Which two practices are recommended for an acceptable security posture in a network? (Choose two.) A. Use a cryptographic keychain to authenticate to network devices. B. Place internal email and file servers in a designated DMZ. C. Back up device configurations to encrypted USB drives for secure retrieval. D. Disable unused or unnecessary ports, interfaces, and services. E. Maintain network equipment in a secure location. Â Suggested Answer: DE Community Answer: DE This question is in 200-301 Cisco Certified Network Associate (CCNA) Exam For getting Cisco Certified Network Associate (CCNA) Certificate Disclaimers: The website is not related to, affiliated with, endorsed or authorized by Cisco. Trademarks, certification & product names are used for reference only and belong to Cisco. The website does not contain actual questions and answers from Cisco's Certification Exam.
Please login or Register to submit your answer