To install firewalls at all critical points in the network | |
To harden all exterior-facing network components | |
To find a balance between the need to open networks to support evolving business requirements and the need to inform | |
To educate employees to be on the lookout for suspicious behavior |
The running Cisco IOS image is encrypted and then automatically backed up to the NVRAM. | |
The Cisco IOS image file is not visible in the output from the show flash command. | |
The running Cisco IOS image is encrypted and then automatically backed up to a TFTP server. | |
When the router boots up, the Cisco IOS image is loaded from a secured FTP location. | |
The show version command does not show the Cisco IOS image file location. |
A risk | |
An exploit | |
An attack | |
A vulnerability |