Which two considerations are valid when designing access layer security?(Choose two.)
- In a large wireless network, the most efficient method to secure the WLAN is MAC address filtering.
- DoS attacks are normally launched against end-user PCs and can be mitigated by installing personal firewalls on all company PCs.
- SSH is more secure than Telnet to administer network devices.
- Disabling unused ports on the switches helps prevent unauthorized access to the network.
- All Telnet passwords are at least 6 characters long.
Exam with this question: CCNA Discovery 4: DCompNtwk Chapter 1 Exam
Please login or Register to submit your answer