网友您好, 请在下方输入框内输入要搜索的题目:
题目内容
(请给出正确答案)
An administrator wants to limit access of a wireless network without requiring authorized users to enter a password or network key. Which of the following methods would MOST likely be implemented on the wireless network?()
- A、Disable SSID
- B、WPA
- C、MAC filtering
- D、RAS
参考答案
更多 “ An administrator wants to limit access of a wireless network without requiring authorized users to enter a password or network key. Which of the following methods would MOST likely be implemented on the wireless network?()A、Disable SSIDB、WPAC、MAC filteringD、RAS” 相关考题
考题
A home user wants to setup a wireless network. Which of the following would be the MOST important consideration?()
A. Operating system type of the connected PCsB. Location of the wireless routerC. Number of PCs that will access the networkD. Number of available Ethernet ports on the router
考题
Which of the following is used to deny or allow access to a wireless router network?()
A. SSIDB. SNMPC. IMAPD. MAC filtering
考题
A company wants to secure access to its internal wireless network. The company wants to use themost secure means to access the network. Which of the following is the BEST choice for wireless security in this situation?()A. WEP encryptionB. Channel rotationC. Disable SSIDD. WPA encryption
考题
An administrator wants to limit access of a wireless network without requiring authorized users toenter a password or network key.Which of the following methods would MOST likely be implemented on the wireless network?()A. Disable SSIDB. WPAC. MAC filteringD. RAS
考题
An administrator is implementing a wireless network. Which of the following encryption technologies is the MOST secure method and will authenticate devices to the network?()
A.SSHB.WEPC.VPND.WPA
考题
Users are unable to stay connected to the company‘s wireless network. Several times throughoutthe day the users‘ signals are dropped and they are forced to reconnect to the network.A technician determines the network cabling that supplies the WAP has been run inside with severalpower lines.Which of the following is the MOST likely cause of the network issue?()A.AshortB.Open pairsC.ESDD.EMI
考题
A company wants to secure access to its internal wireless network. The company wants to use themost secure means to access the network. Which of the following is the BEST choice for wireless security in this situation?()A、WEP encryptionB、Channel rotationC、Disable SSIDD、WPA encryption
考题
In which of the following scenarios would MAC filtering be MOST effective as a part of wireless security? ()A、A public place where guests are free to access the wireless network.B、A small office where a defined number of specific wireless devices are used.C、A meeting room where various company users will access the wireless network during meetings. D、An office where some users are unable to use WPA encryption due to older wireless cards so they use MAC filtering.
考题
A company has implemented a wireless network for its employees. Since implementing the newnetwork, individuals have been receiving duplicate IP addresses causing network issues. Which of the following would resolve this issue? ()A、 Add another wireless access point.B、 Add another DHCP server.C、 Disable the wireless DHCP server.D、 Change the default gateway of the wireless router.
考题
A home user wants to setup a wireless network. Which of the following would be the MOST important consideration?()A、Operating system type of the connected PCsB、Location of the wireless routerC、Number of PCs that will access the networkD、Number of available Ethernet ports on the router
考题
Users are unable to stay connected to the company's wireless network. Several times throughout the day the users' signals are dropped and they are forced to reconnect to the network. A technician determines the network cabling that supplies the WAP has been run inside with several power lines. Which of the following is the MOST likely cause of the network issue?()A、AshortB、Open pairsC、ESDD、EMI
考题
Which of the following would need to be implemented on a wireless router to allow network accessbased on a passphrase that the administrator would supply?()A、WPA-PSK encryptionB、SSID broadcastC、Port forwardingD、MAC filtering
考题
A network consultant is asked to set up a wireless network in a home. The home user wants the wireless network to be available in every comer of the house. Which of the following additional information will the technician need to determine the equipment for the installation? ()(Select TWO)A、The length of the houseB、How many rooms are in the houseC、How many users will be using the wireless networkD、The building material of the houseE、The cost of the house
考题
A company has implemented a wireless network for its employees. Since implementing the new network, individuals have been receiving duplicate IP addresses causing network issues. Which of the following would resolve this issue?()A、Add another wireless access point.B、Add another DHCP server.C、Disable the wireless DHCP server.D、Change the default gateway of the wireless router
考题
Which of the following is used to deny or allow access to a wireless router network?()A、SSIDB、SNMPC、IMAPD、MAC filtering
考题
An administrator is implementing a wireless network. Which of the following encryption technologies is the MOST secure method and will authenticate devices to the network?()A、SSHB、WEPC、VPND、WPA
考题
A technician installed a new wireless access point on an existing small office home office (SOHO) network with a selective security option enabled. All wireless computers connect to the new network except one computer that cannot connect to the wireless network. Which of the following is the cause?()A、The network uses MAC filteringB、The network uses WEPC、The network uses SSID broadcastD、The network uses WPA
考题
An administrator wants to proactively collect information on attackers and their attempted methods of gaining access to the internal network. Which of the following would allow the administrator to do this?()A、NIPSB、HoneypotC、DMZD、NIDS
考题
单选题A company has implemented a wireless network for its employees. Since implementing the newnetwork, individuals have been receiving duplicate IP addresses causing network issues. Which of the following would resolve this issue? ()A
Add another wireless access point.B
Add another DHCP server.C
Disable the wireless DHCP server.D
Change the default gateway of the wireless router.
考题
单选题An administrator wants to limit access of a wireless network without requiring authorized users to enter a password or network key. Which of the following methods would MOST likely be implemented on the wireless network?()A
Disable SSIDB
WPAC
MAC filteringD
RAS
考题
单选题A technician installed a new wireless access point on an existing small office home office (SOHO) network with a selective security option enabled. All wireless computers connect to the new network except one computer that cannot connect to the wireless network. Which of the following is the cause?()A
The network uses MAC filteringB
The network uses WEPC
The network uses SSID broadcastD
The network uses WPA
考题
单选题Which of the following would need to be implemented on a wireless router to allow network accessbased on a passphrase that the administrator would supply?()A
WPA-PSK encryptionB
SSID broadcastC
Port forwardingD
MAC filtering
考题
单选题In which of the following scenarios would MAC filtering be MOST effective as a part of wireless security? ()A
A public place where guests are free to access the wireless network.B
A small office where a defined number of specific wireless devices are used.C
A meeting room where various company users will access the wireless network during meetings. D
An office where some users are unable to use WPA encryption due to older wireless cards so they use MAC filtering.
考题
单选题An administrator wants to limit access of a wireless network without requiring authorized users to enter a password or network key. Which of the following methods would MOST likely be implemented on the wireless network?()A
Disable SSIDB
WPAC
MAC filteringD
RAS
考题
单选题A company wants to secure access to its internal wireless network. The company wants to use themost secure means to access the network. Which of the following is the BEST choice for wireless security in this situation?()A
WEP encryptionB
Channel rotationC
Disable SSIDD
WPA encryption
考题
多选题A network consultant is asked to set up a wireless network in a home. The home user wants the wireless network to be available in every comer of the house. Which of the following additional information will the technician need to determine the equipment for the installation? ()(Select TWO)AThe length of the houseBHow many rooms are in the houseCHow many users will be using the wireless networkDThe building material of the houseEThe cost of the house
考题
单选题A company has implemented a wireless network for its employees. Since implementing the new network, individuals have been receiving duplicate IP addresses causing network issues. Which of the following would resolve this issue?()A
Add another wireless access point.B
Add another DHCP server.C
Disable the wireless DHCP server.D
Change the default gateway of the wireless router
热门标签
最新试卷