网友您好, 请在下方输入框内输入要搜索的题目:
题目内容
(请给出正确答案)
单选题
In which of the following scenarios would MAC filtering be MOST effective as a part of wireless security? ()
A
A public place where guests are free to access the wireless network.
B
A small office where a defined number of specific wireless devices are used.
C
A meeting room where various company users will access the wireless network during meetings.
D
An office where some users are unable to use WPA encryption due to older wireless cards so they use MAC filtering.
参考答案
参考解析
解析:
暂无解析
更多 “单选题In which of the following scenarios would MAC filtering be MOST effective as a part of wireless security? ()A A public place where guests are free to access the wireless network.B A small office where a defined number of specific wireless devices are used.C A meeting room where various company users will access the wireless network during meetings. D An office where some users are unable to use WPA encryption due to older wireless cards so they use MAC filtering.” 相关考题
考题
Which of the following is NOT a characteristic of message filtering?A semanticsB mediaC ethicsD organizational statusE reputation
考题
6 Which of the following is NOT a characteristic of message filtering?A. semanticsB. mediaC. ethicsD. organizational statusE. reputation
考题
Which of the following is used to deny or allow access to a wireless router network?()
A. SSIDB. SNMPC. IMAPD. MAC filtering
考题
An administrator wants to limit access of a wireless network without requiring authorized users toenter a password or network key.Which of the following methods would MOST likely be implemented on the wireless network?()A. Disable SSIDB. WPAC. MAC filteringD. RAS
考题
Keyword and blacklist filtering would be handled at which level in a network?()
A. Layer 2 managed switchB. DHCP serverC. Hardware firewallD. Bridge
考题
Which of the following scenarios are likely reasons for an EtherChannel to fail?()A、Mismatched EtherChannel protocolB、Mismatched EtherChannel port selectionC、Mismatched EtherChannel distribution algorithmD、Mismatched trunk modeE、Mismatched native VLANF、Mismatched link speed
考题
Which of the following commands would result in the following output: M.M.M()。A、Ping 10.1.1.1 Data Pattern MB、Ping 10.1.1.1 timeout 0C、Ping 10.1.1.1 size 1500 df-bitD、Ping 10.1.1.1 source loopback 0E、Ping 10.1.1.1 size 1500F、Ping 10.1.1.1 size 1500 Strict
考题
In which of the following scenarios would MAC filtering be MOST effective as a part of wireless security? ()A、A public place where guests are free to access the wireless network.B、A small office where a defined number of specific wireless devices are used.C、A meeting room where various company users will access the wireless network during meetings. D、An office where some users are unable to use WPA encryption due to older wireless cards so they use MAC filtering.
考题
A user would like to ensure that only their family and their laptops can access a newly installed wireless router. Which of the following BEST accomplishes this?()A、MAC filteringB、Disable DHCPC、Static IP addressesD、Port forwarding
考题
Which of the following is the BEST way to deny unauthorized computers access to a network? ()A、Disable DHCP.B、Use MAC filtering.C、Disable the SSID broadcast.D、Use a network firewall.
考题
An administrator wants to limit access of a wireless network without requiring authorized users to enter a password or network key. Which of the following methods would MOST likely be implemented on the wireless network?()A、Disable SSIDB、WPAC、MAC filteringD、RAS
考题
Which of the following would be the BEST way to restrict access to the WAP from certain clients?()A、Disable DHCP serverB、Enable WEP encryptionC、Disable SSID broadcastD、Enable MAC filtering
考题
Which of the following would need to be implemented on a wireless router to allow network accessbased on a passphrase that the administrator would supply?()A、WPA-PSK encryptionB、SSID broadcastC、Port forwardingD、MAC filtering
考题
Which of the following is used to deny or allow access to a wireless router network?()A、SSIDB、SNMPC、IMAPD、MAC filtering
考题
Which of the following scenarios would dictate the use of a 64-bit processor instead of a 32-bit processor?()A、Implementation of access control lists (ACLs)B、Implementation of more than two network cardsC、Implementation of iSCSI attached storageD、Implementation of more than 4GB of RAM
考题
Which of the following wireless security techniques is the MOST secure?()A、Enable Wired Equivalent PrivacyB、Disable SSID broadcastC、Enable Wi-Fi Protected AccessD、Enable MAC filtering
考题
When installing a wireless access point, which of the following should the technician perform FIRST?()A、Enable MAC filtering.B、Download and install the latest firmware.C、Disable DHCP.D、Change the default password.
考题
Which of the following features enables you to modify the addresses of senders and recipients on messages that Exchange 2010 organization?()A、Transport ruleB、JournalingC、Address rewritingD、Sender filtering
考题
单选题Which of the following would need to be implemented on a wireless router to allow network accessbased on a passphrase that the administrator would supply?()A
WPA-PSK encryptionB
SSID broadcastC
Port forwardingD
MAC filtering
考题
多选题Which of the following scenarios are likely reasons for an EtherChannel to fail?()AMismatched EtherChannel protocolBMismatched EtherChannel port selectionCMismatched EtherChannel distribution algorithmDMismatched trunk modeEMismatched native VLANFMismatched link speed
考题
单选题Which of the following is used to deny or allow access to a wireless router network?()A
SSIDB
SNMPC
IMAPD
MAC filtering
考题
单选题Which of the following would be the BEST way for Mike, a technician, to disallow other clients to access a WAP, if only the same clients will always be accessing it?()A
Disable SSID broadcastB
Enable MAC filteringC
Disable DHCP serverD
Enable WEP encryption
考题
单选题When fuel oil is accidentally missed with lube oil which of the following processes can be used to separate them?() Ⅰ.filtering Ⅱ.settlingA
Ⅰ onlyB
Ⅱ onlyC
either Ⅰ or ⅡD
neither Ⅰ or Ⅱ
考题
单选题Which of the following commands would result in the following output: M.M.M()。A
Ping 10.1.1.1 Data Pattern MB
Ping 10.1.1.1 timeout 0C
Ping 10.1.1.1 size 1500 df-bitD
Ping 10.1.1.1 source loopback 0E
Ping 10.1.1.1 size 1500F
Ping 10.1.1.1 size 1500 Strict
考题
单选题Keyword and blacklist filtering would be handled at which level in a network?()A
Layer 2 managed switchB
DHCP serverC
Hardware firewallD
Bridge
热门标签
最新试卷