1.Which consideration is important when implementing Syslogging in your network?
A.Use SSH to access your Syslog information.
B.Enable the highest level of Syslogging available to ensure you log all possible event messages.
C.Log all messages to the system buffer so that they can be displayed when accessing the router.
D.Syncronize clocks on the network with a protocol such as Network Time Protocol.
Answer: D
2.Which statement is true when you have generated RSA keys on your Cisco router to prepare for secure
device management?
A.You must then zeroize the keys to reset secure shell before configuring other parameters.
B.The SSH protocol is automatically enabled.
C.You must then specify the general-purpose key size used for authentication with the crypto key
generate rsa general-keys modulus command.
D.All vty ports are automatically enabled for SSH to provide secure management.
Answer:B