through a networkC、Tag distribution Protocol (TDP) was the basis for LDPD、All of the above are true
考题
Which protocol should be used to establish a secure terminal connection to a remote network device?Select the best response.()A、ARPB、SSHC、TelnetD、WEPE、SNMPv1F、SNMPv2
考题
Which IPsec security protocol should be used when confidentiality is required?()A、AHB、MD5C、PSKD、ESP
考题
Which statement describes the FIP function of the FCoE Initiation Protocol? ()A、 It is required to establish the point-to-point FCoE links with the first switch in the path.B、 It is required to establish the point-to-point FCoE links with any switch across multiple Ethernet segments.C、 It is not used to build the FCoE links.D、 It is used to ensure lossless transport.
考题
Which protocol is an open standard protocol framework that is commonly used in VPNs,to provid secure end-to-end communication?()A、L2TPB、IPsecC、PPTPD、RSA
考题
Which can be done to secure the virtual terminal interfaces on a router?()A、Administratively shut down the interfaces.B、Physically secure the interfaces.C、Configure a virtual terminal password and login process.D、Enter an access list and apply it to the terminal interfaces using the access-class command.E、Create an access list and apply it to the terminal interfaces using the access-group command
考题
Which can be done to secure the virtual terminal interfaces on a router?()A、Administratively shut down the interfaces.B、Physically secure the interfaces.C、Configure a virtual terminal password and login process.D、Enter an access list and apply it to the terminal interfaces using the access-class command.E、Create an access list and apply it to the terminal interfaces using the access-group command.
考题
Which two statements about the Cisco AutoSecure feature are true?()A、All passwords entered during the AutoSecure configuration must be a minimum of 8 characters in length.B、Cisco123 would be a valid password for both the enable password and the enable secret commands.C、The auto secure command can be used to secure the router login as well as the NTP and SSH protocols.D、For an interactive full session of AutoSecure, the auto secure login command should be used.E、If the SSH server was configured, the 1024 bit RSA keys are generated after the auto secure commandis enabled.
考题
You work as a exchange administrator at TestKing.com. The TestKing.com network contains an internalnetwork as well as a perimeter network. The primeter network contains an Exchange Server 2010 EdgeTransport Server named TESTKING-EX. During the course of day you receive an instruction form the CIO to formulate a remote managementsolution for TESTKING-EX01 based on the set criteria below: You need to ensure that management traffic is encypted. You nedd to ensure that remote administration is permitted fron the Internet network.You need to ensure that Exchange Management Console (EMC) is supported. What should you do?()A、You should recommend that Windows Management Instrumentation Command-line (WMIC) be used.B、You should recommend that Lightweight Directory Access Protocol(LDAP)over Secure Socket Layer(SSL) be used.C、You should recommend that Windows Remote Management (WinRM) over SSL be used.D、You should recommend that Remote Desktop Protocol(RDP)over Secure Socket Layer(SSL)be used.
考题
单选题You have a network containing 120 routers. You must establish and maintain connectivity between the loopback interfaces of all routers. Because of the critical services using the network, you need redundancy and fast failover. Which routing protocol should you use in this scenario?()A
OSPFB
RIPC
BGPD
static
考题
单选题Your network consists of a single Active Directory domain. Remote Assistance is enabled on all computers. You need to ensure that you can establish Remote Assistance connections to all computers without a Remote Assistance invitation. Which group policy setting should you configure? ()A
Offer Remote AssistanceB
Solicited Remote AssistanceC
Allow users to connect remotely using Terminal ServicesD
Sets rules for remote control of Terminal Services user sessions
考题
单选题Which material should NOT be used to secure cargo on deck for a voyage().A
Steel chainB
Wire ropeC
Steel strappingD
Fiber rope
考题
单选题Which method should be used to dynamically elect an RP when your network is using PIM version1?()A
auto-RPB
static RPC
discovery modeD
bootstrap protocol
考题
单选题Which of the following is true regarding Label Distribution Protocol (LDP)?()A
It is a label distribution protocol for MPLSB
It is a set of procedures and messages by which LSRs establish Label Switch Paths (LSPs) through a networkC
Tag distribution Protocol (TDP) was the basis for LDPD
All of the above are true
考题
单选题Which statement describes the FIP function of the FCoE Initiation Protocol? ()A
It is required to establish the point-to-point FCoE links with the first switch in the path.B
It is required to establish the point-to-point FCoE links with any switch across multiple Ethernet segments.C
It is not used to build the FCoE links.D
It is used to ensure lossless transport.
热门标签
最新试卷