What are two recommended ways of protecting network device configuration files from outside network security threats?

admin2019-04-08  31

问题 What are two recommended ways of protecting network device configuration files from outside network security threats?

选项 A、Allow unrestricted access to the console or VTY ports.
B、Use a firewall to restrict access from the outside to the network devices.
C、Always use Telnet to access the device command line because its data is automatically encrypted.
D、Use SSH or another encrypted and authenticated transport to access device configurations.
E、Prevent the loss of passwords by disabling password encryption.

答案B,D

解析 要确保外部的安全的站点才可以访问我的网络,这就涉及到了安全的问题了,我们 可以使用防火墙来限制外网中来的设备;也可以通过SSH或加密和认证来控制。
转载请注明原文地址:https://kaotiyun.com/show/DZhZ777K
0

最新回复(0)