READ Free Dumps For Cisco- 100-101
Question ID 6448 | What should be part of a comprehensive network security plan? |
Option A | Allow users to develop their own approach to network security |
Option B | Physically secure network equipment from potential access by unauthorized individuals |
Option C | Encourage users to use personal information in their passwords to minimize the likelihood of passwords being forgotten |
Option D | Delay deployment of software patches and updates until their effect on end-user equipment is well known and widely reported. |
Option E | Minimize network overhead by deactivating automatic antivirus client updates. |
Correct Answer | b |
Question ID 6450 | What are two recommended ways of protecting network device configuration files from outside network security threats? (Choose two.) |
Option A | Allow unrestricted access to the console or VTY ports. |
Option B | Use a firewall to restrict access from the outside to the network devices |
Option C | Always use Telnet to access the device command line because its data is automatically encrypted. |
Option D | Use SSH or another encrypted and authenticated transport to access device configurations. |
Option E | Prevent the loss of passwords by disabling password encryption. |
Correct Answer | bd |