网友您好, 请在下方输入框内输入要搜索的题目:
题目内容
(请给出正确答案)
单选题
Which of the following protocols is the LEAST secure and should be avoided on a wireless network?()
A
WEP
B
PEAP
C
WPA
D
TKIP
参考答案
参考解析
解析:
暂无解析
更多 “单选题Which of the following protocols is the LEAST secure and should be avoided on a wireless network?()A WEPB PEAPC WPAD TKIP” 相关考题
考题
Which of the following standards or encryption types is the MOST secure for wireless networking?()
A.WEPB.AESC.TKIPD.DES
考题
A company needs strong wireless security enabled for minimal cost. Which of the following security measures is the BEST to use?()
A. WEPB. Port filteringC. WPAD. Longer SSID broadcast intervals
考题
Which of the following should be used to restrict access to a wireless network?()
A. Port forwardingB. Enable SSID broadcastC. Wireless encryptionD. Enable DMZ
考题
A company wants to secure access to its internal wireless network. The company wants to use themost secure means to access the network. Which of the following is the BEST choice for wireless security in this situation?()A. WEP encryptionB. Channel rotationC. Disable SSIDD. WPA encryption
考题
An administrator is implementing a wireless network. Which of the following encryption technologies is the MOST secure method and will authenticate devices to the network?()
A.SSHB.WEPC.VPND.WPA
考题
Which of the following protocols is the LEAST secure and should be avoided on a wireless network?()
A.WEPB.PEAPC.WPAD.TKIP
考题
Which of the following protocols should be used to monitor network performance?()
A.SNTPB.SMTPC.HTTPD.SNMP
考题
A network technician is installing a small wireless network. A requirement is that individual users must authenticate using usernames and passwords.Which of the following technologies would support users authenticating with encrypted usernames and passwords?()A.WPA TLSB.WPA PEAPC.64-bit WEPD.128-bit WEP
考题
Which of the following should be used to restrict access to a wireless network?()A、Port forwardingB、Enable SSID broadcastC、Wireless encryptionD、Enable DMZ
考题
A company wants to secure access to its internal wireless network. The company wants to use themost secure means to access the network. Which of the following is the BEST choice for wireless security in this situation?()A、WEP encryptionB、Channel rotationC、Disable SSIDD、WPA encryption
考题
Which of the following standards or encryption types is the MOST secure for wireless networking?()A、WEPB、AESC、TKIPD、DES
考题
Which of the following protocols is the LEAST secure and should be avoided on a wireless network?()A、WEPB、PEAPC、WPAD、TKIP
考题
For added security, a network administrator has decided to lock down the wireless network. Which of the following are ways to accomplish this? ()(Select TWO).A、Disable all 802.11 trafficB、Disable the SSID from broadcastingC、Disable WPAD、Enable Bluetooth only communicationE、Change the default admin passwordF、Disable WEP
考题
A network technician is installing a small wireless network. A requirement is that individual users must authenticate using usernames and passwords. Which of the following technologies would support users authenticating with encrypted usernames and passwords?()A、WPA TLSB、WPA PEAPC、64-bit WEPD、128-bit WEP
考题
A company needs strong wireless security enabled for minimal cost. Which of the following security measures is the BEST to use?()A、WEPB、Port filteringC、WPAD、Longer SSID broadcast intervals
考题
Which of the following protocols should be used to monitor network performance?()A、SNTPB、SMTPC、HTTPD、SNMP
考题
An administrator is implementing a wireless network. Which of the following encryption technologies is the MOST secure method and will authenticate devices to the network?()A、SSHB、WEPC、VPND、WPA
考题
Which of the following commands should be used to report statistics on network protocols used by the system?()A、 lsattrB、 pstatC、 netstatD、 ifconfig
考题
单选题Which of the following protocols should be used to monitor network performance?()A
SNTPB
SMTPC
HTTPD
SNMP
考题
单选题Which of the following protocols is the LEAST secure and should be avoided on a wireless network?()A
WEPB
PEAPC
WPAD
TKIP
考题
单选题Which of the following should be used to restrict access to a wireless network?()A
Port forwardingB
Enable SSID broadcastC
Wireless encryptionD
Enable DMZ
考题
单选题A new department is formed and a new section of the building is being built out for them. All 50 new employees will need access to the wireless network. Which of the following should be completed to allow these new employees access to the wireless network?()A
Frequency settings should be changedB
Additional WAPs should be installedC
Channels should be changedD
VLANs should be added
考题
单选题An administrator is implementing a wireless network. Which of the following encryption technologies is the MOST secure method and will authenticate devices to the network?()A
SSHB
WEPC
VPND
WPA
考题
单选题A company wants to secure access to its internal wireless network. The company wants to use themost secure means to access the network. Which of the following is the BEST choice for wireless security in this situation?()A
WEP encryptionB
Channel rotationC
Disable SSIDD
WPA encryption
考题
单选题A network technician is installing a small wireless network. A requirement is that individual users must authenticate using usernames and passwords. Which of the following technologies would support users authenticating with encrypted usernames and passwords?()A
WPA TLSB
WPA PEAPC
64-bit WEPD
128-bit WEP
考题
单选题Which of the following commands should be used to report statistics on network protocols used by the system?()A
lsattrB
pstatC
netstatD
ifconfig
热门标签
最新试卷