What are two recommended ways of protecting network device configuration files from outside network security threats? (Choose two.)

QuestionsCategory: 200-125What are two recommended ways of protecting network device configuration files from outside network security threats? (Choose two.)
Admin Staff asked 6 months ago
What are two recommended ways of protecting network device configuration files from outside network security threats? (Choose two.)

A. Allow unrestricted access to the console or VTY ports.

B. Use a firewall to restrict access from the outside to the network devices.

C. Always use Telnet to access the device command line because its data is automatically encrypted.

D. Use SSH or another encrypted and authenticated transport to access device configurations.

E. Prevent the loss of passwords by disabling password encryption.






 

Suggested Answer: BD



This question is in CCNA 200-125 exam 
For getting CCNA Certificate


Disclaimers:
The website is not related to, affiliated with, endorsed or authorized by Cisco.
Trademarks, certification & product names are used for reference only and belong to Cisco.

Next Post

Recommended

Welcome Back!

Login to your account below

Create New Account!

Fill the forms below to register

Retrieve your password

Please enter your username or email address to reset your password.