A. Administratively shut down the interface.
B. Physically secure the interface.
C. Create an access list and apply it to the virtual terminal interfaces with the access-group command.
D. Configure a virtual terminal password and login process.
E. Enter an access list and apply it to the virtual terminal interfaces using the access-class command.
您可能感興趣的試卷
你可能感興趣的試題
A. Bandwidth 56000
B. Bandwidth 56000000
C. Bandwidth 56
D. Bandwidth 56kbps
A. Switch(config)# ip default-network 192.168.12.1
B. Switch(config)#ip route-default 192.168.12.1
C. Switch(config)# ip default-gateway 192.168.12.1
D. Swicth(config)# ip route 192.168.12.1 0.0.0.0
A. TestKingA(config-if)# ip address 192.168.32.142 255.255.255.240
B. TestKingA(config-if)# ip address 192.168.32.143 255.255.255.240
C. TestKingA(config-if)# ip address 192.168.32.158 255.255.255.240
D. TestKingA(config-if)# ip address 192.168.32.145 255.255.255.240
E. TestKingA(config-if)# ip address 192.168.32.144 255.255.255.240
A. 113.10.4.0
B. 186.54.3.0
C. 175.33.3.255
D. 26.35.3.255
E. 152.135.7.0
F. 17.35.36.0
A. router(config-if)#ip address 142.8.2.1 subnet mask 255.255.252.0
B. router(config-if)#142.8.2.1 0.0.3.255
C. router(config-if)#ip address 142.8.2.1 255.255.252.0
D. router(config-if)#142.8.2.1 subnet mask 255.255.252.0
E. router(config-if)#ip address 142.8.2.1 0.0.3.255
F. router(config-if)#ip address 142.8.2.1 subnet mask /22
最新試題
Given a subnet mask of 255.255.255.224, which of the following addresses can be assigned to network hosts?()
How many usable sub network and usable hosts per subnet result in the network address 201.105.13.0 is sub netted with a mask of /26? ()
Which statement describes the rule of split horizon?()
What should the configuration register value be after successfully completing the password recover procedure and returning the router to normal operation? ()
Five minutes after issuing the show running-config command, a technician enters the command again and notices that several access list statements have been altered. Because of this, the technician believes that the router is being configured by an unknown person through Telnet. Before changing the router passwords, the technician would like to discover if anyone is connected to the router by Telnet and stop them from making further changes.Which commands will accomplish these options?()
Which of the following describe router functions?()
Which of the following options lists the steps in PPP session establishment in the correct order?()
A Class C network address has been subnetted with a /27 mask.Which of the following addresses is a broadcast address for one of the resulting subnets?()
An administrator would like to configure a switch over a virtual terminal connection from locations outside of the local LAN. Which of the following are required in order for the switch to be configured from a remote location? ()
TestKing.com has allocated the IP add 199.144.27.0 is its network, to provide flexibility for the LAN design, a subnet mask of 255.255.255.240 has been chosen. Which of the following address can be assigned to LAN on the resulting subnets.()