Ccna security Lab Securing the Router for Administrative Access



Download 324.25 Kb.
Page39/39
Date16.12.2020
Size324.25 Kb.
#54757
1   ...   31   32   33   34   35   36   37   38   39
2.6.1.2 Lab - Securing the Router for Administrative Access PT-1
Reflection

  1. Explain the importance of securing router access and monitoring network devices.

_______________________________________________________________________________________

_______________________________________________________________________________________

_______________________________________________________________________________________

_______________________________________________________________________________________

_______________________________________________________________________________________

_______________________________________________________________________________________



    1. What advantages does SSH have over Telnet?

_______________________________________________________________________________________

_______________________________________________________________________________________



    1. How scalable is setting up usernames and using the local database for authentication?

_______________________________________________________________________________________

_______________________________________________________________________________________

_______________________________________________________________________________________

_______________________________________________________________________________________

_______________________________________________________________________________________

_______________________________________________________________________________________



    1. Why it is better to have centralized logging servers rather than to have the routers only log locally?

_______________________________________________________________________________________

_______________________________________________________________________________________

_______________________________________________________________________________________

_______________________________________________________________________________________

_______________________________________________________________________________________

_______________________________________________________________________________________



    1. What are some advantages to using AutoSecure?

_______________________________________________________________________________________

_______________________________________________________________________________________

_______________________________________________________________________________________

_______________________________________________________________________________________

_______________________________________________________________________________________

_______________________________________________________________________________________



© 2020 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public. Page of

Download 324.25 Kb.

Share with your friends:
1   ...   31   32   33   34   35   36   37   38   39




The database is protected by copyright ©ininet.org 2024
send message

    Main page