Question:
What are two recommended ways of protecting network device configuration files from outside network security threats? (Choose two.)
- Allow unrestricted access to the console or VTY ports.
- Use a firewall to restrict access from the outside to the network devices.
- Always use Telnet to access the device command line because its data is automatically encrypted.
- Use SSH or another encrypted and authenticated transport to access device configurations.
- Prevent the loss of passwords by disabling password encryption.
Exam with this question: CCNA v3.0 (200-125) Study Guide – Exam Dumps
Please login or Register to submit your answer