What can be done to secure the virtual terminal interfaces on a router?

What can be done to secure the virtual terminal interfaces on a router? (Choose two.)

What can be done to secure the virtual terminal interfaces on a router? (Choose two.)

A.
Administratively shut down the interface.

B.
Physically secure the interface.

C.
Create an access list and apply it to the virtual terminal interfaces with the access-group
command.

D.
Configure a virtual terminal password and login process.

E.
Enter an access list and apply it to the virtual terminal interfaces using the access-class
command.

Explanation:
It is a waste to administratively shut down the interface. Moreover, someone can still
access the virtual terminal interfaces via other interfaces -> A is not correct.
We can not physically secure a virtual interface because it is “virtual” -> B is not correct.
To apply an access list to a virtual terminal interface we must use the “access-class” command.
The “access-group” command is only used to apply an access list to a physical interface -> C is
not correct; E is correct.
The most simple way to secure the virtual terminal interface is to configure a username &
password to prevent unauthorized login -> D is correct.



Leave a Reply 1

Your email address will not be published. Required fields are marked *


Corey

Corey

Answers D and E