Reflection
Explain the importance of securing router access and monitoring network devices.
_______________________________________________________________________________________
_______________________________________________________________________________________
_______________________________________________________________________________________
_______________________________________________________________________________________
_______________________________________________________________________________________
_______________________________________________________________________________________
What advantages does SSH have over Telnet?
_______________________________________________________________________________________
_______________________________________________________________________________________
How scalable is setting up usernames and using the local database for authentication?
_______________________________________________________________________________________
_______________________________________________________________________________________
_______________________________________________________________________________________
_______________________________________________________________________________________
_______________________________________________________________________________________
_______________________________________________________________________________________
Why it is better to have centralized logging servers rather than to have the routers only log locally?
_______________________________________________________________________________________
_______________________________________________________________________________________
_______________________________________________________________________________________
_______________________________________________________________________________________
_______________________________________________________________________________________
_______________________________________________________________________________________
What are some advantages to using AutoSecure?
_______________________________________________________________________________________
_______________________________________________________________________________________
_______________________________________________________________________________________
_______________________________________________________________________________________
_______________________________________________________________________________________
_______________________________________________________________________________________
© 2020 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public. Page of
Share with your friends: |