niusouti.com

You wish to increase the security of all of the routers within your network. What can be done to secure the virtual terminal interfaces on a router?()A. Administratively shut down the interface.B. Physically secure the interface.C. Create an access list a

题目
You wish to increase the security of all of the routers within your network. What can be done to secure the virtual terminal interfaces on a router?()

A. Administratively shut down the interface.

B. Physically secure the interface.

C. Create an access list and apply it to the virtual terminal interfaces with the access-group command.

D. Configure a virtual terminal password and login process.

E. Enter an access list and apply it to the virtual terminal interfaces using the access-class command.


相似考题
更多“You wish to increase the security of all of the routers within your network. What can be done to secure the virtual terminal interfaces on a router?() ”相关问题
  • 第1题:

    You wish to limit telnet access into your Cisco router to only a single host. In order to accomplish this, access list 1 has been written to allow host 172.16.1.224 access to the router vty lines.What command would assign this access- list to the Virtual Terminal Lines?()

    A. router(config-line)# ip access-group 1 in

    B. router(config-line)# access-class 1 in

    C. router(config-line)# ip access-list 1 in

    D. router(config-line)# access-line 1 in


    参考答案:B

  • 第2题:

    A new router, named TK1, is being installed. You wish to add this router to your existing OSPF network. In doing so, you configure the following: TK1(config)# router ospf 1 TK1(config-router)# network 10.10.10.0 255.255.255.0 area 0 After making this change, you notice that the networks attached to TK1 are not being learned by the other OSPF routers. What could be the cause of this?()

    • A、The AS is not correctly configured
    • B、The network subnet mask is incorrectly configured
    • C、The network wildcard mask is configured incorrectly
    • D、The network number is not correctly configured
    • E、The process id is configured incorrectly
    • F、None of the above

    正确答案:C

  • 第3题:

    Which description regarding OSPF Network LSAs is correct?()

    • A、They are originated by Area Border Router and are sent into a single area to advertise an Autonomous System Border Router.
    • B、They are originat ed by Area Border Routers and are sent into a single area to advertise destinations outside that area.
    • C、They are originated by the DR on every multi - access network. They include all attached routers including the DR itself.
    • D、They are originated by  every router in the OPSF network. They include all routers on the link, interfaces, the cost of the link, and any known neighbor on the link.

    正确答案:C

  • 第4题:

    Your ERX router is supporting 100 virtual routers. A specific line module supports IP interfaces in 5 virtual routers.How many routing tables are maintained on that module?()

    • A、0
    • B、1
    • C、5
    • D、100

    正确答案:C

  • 第5题:

    Which can be done to secure the virtual terminal interfaces on a router?()

    • A、Administratively shut down the interfaces.
    • B、Physically secure the interfaces.
    • C、Configure a virtual terminal password and login process.
    • D、Enter an access list and apply it to the terminal interfaces using the access-class command.
    • E、Create an access list and apply it to the terminal interfaces using the access-group command.

    正确答案:C,D

  • 第6题:

    You wish to limit telnet access into your Cisco router to only a single host. In order to accomplish this, access list 1 has been written to allow host 172.16.1.224 access to the router vty lines. What command would assign this access- list to the Virtual Terminal Lines?()

    • A、router(config-line)# ip access-group 1 in
    • B、router(config-line)# access-class 1 in
    • C、router(config-line)# ip access-list 1 in
    • D、router(config-line)# access-line 1 in

    正确答案:B

  • 第7题:

    What can be done to secure the virtual terminal interfaces on a router? ()

    • A、Administratively shut down the interface.
    • B、Physically secure the interface.
    • C、Create an access list and apply it to the virtual terminal interfaces with the access-group command.
    • D、Configure a virtual terminal password and login process.
    • E、Enter an access list and apply it to the virtual terminal interfaces using the access-class command.

    正确答案:D,E

  • 第8题:

    You are a network administrator for your company. The network contains a perimeter network. The perimeter network contains four Windows Server 2003, Web Edition computers that are configured as a Network Load Balancing cluster.   The cluster hosts an e-commerce Web site that must be available 24 hours per day. The cluster is located in a physically secure data center and uses an Internet-addressable virtual IP address. All servers in the cluster are configured with the Hisecws.inf template.   You need to implement protective measures against the cluster’s most significant security vulnerability.   What should you do?  ()

    • A、 Use Encrypting File System (EFS) for all files that contain confidential data stored on the cluster.
    • B、 Use packet filtering on all inbound traffic to the cluster.
    • C、 Use Security Configuration and Analysis regularly to compare the security settings on all servers in the cluster with the baseline settings.
    • D、 Use intrusion detection on the perimeter network.

    正确答案:B

  • 第9题:

    单选题
    Which description regarding OSPF Network LSAs is correct?()
    A

    They are originated by Area Border Router and are sent into a single area to advertise an Autonomous System Border Router.

    B

    They are originat ed by Area Border Routers and are sent into a single area to advertise destinations outside that area.

    C

    They are originated by the DR on every multi - access network. They include all attached routers including the DR itself.

    D

    They are originated by  every router in the OPSF network. They include all routers on the link, interfaces, the cost of the link, and any known neighbor on the link.


    正确答案: C
    解析: 暂无解析

  • 第10题:

    单选题
    You are a network administrator for your company. The network contains a perimeter network. The perimeter network contains four Windows Server 2003, Web Edition computers that are configured as a Network Load Balancing cluster.   The cluster hosts an e-commerce Web site that must be available 24 hours per day. The cluster is located in a physically secure data center and uses an Internet-addressable virtual IP address. All servers in the cluster are configured with the Hisecws.inf template.   You need to implement protective measures against the cluster’s most significant security vulnerability.   What should you do?  ()
    A

     Use Encrypting File System (EFS) for all files that contain confidential data stored on the cluster.

    B

     Use packet filtering on all inbound traffic to the cluster.

    C

     Use Security Configuration and Analysis regularly to compare the security settings on all servers in the cluster with the baseline settings.

    D

     Use intrusion detection on the perimeter network.


    正确答案: A
    解析: 暂无解析

  • 第11题:

    单选题
    You are logged into a router and with to view the layer 3 information about your neighboring Cisco routers. What IOS command gives layer 3 information for of the directly connected router interfaces?()
    A

    show ip links

    B

    show cdp neighbor

    C

    show cdp neighbor detail

    D

    show ip clients

    E

    show ip route

    F

    None of the above


    正确答案: B
    解析: 暂无解析

  • 第12题:

    单选题
    A new router, named TK1, is being installed. You wish to add this router to your existing OSPF network. In doing so, you configure the following: TK1(config)# router ospf 1 TK1(config-router)# network 10.10.10.0 255.255.255.0 area 0 After making this change, you notice that the networks attached to TK1 are not being learned by the other OSPF routers. What could be the cause of this?()
    A

    The AS is not correctly configured

    B

    The network subnet mask is incorrectly configured

    C

    The network wildcard mask is configured incorrectly

    D

    The network number is not correctly configured

    E

    The process id is configured incorrectly

    F

    None of the above


    正确答案: E
    解析: 暂无解析

  • 第13题:

    What can be done to secure the virtual terminal interfaces on a router?()

    A. Administratively shut down the interface.

    B. Physically secure the interface.

    C. Create an access list and apply it to the virtual terminal interfaces with the access-group command.

    D. Configure a virtual terminal password and login process.

    E. Enter an access list and apply it to the virtual terminal interfaces using the access-class command.


    参考答案:D, E

  • 第14题:

    You need to upgrade the IOS of an existing router on your network. The new IOS image is located on a TFTP server that you have set up within the network. What command should you issue in order to download the new IOS version?()

    • A、Router# copy tftp flash
    • B、Router# copy flash run
    • C、Router(config)# restore flash
    • D、Router(config)# repair flash
    • E、Router#copy flash tftp
    • F、Router# copy start flash

    正确答案:A

  • 第15题:

    When policy - based routing (PBR) is being configured, which three criteria can the set command specify?()

    • A、all interfaces in the path toward the destination
    • B、all networks in the path toward the destination
    • C、adjacent next hop router in the path toward the destination
    • D、all routers in the path toward the destination
    • E、all interfaces through which the packets can be routed
    • F、type of service and precedence in the IP packets

    正确答案:C,E,F

  • 第16题:

    Which can be done to secure the virtual terminal interfaces on a router?()

    • A、Administratively shut down the interfaces.
    • B、Physically secure the interfaces.
    • C、Configure a virtual terminal password and login process.
    • D、Enter an access list and apply it to the terminal interfaces using the access-class command.
    • E、Create an access list and apply it to the terminal interfaces using the access-group command

    正确答案:C,D

  • 第17题:

    You are logged into a router and with to view the layer 3 information about your neighboring Cisco routers. What IOS command gives layer 3 information for of the directly connected router interfaces?()

    • A、show ip links
    • B、show cdp neighbor
    • C、show cdp neighbor detail
    • D、show ip clients
    • E、show ip route
    • F、None of the above

    正确答案:C

  • 第18题:

    What are four uses of the USB ports in the Cisco integrated services routers?()

    • A、Secure Device Authentication
    • B、Remote Administration
    • C、Bulk Flash storage
    • D、Secure Configuration Files Distribution
    • E、Storage of Removable Credentials
    • F、Increase RAM Memory for the Router

    正确答案:A,C,D,E

  • 第19题:

    Active Directory Rights Management Services (AD RMS) is deployed on your network. Users who have Windows Mobile 6 devices report that they cannot access documents that are protected by  AD RMS.   You need to ensure that all users can access AD RMS protected content by using Windows  Mobile 6 devices.  What should you do()

    • A、Modify the security of the ServerCertification.asmx file.
    • B、Modify the security of the MobileDeviceCertification.asmx file.
    • C、Enable anonymous authentication for the _wmcs virtual directory.
    • D、Enable anonymous authentication for the certification virtual directory.

    正确答案:B

  • 第20题:

    单选题
    Your ERX router is supporting 100 virtual routers.A specific line module supports IP interfaces in 5 virtual routers.How many routing tables are maintained on that module?()
    A

    0

    B

    1

    C

    5

    D

    100


    正确答案: D
    解析: 暂无解析

  • 第21题:

    单选题
    Your network contains a Terminal Services server named Server1 that runs Windows Server 2003 Service Pack 2 (SP2).  Server1 has a server certificate from a trusted authority installed. All Terminal Services clients have the RDP client version 5.2 installed. You need to ensure that all Terminal Services connections to Server1 use Transport Layer Security.  What should you do?()
    A

    In Terminal Services Configuration, change the permissions for Remote Desktop Users to Full Control.

    B

    In Terminal Services Configuration, change the security layer setting to Negotiate and set the encryption level to High.

    C

    In Local Security Policy, enable Domain Member: Require strong (Windows 2000 or later) session key.

    D

    In Local Security Policy, enable Domain Member: Digitally encrypt or sign secure channel data (always).


    正确答案: A
    解析: 暂无解析

  • 第22题:

    多选题
    You wish to increase the security of all of the routers within your network. What can be done to secure the virtual terminal interfaces on a router?()
    A

    Administratively shut down the interface.

    B

    Physically secure the interface.

    C

    Create an access list and apply it to the virtual terminal interfaces with the access-group command.

    D

    Configure a virtual terminal password and login process.

    E

    Enter an access list and apply it to the virtual terminal interfaces using the access-class command.


    正确答案: D,E
    解析: 暂无解析

  • 第23题:

    单选题
    You are the network administrator for TestKing. Your network consists of a single Active Directory domain. You manage a Terminal Server farm that includes five terminal servers and a Terminal Services Licensing server named testking9. All servers run Windows 2000 Server. There are 2,500 users who log on to the terminal servers to access a custom human resource (HR) application. You install Windows Server 2003 on a new server named testking10. Testking10 is configured with all default settings enabled. You install Terminal Services and the HR application on testking10. You instruct some users to access the HR application on testking10. Four months later, users report that they can no longer establish Terminal Services sessions to testking10. You verify that users can connect to the other terminal servers in your Terminal Server farm. You need to ensure that users can run the HR application on all terminal servers on the network. What should you do?()
    A

    On testking10, set the License Logging service to Automatic, and the start the service.

    B

    On testking10, install Terminal Service Licensing. Activate the Terminal Services Licensing server.

    C

    Install Windows Server 2003 on all domain controllers on the network.

    D

    Deactivate and activate Terminal Service Licensing on Testking9.


    正确答案: A
    解析: 暂无解析