Securing Virtual Terminal Interfaces on a Router

Securing Virtual Terminal Interfaces on a Router

Prev Question Next Question

Question

What can be done to secure the virtual terminal interfaces on a router? (Choose two.)

Answers

Explanations

Click on the arrows to vote for the correct answer

A. B. C. D. E.

DE

To secure the virtual terminal interfaces on a router, two of the following actions can be taken:

  1. Configure a virtual terminal password and login process: This involves setting a password that must be entered to access the router's virtual terminal interfaces. This password should be strong and complex, using a combination of letters, numbers, and symbols. Additionally, the login process can be configured to prompt users to enter a username and password combination. This helps to ensure that only authorized users are granted access to the router.

  2. Enter an access list and apply it to the virtual terminal interfaces using the access-class command: This involves creating an access list that specifies which IP addresses are allowed to access the virtual terminal interfaces on the router. The access list can be created using a range of IP addresses or by specifying individual addresses. Once the access list has been created, it can be applied to the virtual terminal interfaces using the access-class command. This ensures that only authorized users are able to access the virtual terminal interfaces on the router.

Administratively shutting down the interface and physically securing the interface are not viable options for securing virtual terminal interfaces. Shutting down the interface would prevent all access to the virtual terminal interfaces, including authorized access, while physically securing the interface would only prevent physical access to the router, but would not protect against unauthorized access over the network.

Creating an access list and applying it to the virtual terminal interfaces with the access-group command is also not a valid option. The access-group command is used to apply an access list to a physical interface, not a virtual terminal interface.