Which two considerations are valid when designing access layer security?(Choose two.)

IT Questions BankCategory: CCNA Discovery v4Which two considerations are valid when designing access layer security?(Choose two.)

Which two considerations are valid when designing access layer security?(Choose two.)

  • In a large wireless network, the most efficient method to secure the WLAN is MAC address filtering.
  • DoS attacks are normally launched against end-user PCs and can be mitigated by installing personal firewalls on all company PCs.
  • SSH is more secure than Telnet to administer network devices.
  • Disabling unused ports on the switches helps prevent unauthorized access to the network.
  • All Telnet passwords are at least 6 characters long.

Exam with this question: CCNA Discovery 4: DCompNtwk Chapter 1 Exam

Subscribe
Notify of
guest

0 Comments
Inline Feedbacks
View all comments
0
Would love your thoughts, please comment.x
()
x