Which two statements represent physical security guidelines that should be followed during Cisco security deployment? (Choose two.)
- Potential security breaches should be evaluated.
- Network equipment should be accessed remotely with Secure Socket Layer (SSL) instead of Telnet.
- Images should be managed using File Transfer Protocol (FTP) and Secure FTP (SFTP) instead of Trivial File Transfer Protocol (TFTP).
- Simple Network Management Protocol version 3 (SNMPv3) should be used for security and privacy features.
- The potential impact of stolen network resources and equipment should be assessed.
Potential security breaches should be evaluated and the potential impact of stolen network resources and equipment should be assessed when designing the physical security architecture during Cisco security deployment.
Physical security is considered during security implementation to increase the strength of the complete security design. It helps to protect and limit access to network resources and physical network equipment. The following physical security guidelines should be followed during Cisco security deployment:
– Potential security breaches should be evaluated.
– The impact of stolen network resources and equipment should be accessed.
– Physical access control such as locks and alarms should be used.
– To secure traffic flowing on networks outside the user control, a control mechanism such as cryptography should be used.
All the other options are incorrect because they do not represent physical security guidelines. They deal more with the transmission of information and the performance and security implications of that transmission rather than the protection of physical devices.
Configure, verify, and troubleshoot basic device hardening