网友您好, 请在下方输入框内输入要搜索的题目:

题目内容 (请给出正确答案)
多选题
Which two practices help secure the configuration utilities on wireless access points from unauthorized access? (Choose two.)()
A

assigning a private IP address to the AP

B

changing the default SSID value

C

configuring a new administrator password

D

changing the mixed mode setting to single mode

E

configuring traffic filtering


参考答案

参考解析
解析: 暂无解析
更多 “多选题Which two practices help secure the configuration utilities on wireless access points from unauthorized access? (Choose two.)()Aassigning a private IP address to the APBchanging the default SSID valueCconfiguring a new administrator passwordDchanging the mixed mode setting to single modeEconfiguring traffic filtering” 相关考题
考题 49Since our chief business with them is to enable them to share in a common life we cannot help considering whether or no we are forming the powers which will secure this ability.

考题 A customer wants to create a custom Junos Pulse configuration. Which two are required?() A. Connection setB. Configuration setC. Custom installerD. Component set

考题 Which of the following describes a secure connection over the Internet between two sites?() A. FTPB. VLANC. VPND. HTTP

考题 The enable secret command is used to secure access to which CLI mode?() A.user EXEC modeB.global configuration modeC.privileged EXEC modeD.auxiliary setup mode

考题 What are two characteristics of the SDM Security Audit wizard?()A、displays a screen with Fix-it check boxes to let you choose which potential security-related configuration changes to implementB、has two modes of operationinteractive and non-interactiveC、automatically enables Cisco IOS firewall and Cisco IOS IPS to secure the routerD、uses interactive dialogs and prompts to implement role-based CLIE、requires users to first identify which router interfaces connect to the inside network and which connectto the outside network

考题 Which two practices help secure the configuration utilities on wireless access points from unauthorized access? (Choose two.)()A、assigning a private IP address to the APB、changing the default SSID valueC、configuring a new administrator passwordD、changing the mixed mode setting to single modeE、configuring traffic filtering

考题 Which two functions does Cisco Configuration Assistant provide?()A、wireless connectivityB、call routing configurationC、device discoveryD、call forwardingE、command line configuration

考题 Which of the following is the correct configuration for a RAID 5 array?()A、A two disk set with one data stripB、A three disk set with two data strips and a parity stripC、A two disk set with two data stripsD、A four disk set with two sets of data strips

考题 Which two configuration elements are required for a policy-based VPN?()A、IKE gatewayB、secure tunnel interfaceC、security policy to permit the IKE trafficD、security policy referencing the IPsec VPN tunnel

考题 What are two benefits of the Cisco 1800 Series Integrated Services Routers?()A、 fixed configuration for secure broadband, metro Ethernet, and wireless connectivityB、 configuration for security policy monitoringC、 dynamic management through self-healing processesD、 connectivity options and investment protection through support for existing Cisco 1700 SeriesWICs

考题 Which two statements are true about the configuration of voice VLANs?()A、Static secure MAC addresses can be configured in conjunction with voice VLANs.B、PortFast is automatically enabled when voice VLANs are configured.C、PortFast must be manually configured when voice VLANs are configured.D、Voice VLANs are typically configured on uplink ports.E、Voice VLANs are typically configured on access ports.

考题 Which two statements about the Cisco AutoSecure feature are true?()A、All passwords entered during the AutoSecure configuration must be a minimum of 8 characters in length.B、Cisco123 would be a valid password for both the enable password and the enable secret commands.C、The auto secure command can be used to secure the router login as well as the NTP and SSH protocols.D、For an interactive full session of AutoSecure, the auto secure login command should be used.E、If the SSH server was configured, the 1024 bit RSA keys are generated after the auto secure commandis enabled.

考题 Which firewall best practices can help mitigate worm and other automated attacks?()A、Segment security zonesB、Restrict access to firewallsC、Use logs and alertsD、Set connection limits

考题 Which of the following should be changed to secure access to a WAPs configuration management interface?()A、SSIDB、WPA2C、DHCPD、Password

考题 How would an end user add both a Junos Pulse Access Control Service URL and a Junos Pulse Secure Access Service URL to the same Junos Pulse client?()A、By adding two separate connections in the connections dialog boxB、By adding two separate intranet Controllers under the configuration hierarchyC、By adding one intranet Controller and one SA under the configuration hierarchyD、By adding two URLs under a connection in the connections dialog box

考题 Which two configuration elements are required for a route-based VPN?()A、secure tunnel interfaceB、security policy to permit the IKE trafficC、a route for the tunneled transit trafficD、tunnel policy for transit traffic referencing the IPsec VPN

考题 多选题Which two secure remote access methods are available on the WX platforms?() (Choose two.)ASSLBSSHCTelnetDHTTP

考题 多选题Which two functions does Cisco Configuration Assistant provide?()Awireless connectivityBcall routing configurationCdevice discoveryDcall forwardingEcommand line configuration

考题 单选题The enable secret command is used to secure access to which CLI mode?()A user EXEC modeB global configuration modeC privileged EXEC modeD auxiliary setup mode

考题 多选题Which two statements about the Cisco AutoSecure feature are true?()AAll passwords entered during the AutoSecure configuration must be a minimum of 8 characters in length.BCisco123 would be a valid password for both the enable password and the enable secret commands.CThe auto secure command can be used to secure the router login as well as the NTP and SSH protocols.DFor an interactive full session of AutoSecure, the auto secure login command should be used.EIf the SSH server was configured, the 1024 bit RSA keys are generated after the auto secure commandis enabled.

考题 多选题Which two statements are true when using the configure exclusive CLI command?()AMultiple users can enter configuration mode and have their own private configuration.BWhen a user commits, only the user's changes are committed.CA message indicates which other users are in configuration mode and what portion of the configuration they are editing.DOnly a single user can edit the configuration.

考题 单选题How would an end user add both a Junos Pulse Access Control Service URL and a Junos Pulse Secure Access Service URL to the same Junos Pulse client?()A By adding two separate connections in the connections dialog boxB By adding two separate intranet Controllers under the configuration hierarchyC By adding one intranet Controller and one SA under the configuration hierarchyD By adding two URLs under a connection in the connections dialog box

考题 单选题Which of the following describes a secure connection over the Internet between two sites?()A FTPB VLANC VPND HTTP

考题 单选题Quality planning tools are often used to help plan effective quality management activities . ()is one of such tools, which involves company actual or planned project practices to those or other projects to generate ideas for improvement and to provide a basis by which to measure performance.A BenchmarkingB Quality metricC Quality checklistD Brainstornung

考题 单选题Quality planning tools are often used to help plan effective quality management activities.( ) is one of such tools,which involves company actual or planned project practices to those or other projects to generate ideas for improvementand to provide a basis by which to measure performance.A BenchmarkingB Quality metricC Quality checklistD Brainstorming

考题 多选题Which two actions protect a resource file from direct HTTP access within a web application?()APlacing it in the /secure directoryBPlacing it in the /WEB-INF directoryCPlacing it in the /META-INF/secure directoryDCreating a  element within the deployment descriptor

考题 多选题What are two characteristics of the SDM Security Audit wizard?()Adisplays a screen with Fix-it check boxes to let you choose which potential security-related configuration changes to implementBhas two modes of operationinteractive and non-interactiveCautomatically enables Cisco IOS firewall and Cisco IOS IPS to secure the routerDuses interactive dialogs and prompts to implement role-based CLIErequires users to first identify which router interfaces connect to the inside network and which connectto the outside network