网友您好, 请在下方输入框内输入要搜索的题目:
题目内容
(请给出正确答案)
Which of the following should be changed to secure access to a WAPs configuration management interface?()
- A、SSID
- B、WPA2
- C、DHCP
- D、Password
参考答案
更多 “Which of the following should be changed to secure access to a WAPs configuration management interface?()A、SSIDB、WPA2C、DHCPD、Password” 相关考题
考题
A customer is deploying a new Junos Pulse Access Control Service and has completed the initial boot configuration as prompted using a serial connection. The customer now wants to complete the rest of the configuration using the admin GUI.Into which port on the Junos Pulse Access Control Service should the customer plug the network cable to enable access to the admin GUI?()A. the internal interfaceB. the external interfaceC. the management interfaceD. the console interface
考题
Which three steps are considered part of the initial configuration?()
A.SNMPB.hostnameC.root passwordD.user passwordE.management access interface
考题
Which of the following is used to deny or allow access to a wireless router network?()
A. SSIDB. SNMPC. IMAPD. MAC filtering
考题
An administrator wants to limit access of a wireless network without requiring authorized users toenter a password or network key.Which of the following methods would MOST likely be implemented on the wireless network?()A. Disable SSIDB. WPAC. MAC filteringD. RAS
考题
Physical and logical network diagrams are used for which of the following configuration management goals?()
A. Track DHCP distributionB. Compare MAC and IP addressesC. Document Internet access historyD. Identity network devices
考题
Which of the following should be changed to secure access to a WAPs configuration management interface?()
A.SSIDB.WPA2C.DHCPD.Password
考题
You wish to increase the security of all of the routers within your network. What can be done to secure the virtual terminal interfaces on a router?()
A. Administratively shut down the interface.B. Physically secure the interface.C. Create an access list and apply it to the virtual terminal interfaces with the access-group command.D. Configure a virtual terminal password and login process.E. Enter an access list and apply it to the virtual terminal interfaces using the access-class command.
考题
What can be done to secure the virtual terminal interfaces on a router?()
A. Administratively shut down the interface.B. Physically secure the interface.C. Create an access list and apply it to the virtual terminal interfaces with the access-group command.D. Configure a virtual terminal password and login process.E. Enter an access list and apply it to the virtual terminal interfaces using the access-class command.
考题
A network administrator needs to allow only one Telnet connection to a router. For anyone viewing the configuration and issuing the show run command, the password for Telnet access should be encrypted. Which set of commands will accomplish this task?()A.B.C.D.
考题
You are trying to deploy a configuration job to an ios access point using the wlse, but the job fails. Which of the following would cause this failure?()A、snmp communitiesB、telnet/ssh user/passwordC、wlccp credentialsD、http user/password
考题
For the following options, which feature is the foundation of Cisco Self-Defending Network technology?()A、secure network platformB、secure connectivityC、threat control and containmentD、policy management
考题
You are trying to deploy a configuration job to an IOS access point using the WLSE, but the jobfails. Which of the following would cause this failure?()A、SNMP communitiesB、Telnet/SSH user/passwordC、WLCCP credentialsD、HTTP user/password
考题
You wish to increase the security of all of the routers within your network. What can be done to secure the virtual terminal interfaces on a router?()A、Administratively shut down the interface.B、Physically secure the interface.C、Create an access list and apply it to the virtual terminal interfaces with the access-group command.D、Configure a virtual terminal password and login process.E、Enter an access list and apply it to the virtual terminal interfaces using the access-class command.
考题
On the WLSE, which of the following fault policies would be used to verify that access to thecommand-line interface of the access point is secure?()A、registration errorB、authentication failures thresholdC、HTTP disabledD、Telnet disabled
考题
An administrator wants to limit access of a wireless network without requiring authorized users to enter a password or network key. Which of the following methods would MOST likely be implemented on the wireless network?()A、Disable SSIDB、WPAC、MAC filteringD、RAS
考题
A new department is formed and a new section of the building is being built out for them. All 50 new employees will need access to the wireless network. Which of the following should be completed to allow these new employees access to the wireless network?()A、Frequency settings should be changedB、Additional WAPs should be installedC、Channels should be changedD、VLANs should be added
考题
A customer is deploying a new Junos Pulse Access Control Service and has completed the initial boot configuration as prompted using a serial connection. The customer now wants to complete the rest of the configuration using the admin GUI.Into which port on the Junos Pulse Access Control Service should the customer plug the network cable to enable access to the admin GUI?()A、the internal interfaceB、the external interfaceC、the management interfaceD、the console interface
考题
Which two statements about the Cisco AutoSecure feature are true?()A、All passwords entered during the AutoSecure configuration must be a minimum of 8 characters in length.B、Cisco123 would be a valid password for both the enable password and the enable secret commands.C、The auto secure command can be used to secure the router login as well as the NTP and SSH protocols.D、For an interactive full session of AutoSecure, the auto secure login command should be used.E、If the SSH server was configured, the 1024 bit RSA keys are generated after the auto secure commandis enabled.
考题
What can be done to secure the virtual terminal interfaces on a router? ()A、Administratively shut down the interface.B、Physically secure the interface.C、Create an access list and apply it to the virtual terminal interfaces with the access-group command.D、Configure a virtual terminal password and login process.E、Enter an access list and apply it to the virtual terminal interfaces using the access-class command.
考题
Which of the following is the MOST secure method to authenticate users?()A、User ID, a strong password, and a fingerprint scannerB、User ID, a strong password, and a token based deviceC、User ID and two levels of strong password requirementsD、User ID, a strong password, and a smart card
考题
Physical and logical network diagrams are used for which of the following configuration management goals?()A、Track DHCP distributionB、Compare MAC and IP addressesC、Document Internet access historyD、Identity network devices
考题
Which of the following is used to deny or allow access to a wireless router network?()A、SSIDB、SNMPC、IMAPD、MAC filtering
考题
Which of the following is a secure method of remote access via command line?()A、RCPB、TelnetC、RSHD、SSH
考题
When installing a wireless access point, which of the following should the technician perform FIRST?()A、Enable MAC filtering.B、Download and install the latest firmware.C、Disable DHCP.D、Change the default password.
考题
Company.com has encountered a problem on the HMC, which requires access to the root shell on the HMC. Which of the following is necessary to access the root userid on the HMC?()A、Enable remote commands on the HMC Configuration menu,then use ssh to login to theHMC,enter su - rootB、Login to the HMC as hscpe and run pesh,using a temporary password from IBM Support,afterward, enter su - rootC、Login to the HMC as hscroot,then run pesh,using a temporary password from IBM Support, afterward,enter su - rootD、Enable remote commands on the HMC Configuration menu,then telnet in as hscroot,entersu - root
考题
Which three steps are considered part of the initial configuration?()A、SNMPB、hostnameC、root passwordD、user passwordE、management access interface
考题
单选题Which of the following should be changed to secure access to a WAPs configuration management interface?()A
SSIDB
WPA2C
DHCPD
Password
热门标签
最新试卷