网友您好, 请在下方输入框内输入要搜索的题目:
题目内容
(请给出正确答案)
单选题
A company needs strong wireless security enabled for minimal cost. Which of the following security measures is the BEST to use?()
A
WEP
B
Port filtering
C
WPA
D
Longer SSID broadcast intervals
参考答案
参考解析
解析:
暂无解析
更多 “单选题A company needs strong wireless security enabled for minimal cost. Which of the following security measures is the BEST to use?()A WEPB Port filteringC WPAD Longer SSID broadcast intervals” 相关考题
考题
A company needs strong wireless security enabled for minimal cost. Which of the following security measures is the BEST to use?()
A. WEPB. Port filteringC. WPAD. Longer SSID broadcast intervals
考题
A company wants to secure access to its internal wireless network. The company wants to use themost secure means to access the network. Which of the following is the BEST choice for wireless security in this situation?()A. WEP encryptionB. Channel rotationC. Disable SSIDD. WPA encryption
考题
Which of the following does not affect security on a wireless access point?()
A.EncryptionB.DHCPC.PasswordD.SSID
考题
Which of the following protocols is the LEAST secure and should be avoided on a wireless network?()
A.WEPB.PEAPC.WPAD.TKIP
考题
Refer to the exhibit. A junior network administrator was given the task of configuring port security on SwitchA to allow only PC_A to access the switched network through port fa0/1. If any other device is detected, the port is to drop frames from this device. The administrator configured the interface and tested it with successful pings from PC_A to RouterA, and then observes the output from these two show commands.Which two of these changes are necessary for SwitchA to meet the requirements? ()A.Port security needs to be globally enabled.B.Port security needs to be enabled on the interface.C.Port security needs to be configured to shut down the interface in the event of a violation.D.Port security needs to be configured to allow only one learned MAC address.E.Port security interface counters need to be cleared before using the show command.F.The port security configuration needs to be saved to NVRAM before it can become active.
考题
Which of the following commands on the wireless interface of a cisco 3845 integrated services router allows the ssid to broadcast?()A、router (config-ssid)# guest-modeB、router (config-ssid)# advertiseC、router (config-ssid)# enableD、router (config-ssid)# broadcast
考题
A company wants to secure access to its internal wireless network. The company wants to use themost secure means to access the network. Which of the following is the BEST choice for wireless security in this situation?()A、WEP encryptionB、Channel rotationC、Disable SSIDD、WPA encryption
考题
Which of the following is the BEST way to deny unauthorized computers access to a network? ()A、Disable DHCP.B、Use MAC filtering.C、Disable the SSID broadcast.D、Use a network firewall.
考题
Which of the following protocols is the LEAST secure and should be avoided on a wireless network?()A、WEPB、PEAPC、WPAD、TKIP
考题
An administrator is concerned about users utilizing the company's wireless signal with their personal laptops. Which of the following is the BEST method to use to prevent unauthorized devices from using the company's wireless network?()A、Secure VPNB、MAC filteringC、IP filteringD、Static IP addresses
考题
Which of the following security mitigation techniques is the MOST effective against zero-day attacks?()A、Update antivirus definitionsB、MAC filteringC、Effective security policiesD、User awareness training
考题
Which of the following should be configured on a wireless router to enhance security? (Select TWO).()A、Disable DHCPB、Change wireless channelC、Disable SSID broadcastingD、Change the default username and passwordE、Use a static IP address
考题
For added security, a network administrator has decided to lock down the wireless network. Which of the following are ways to accomplish this? ()(Select TWO).A、Disable all 802.11 trafficB、Disable the SSID from broadcastingC、Disable WPAD、Enable Bluetooth only communicationE、Change the default admin passwordF、Disable WEP
考题
Which of the following does not affect security on a wireless access point?()A、EncryptionB、DHCPC、PasswordD、SSID
考题
A company needs strong wireless security enabled for minimal cost. Which of the following security measures is the BEST to use?()A、WEPB、Port filteringC、WPAD、Longer SSID broadcast intervals
考题
Which of the following BEST describes how server virtualization can cut down IT costs? ()A、 Server virtualization increases server application performance allowing productivity to be increased.B、 Server virtualization simplifies server administration and reduces the IT department staffing needs.C、 Server virtualization implements higher security measures at the server OS level reducing the need for other security implementations.D、 Server virtualization is a more efficient use of hardware for multiple servers reducing the resource utilization.
考题
A technician installed a new wireless access point on an existing small office home office (SOHO) network with a selective security option enabled. All wireless computers connect to the new network except one computer that cannot connect to the wireless network. Which of the following is the cause?()A、The network uses MAC filteringB、The network uses WEPC、The network uses SSID broadcastD、The network uses WPA
考题
Which of the following wireless security techniques is the MOST secure?()A、Enable Wired Equivalent PrivacyB、Disable SSID broadcastC、Enable Wi-Fi Protected AccessD、Enable MAC filtering
考题
单选题A technician installed a new wireless access point on an existing small office home office (SOHO) network with a selective security option enabled. All wireless computers connect to the new network except one computer that cannot connect to the wireless network. Which of the following is the cause?()A
The network uses MAC filteringB
The network uses WEPC
The network uses SSID broadcastD
The network uses WPA
考题
单选题Which of the following BEST describes how server virtualization can cut down IT costs? ()A
Server virtualization increases server application performance allowing productivity to be increased.B
Server virtualization simplifies server administration and reduces the IT department staffing needs.C
Server virtualization implements higher security measures at the server OS level reducing the need for other security implementations.D
Server virtualization is a more efficient use of hardware for multiple servers reducing the resource utilization.
考题
多选题Refer to the exhibit. A junior network administrator was given the task of configuring port security on SwitchA to allow only PC_A to access the switched network through port fa0/1. If any other device is detected, the port is to drop frames from this device. The administrator configured the interface and tested it with successful pings from PC_A to RouterA, and then observes the output from these two show commands.Which two of these changes are necessary for SwitchA to meet the requirements? ()APort security needs to be globally enabled.BPort security needs to be enabled on the interface.CPort security needs to be configured to shut down the interface in the event of a violation.DPort security needs to be configured to allow only one learned MAC address.EPort security interface counters need to be cleared before using the show command.FThe port security configuration needs to be saved to NVRAM before it can become active.
考题
多选题Which of the following should be configured on a wireless router to enhance security? (Select TWO).()ADisable DHCPBChange wireless channelCDisable SSID broadcastingDChange the default username and passwordEUse a static IP address
考题
单选题Which of the following wireless security techniques is the MOST secure?()A
Enable Wired Equivalent PrivacyB
Disable SSID broadcastC
Enable Wi-Fi Protected AccessD
Enable MAC filtering
考题
单选题Which of the following commands on the wireless interface of a Cisco 3845 Integrated Services Router allows the SSID to broadcast?()A
router(config-ssid)# guest-modeB
router(config-ssid)# advertiseC
router(config-ssid)# enableD
router(config-ssid)# broadcast
考题
单选题A company wants to secure access to its internal wireless network. The company wants to use themost secure means to access the network. Which of the following is the BEST choice for wireless security in this situation?()A
WEP encryptionB
Channel rotationC
Disable SSIDD
WPA encryption
热门标签
最新试卷