网友您好, 请在下方输入框内输入要搜索的题目:

题目内容 (请给出正确答案)

A company needs strong wireless security enabled for minimal cost. Which of the following security measures is the BEST to use?()

  • A、WEP
  • B、Port filtering
  • C、WPA
  • D、Longer SSID broadcast intervals

参考答案

更多 “A company needs strong wireless security enabled for minimal cost. Which of the following security measures is the BEST to use?()A、WEPB、Port filteringC、WPAD、Longer SSID broadcast intervals” 相关考题
考题 Which of the following offers the HIGHEST wireless security?() A. WEPB. WPA2C. WPAD. HTTPS

考题 A company needs strong wireless security enabled for minimal cost. Which of the following security measures is the BEST to use?() A. WEPB. Port filteringC. WPAD. Longer SSID broadcast intervals

考题 A company wants to secure access to its internal wireless network. The company wants to use themost secure means to access the network. Which of the following is the BEST choice for wireless security in this situation?()A. WEP encryptionB. Channel rotationC. Disable SSIDD. WPA encryption

考题 Which of the following does not affect security on a wireless access point?() A.EncryptionB.DHCPC.PasswordD.SSID

考题 Which of the following protocols is the LEAST secure and should be avoided on a wireless network?() A.WEPB.PEAPC.WPAD.TKIP

考题 Refer to the exhibit. A junior network administrator was given the task of configuring port security on SwitchA to allow only PC_A to access the switched network through port fa0/1. If any other device is detected, the port is to drop frames from this device. The administrator configured the interface and tested it with successful pings from PC_A to RouterA, and then observes the output from these two show commands.Which two of these changes are necessary for SwitchA to meet the requirements? ()A.Port security needs to be globally enabled.B.Port security needs to be enabled on the interface.C.Port security needs to be configured to shut down the interface in the event of a violation.D.Port security needs to be configured to allow only one learned MAC address.E.Port security interface counters need to be cleared before using the show command.F.The port security configuration needs to be saved to NVRAM before it can become active.

考题 Which of the following should be used to restrict access to a wireless network?()A、Port forwardingB、Enable SSID broadcastC、Wireless encryptionD、Enable DMZ

考题 Which of the following commands on the wireless interface of a cisco 3845 integrated services router allows the ssid to broadcast?()A、router (config-ssid)# guest-modeB、router (config-ssid)# advertiseC、router (config-ssid)# enableD、router (config-ssid)# broadcast

考题 A company wants to secure access to its internal wireless network. The company wants to use themost secure means to access the network. Which of the following is the BEST choice for wireless security in this situation?()A、WEP encryptionB、Channel rotationC、Disable SSIDD、WPA encryption

考题 Which of the following is the BEST way to deny unauthorized computers access to a network? ()A、Disable DHCP.B、Use MAC filtering.C、Disable the SSID broadcast.D、Use a network firewall.

考题 Which of the following protocols is the LEAST secure and should be avoided on a wireless network?()A、WEPB、PEAPC、WPAD、TKIP

考题 An administrator is concerned about users utilizing the company's wireless signal with their personal laptops. Which of the following is the BEST method to use to prevent unauthorized devices from using the company's wireless network?()A、Secure VPNB、MAC filteringC、IP filteringD、Static IP addresses

考题 Which of the following security mitigation techniques is the MOST effective against zero-day attacks?()A、Update antivirus definitionsB、MAC filteringC、Effective security policiesD、User awareness training

考题 Which of the following should be configured on a wireless router to enhance security? (Select TWO).()A、Disable DHCPB、Change wireless channelC、Disable SSID broadcastingD、Change the default username and passwordE、Use a static IP address

考题 Which of the following offers the HIGHEST wireless security?()A、WEPB、WPA2C、WPAD、HTTPS

考题 For added security, a network administrator has decided to lock down the wireless network. Which of the following are ways to accomplish this? ()(Select TWO).A、Disable all 802.11 trafficB、Disable the SSID from broadcastingC、Disable WPAD、Enable Bluetooth only communicationE、Change the default admin passwordF、Disable WEP

考题 Which of the following does not affect security on a wireless access point?()A、EncryptionB、DHCPC、PasswordD、SSID

考题 Which of the following BEST describes how server virtualization can cut down IT costs? ()A、 Server virtualization increases server application performance allowing productivity to be increased.B、 Server virtualization simplifies server administration and reduces the IT department staffing needs.C、 Server virtualization implements higher security measures at the server OS level reducing the need for other security implementations.D、 Server virtualization is a more efficient use of hardware for multiple servers reducing the resource utilization.

考题 Which of the following are examples of physical security measures?()A、Policies and proceduresB、EncryptionC、Locked doorsD、Security personnelE、Backup tapes

考题 A technician installed a new wireless access point on an existing small office home office (SOHO) network with a selective security option enabled. All wireless computers connect to the new network except one computer that cannot connect to the wireless network. Which of the following is the cause?()A、The network uses MAC filteringB、The network uses WEPC、The network uses SSID broadcastD、The network uses WPA

考题 Which of the following wireless security techniques is the MOST secure?()A、Enable Wired Equivalent PrivacyB、Disable SSID broadcastC、Enable Wi-Fi Protected AccessD、Enable MAC filtering

考题 单选题A technician installed a new wireless access point on an existing small office home office (SOHO) network with a selective security option enabled. All wireless computers connect to the new network except one computer that cannot connect to the wireless network. Which of the following is the cause?()A The network uses MAC filteringB The network uses WEPC The network uses SSID broadcastD The network uses WPA

考题 单选题Which of the following BEST describes how server virtualization can cut down IT costs? ()A  Server virtualization increases server application performance allowing productivity to be increased.B  Server virtualization simplifies server administration and reduces the IT department staffing needs.C  Server virtualization implements higher security measures at the server OS level reducing the need for other security implementations.D  Server virtualization is a more efficient use of hardware for multiple servers reducing the resource utilization.

考题 多选题Refer to the exhibit. A junior network administrator was given the task of configuring port security on SwitchA to allow only PC_A to access the switched network through port fa0/1. If any other device is detected, the port is to drop frames from this device. The administrator configured the interface and tested it with successful pings from PC_A to RouterA, and then observes the output from these two show commands.Which two of these changes are necessary for SwitchA to meet the requirements? ()APort security needs to be globally enabled.BPort security needs to be enabled on the interface.CPort security needs to be configured to shut down the interface in the event of a violation.DPort security needs to be configured to allow only one learned MAC address.EPort security interface counters need to be cleared before using the show command.FThe port security configuration needs to be saved to NVRAM before it can become active.

考题 多选题Which of the following should be configured on a wireless router to enhance security? (Select TWO).()ADisable DHCPBChange wireless channelCDisable SSID broadcastingDChange the default username and passwordEUse a static IP address

考题 单选题A company needs strong wireless security enabled for minimal cost. Which of the following security measures is the BEST to use?()A WEPB Port filteringC WPAD Longer SSID broadcast intervals

考题 单选题Which of the following commands on the wireless interface of a Cisco 3845 Integrated Services Router allows the SSID to broadcast?()A router(config-ssid)# guest-modeB router(config-ssid)# advertiseC router(config-ssid)# enableD router(config-ssid)# broadcast