网友您好, 请在下方输入框内输入要搜索的题目:
题目内容
(请给出正确答案)
单选题
Which of the following should be changed to secure access to a WAPs configuration management interface?()
A
SSID
B
WPA2
C
DHCP
D
Password
参考答案
参考解析
解析:
暂无解析
更多 “单选题Which of the following should be changed to secure access to a WAPs configuration management interface?()A SSIDB WPA2C DHCPD Password” 相关考题
考题
A customer is deploying a new Junos Pulse Access Control Service and has completed the initial boot configuration as prompted using a serial connection. The customer now wants to complete the rest of the configuration using the admin GUI.Into which port on the Junos Pulse Access Control Service should the customer plug the network cable to enable access to the admin GUI?()A. the internal interfaceB. the external interfaceC. the management interfaceD. the console interface
考题
Which three steps are considered part of the initial configuration?()
A.SNMPB.hostnameC.root passwordD.user passwordE.management access interface
考题
Which of the following is used to deny or allow access to a wireless router network?()
A. SSIDB. SNMPC. IMAPD. MAC filtering
考题
An administrator wants to limit access of a wireless network without requiring authorized users toenter a password or network key.Which of the following methods would MOST likely be implemented on the wireless network?()A. Disable SSIDB. WPAC. MAC filteringD. RAS
考题
Physical and logical network diagrams are used for which of the following configuration management goals?()
A. Track DHCP distributionB. Compare MAC and IP addressesC. Document Internet access historyD. Identity network devices
考题
Which of the following should be changed to secure access to a WAPs configuration management interface?()
A.SSIDB.WPA2C.DHCPD.Password
考题
What can be done to secure the virtual terminal interfaces on a router?()
A. Administratively shut down the interface.B. Physically secure the interface.C. Create an access list and apply it to the virtual terminal interfaces with the access-group command.D. Configure a virtual terminal password and login process.E. Enter an access list and apply it to the virtual terminal interfaces using the access-class command.
考题
You are trying to deploy a configuration job to an ios access point using the wlse, but the job fails. Which of the following would cause this failure?()A、snmp communitiesB、telnet/ssh user/passwordC、wlccp credentialsD、http user/password
考题
You are trying to deploy a configuration job to an IOS access point using the WLSE, but the jobfails. Which of the following would cause this failure?()A、SNMP communitiesB、Telnet/SSH user/passwordC、WLCCP credentialsD、HTTP user/password
考题
On the WLSE, which of the following fault policies would be used to verify that access to thecommand-line interface of the access point is secure?()A、registration errorB、authentication failures thresholdC、HTTP disabledD、Telnet disabled
考题
An administrator wants to limit access of a wireless network without requiring authorized users to enter a password or network key. Which of the following methods would MOST likely be implemented on the wireless network?()A、Disable SSIDB、WPAC、MAC filteringD、RAS
考题
A new department is formed and a new section of the building is being built out for them. All 50 new employees will need access to the wireless network. Which of the following should be completed to allow these new employees access to the wireless network?()A、Frequency settings should be changedB、Additional WAPs should be installedC、Channels should be changedD、VLANs should be added
考题
A customer is deploying a new Junos Pulse Access Control Service and has completed the initial boot configuration as prompted using a serial connection. The customer now wants to complete the rest of the configuration using the admin GUI.Into which port on the Junos Pulse Access Control Service should the customer plug the network cable to enable access to the admin GUI?()A、the internal interfaceB、the external interfaceC、the management interfaceD、the console interface
考题
What can be done to secure the virtual terminal interfaces on a router? ()A、Administratively shut down the interface.B、Physically secure the interface.C、Create an access list and apply it to the virtual terminal interfaces with the access-group command.D、Configure a virtual terminal password and login process.E、Enter an access list and apply it to the virtual terminal interfaces using the access-class command.
考题
Physical and logical network diagrams are used for which of the following configuration management goals?()A、Track DHCP distributionB、Compare MAC and IP addressesC、Document Internet access historyD、Identity network devices
考题
Which of the following is used to deny or allow access to a wireless router network?()A、SSIDB、SNMPC、IMAPD、MAC filtering
考题
Which of the following should be changed to secure access to a WAPs configuration management interface?()A、SSIDB、WPA2C、DHCPD、Password
考题
Which three steps are considered part of the initial configuration?()A、SNMPB、hostnameC、root passwordD、user passwordE、management access interface
考题
单选题When installing a wireless access point, which of the following should the technician perform FIRST?()A
Enable MAC filtering.B
Download and install the latest firmware.C
Disable DHCP.D
Change the default password.
考题
单选题You are trying to deploy a configuration job to an IOS access point using the WLSE, but the jobfails. Which of the following would cause this failure?()A
SNMP communitiesB
Telnet/SSH user/passwordC
WLCCP credentialsD
HTTP user/password
考题
单选题Which of the following should be changed to secure access to a WAPs configuration management interface?()A
SSIDB
WPA2C
DHCPD
Password
考题
单选题Which of the following is a secure method of remote access via command line?()A
RCPB
TelnetC
RSHD
SSH
考题
单选题On the wlse, which of the following fault policies would be used to verify that access to the command-line interface of the access point is secure?()A
registration errorB
authentication failures thresholdC
http disabledD
telnet disabled
考题
单选题A new department is formed and a new section of the building is being built out for them. All 50 new employees will need access to the wireless network. Which of the following should be completed to allow these new employees access to the wireless network?()A
Frequency settings should be changedB
Additional WAPs should be installedC
Channels should be changedD
VLANs should be added
考题
单选题Which one of the following items may be added to a password stored in MD5 to make it more secure?()A
CiphertextB
SaltC
CryptotextD
Rainbow table
考题
单选题A customer is deploying a new Junos Pulse Access Control Service and has completed the initial boot configuration as prompted using a serial connection. The customer now wants to complete the rest of the configuration using the admin GUI.Into which port on the Junos Pulse Access Control Service should the customer plug the network cable to enable access to the admin GUI?()A
the internal interfaceB
the external interfaceC
the management interfaceD
the console interface
考题
单选题Physical and logical network diagrams are used for which of the following configuration management goals?()A
Track DHCP distributionB
Compare MAC and IP addressesC
Document Internet access historyD
Identity network devices
考题
单选题You are trying to deploy a configuration job to an ios access point using the wlse, but the job fails. Which of the following would cause this failure?()A
snmp communitiesB
telnet/ssh user/passwordC
wlccp credentialsD
http user/password
热门标签
最新试卷