Drag the security features on the left to the specific security risk they help protect against on the right.

DRAG DROP
Drag the security features on the left to the specific security risk they help protect against on the right. (Not all options are used.)

DRAG DROP
Drag the security features on the left to the specific security risk they help protect against on the right. (Not all options are used.)

Answer:

Explanation:



Leave a Reply 1

Your email address will not be published. Required fields are marked *


REHAN

REHAN

(1)remote access to device console ….VTY password.(2) access to the console line 0 …CONSOLE PASSWORD (3) access to connected network or resources….ACCESS GROUP(4) viewing of password…SERVICE PASSWORD-ENCRYPTION (5) access to privileged mode……ENABLE SECRET