Defending the Perimeter ISR Overview and Providing Secure Administrative Access This section begins by introducing the security features offered in the Cisco line of ISR routers. Additional hardware options for these routers are also discussed. Then, with a foundational understanding of the underlying hardware, you will learn a series of best practices for security … [Read more...]
CCNA Security FAQ: Defending the Perimeter
CCNA Security FAQ: Defending the Perimeter Question. Which of the following are considered IOS security features? (Choose four.) A. Stateful firewall B. MARS C. IPS D. VRF-aware firewall E. VPN F. ACS Answer: A, C, D, and E Question. Some ISRs include a USB port, into which a flash drive can connect. What are three common uses for the flash drive? (Choose three.) A. … [Read more...]