Which of the following are the valid steps for securing routers?

Which of the following are the valid steps for securing routers? Each correct answer represents a
complete solution. Choose all that apply.

Which of the following are the valid steps for securing routers? Each correct answer represents a
complete solution. Choose all that apply.

A.
Use a password that is easy to remember for a router’s administrative console.

B.
Use a complex password for a router’s administrative console.

C.
Configure access list entries to prevent unauthorized connections and traffic routing.

D.
Keep routers updated with the latest security patches.

Explanation:

The following are the valid steps for securing routers and devices:
Configure access list entries to prevent unauthorized connections and traffic routing.
Use a complex password for a router’s administrative console.
Keep routers in locked rooms.
Keep routers updated with the latest security patches.
Use monitoring a equipment to protect routers and devices.
Router is a device that routes data packets between computers in different networks. It is used to
connect multiple networks, and it determines the path to be taken by each data packet to its
destination computer. Router maintains a routing table of the available routes and their conditions.
By using this information, along with distance and cost algorithms, the router determines the best
path to be taken by the data packets to the destination computer. A router can connect dissimilar
networks, such as Ethernet, FDDI, and Token Ring, and route data packets among them. Routers
operate at the network layer (layer 3) of the Open Systems Interconnection (OSI) model.
A security patch is a program that eliminates a vulnerability exploited by hackers.



Leave a Reply 0

Your email address will not be published. Required fields are marked *