When implementing a security policy, which two actions should be included as part of the security checklist? (Choose two.)

IT Questions BankCategory: CCNA Discovery v4When implementing a security policy, which two actions should be included as part of the security checklist? (Choose two.)

When implementing a security policy, which two actions should be included as part of the security checklist? (Choose two.)

  • Disable all logging.
  • Enable Telnet on TCP port 23.
  • Use HTTP for web administration.
  • Set timeouts and ACLs on VTY lines.
  • Shut down any unused ports and interfaces.

Exam with this question: CCNA Discovery 4: DCompNtwk Final Exam

Subscribe
Notify of
guest

0 Comments
Inline Feedbacks
View all comments
0
Would love your thoughts, please comment.x
()
x