READ Free Dumps For Cisco- 100-101
Question ID 738 | What are two recommended ways of protecting network device configuration files from outside network security threats? (Choose two.) |
Option A | A. Allow unrestricted access to the console or VTY ports. |
Option B | B. Use a firewall to restrict access from the outside to the network devices. |
Option C | C. Always use Telnet to access the device command line because its data is automatically encrypted. |
Option D | D. Use SSH or another encrypted and authenticated transport to access device configurations. |
Option E | E. Prevent the loss of passwords by disabling password encryption. |
Correct Answer | B,D |
Question ID 739 | |
Option A | |
Option B | |
Option C | |
Option D | |
Option E | |
Option F |