Which protocol should be used to establish a secure terminal

题目
单选题
Which protocol should be used to establish a secure terminal connection to a remote network device? Select the best response.()
A

ARP

B

SSH

C

Telnet

D

WEP

E

SNMPv1

F

SNMPv2

参考答案和解析
正确答案: C
解析: 暂无解析
如果没有搜索结果或未解决您的问题,请直接 联系老师 获取答案。
相似问题和答案

第1题:

Which protocol should be used to establish a secure terminal connection to a remote network device? Select the best response.()

A. ARP

B. SSH

C. Telnet

D. WEP

E. SNMPv1

F. SNMPv2


参考答案:B

第2题:

Which of the following is true regarding Label Distribution Protocol (LDP)?()

  • A、It is a label distribution protocol for MPLS
  • B、It is a set of procedures and messages by which LSRs establish Label Switch Paths (LSPs) through a network
  • C、Tag distribution Protocol (TDP) was the basis for LDP
  • D、All of the above are true

正确答案:D

第3题:

Which method should be used to dynamically elect an RP when your network is using PIM version1?()

A. auto-RP

B. static RP

C. discovery mode

D. bootstrap protocol


参考答案:A

第4题:

Which protocol is an open standard protocol framework that is commonly used in VPNs,to provid secure end-to-end communication?()

  • A、L2TP
  • B、IPsec
  • C、PPTP
  • D、RSA

正确答案:B

第5题:

Which IPsec security protocol should be used when confidentiality is required?()

  • A、AH
  • B、MD5
  • C、PSK
  • D、ESP

正确答案:D

第6题:

Which protocol is an open standard protocol framework that is commonly used in VPNs,to provid secure end-to-end communication?()

A. L2TP

B. IPsec

C. PPTP

D.RSA


参考答案:B

第7题:

Which protocol should be used to establish a secure terminal connection to a remote network device?Select the best response.()

  • A、ARP
  • B、SSH
  • C、Telnet
  • D、WEP
  • E、SNMPv1
  • F、SNMPv2

正确答案:B

第8题:

Which IPsec security protocol should be used when confidentiality is required?()

A. AH

B. MD5

C. PSK

D. ESP


参考答案:D

第9题:

Which statement describes the FIP function of the FCoE Initiation Protocol? ()

  • A、 It is required to establish the point-to-point FCoE links with the first switch in the path.
  • B、 It is required to establish the point-to-point FCoE links with any switch across multiple Ethernet segments.
  • C、 It is not used to build the FCoE links.
  • D、 It is used to ensure lossless transport.

正确答案:B

第10题:

Which can be done to secure the virtual terminal interfaces on a router?()

  • A、Administratively shut down the interfaces.
  • B、Physically secure the interfaces.
  • C、Configure a virtual terminal password and login process.
  • D、Enter an access list and apply it to the terminal interfaces using the access-class command.
  • E、Create an access list and apply it to the terminal interfaces using the access-group command

正确答案:C,D

更多相关问题