网友您好, 请在下方输入框内输入要搜索的题目:
题目内容
(请给出正确答案)
单选题
An administrator is concerned about users utilizing the company's wireless signal with their personal laptops. Which of the following is the BEST method to use to prevent unauthorized devices from using the company's wireless network?()
A
Secure VPN
B
MAC filtering
C
IP filtering
D
Static IP addresses
参考答案
参考解析
解析:
暂无解析
更多 “单选题An administrator is concerned about users utilizing the company's wireless signal with their personal laptops. Which of the following is the BEST method to use to prevent unauthorized devices from using the company's wireless network?()A Secure VPNB MAC filteringC IP filteringD Static IP addresses” 相关考题
考题
A company wants to secure access to its internal wireless network. The company wants to use themost secure means to access the network. Which of the following is the BEST choice for wireless security in this situation?()A. WEP encryptionB. Channel rotationC. Disable SSIDD. WPA encryption
考题
An administrator is implementing a wireless network. Which of the following encryption technologies is the MOST secure method and will authenticate devices to the network?()
A.SSHB.WEPC.VPND.WPA
考题
Users are unable to stay connected to the company‘s wireless network. Several times throughoutthe day the users‘ signals are dropped and they are forced to reconnect to the network.A technician determines the network cabling that supplies the WAP has been run inside with severalpower lines.Which of the following is the MOST likely cause of the network issue?()A.AshortB.Open pairsC.ESDD.EMI
考题
You have a computer that runs Windows Vista. You create a virtual private network (VPN) connection between the computer and your company’s network.You notice that while the computer is connected through the VPN connection, users on the company network can access shared folders on the computer.You need to prevent network users from accessing your shared folders when you are connected to the company’s network by using the VPN connection.What should you do?()A.AB.BC.CD.D
考题
A company wants to secure access to its internal wireless network. The company wants to use themost secure means to access the network. Which of the following is the BEST choice for wireless security in this situation?()A、WEP encryptionB、Channel rotationC、Disable SSIDD、WPA encryption
考题
In which of the following scenarios would MAC filtering be MOST effective as a part of wireless security? ()A、A public place where guests are free to access the wireless network.B、A small office where a defined number of specific wireless devices are used.C、A meeting room where various company users will access the wireless network during meetings. D、An office where some users are unable to use WPA encryption due to older wireless cards so they use MAC filtering.
考题
An administrator is concerned about users utilizing the company's wireless signal with their personal laptops. Which of the following is the BEST method to use to prevent unauthorized devices from using the company's wireless network?()A、Secure VPNB、MAC filteringC、IP filteringD、Static IP addresses
考题
A company’s wireless network is called FOO and it is not publicly visible. In a wirelessconfiguration wizard, in which of the following locations should the technician put FOO?()A、SSIDB、WPA PassphraseC、WEP KeyD、Network Path
考题
Users are unable to stay connected to the company's wireless network. Several times throughout the day the users' signals are dropped and they are forced to reconnect to the network. A technician determines the network cabling that supplies the WAP has been run inside with several power lines. Which of the following is the MOST likely cause of the network issue?()A、AshortB、Open pairsC、ESDD、EMI
考题
A user states that the wireless router keeps rebooting while the power to the other equipment stays on. Which of the following should the technician perform to prevent users from rebooting the router?()A、Change the default administrator passwordB、Change the IP range of the wireless networkC、Hide the SSIDD、Disable WEP
考题
A company needs strong wireless security enabled for minimal cost. Which of the following security measures is the BEST to use?()A、WEPB、Port filteringC、WPAD、Longer SSID broadcast intervals
考题
An administrator is implementing a wireless network. Which of the following encryption technologies is the MOST secure method and will authenticate devices to the network?()A、SSHB、WEPC、VPND、WPA
考题
You share your portable computer with a co-worker. You use separate user accounts to log on. A wireless network is available to you and your co-worker. You need to prevent your co-worker from modifying your wireless network profile. What should you do?()A、Disable the Connect even if the network is not broadcasting option.B、In the Network and Sharing Center window, click the Diagnose and repair option.C、Set the default wireless profile type to the Use all-users only profile (recommended) option. Recreate the wireless network.D、Set the default wireless profile type to the Use all-users and per-user profiles option. Recreate the wireless network by using the Save this network for me only option.
考题
You need to design a Security strategy for the wireless network at all resort locations.What should you do?()A、Connect the wireless access points to a dedicated subnet. Allow the subnet direct access to the Internet,but not to the company network.Require company users to establish a VPN to access company resourcesB、Install Internet Authentication Service (IAS) on a domain controller.Configure the wireless access points to require IEEE 802.1x authenticationC、Establish IPSec policies on all company servers to request encryption from all computers that connect from the wireless IP networksD、Configure all wireless access points to require the Wired Equivalent Privacy (WEP) protocol for all connections. Use a Group Policy object (GPO) to distribute the WEP keys to all computers in the domain
考题
All client computers on your company network run Windows 7 and are members of an Active Directory Domain Services domain. Employees using portable computers report that they get connected to a coffee shop wireless network from the company conference room. You need to ensure that the employees connect to the company wireless network by default from anywhere within the company premises. What should you do?()A、Configure the Network authentication (Shared mode) setting.B、Apply a Wireless Network Policy to set the network type to WPA-PSK.C、Apply a Wireless Network Policy to automatically connect to the company wireless network.D、Apply a Wireless Network Policy to set the company wireless network as the preferred network.
考题
单选题A company’s wireless network is called FOO and it is not publicly visible. In a wirelessconfiguration wizard, in which of the following locations should the technician put FOO?()A
SSIDB
WPA PassphraseC
WEP KeyD
Network Path
考题
单选题An administrator is concerned about users utilizing the company's wireless signal with their personal laptops. Which of the following is the BEST method to use to prevent unauthorized devices from using the company's wireless network?()A
Secure VPNB
MAC filteringC
IP filteringD
Static IP addresses
考题
单选题Which statement best describes the Cisco 2700 Location Appliance collection of location information for wireless devices?()A
all Wi-Fi devices on the WLAN send directly received signal strength indication (RSSI) information to the Cisco Wireless Location Appliance through SNMPB
an AP collects RSSI information which is forwarded to wireless controllers through LWAPP. Wireless controllers forward aggregated RSSI to the location appliance through SNMPC
the APs collect received signal strength indication (RSSI) information from all Wi-Fi devices and forward the information to the Cisco Wireless Location Appliance through the LWAPPD
the Cisco WLAN controllers bypass the received signal strength indication (RSSI) information from all Wi-Fi devices to the Cisco Wireless Location Appliance through the LWAPP
考题
单选题A user states that the wireless router keeps rebooting while the power to the other equipment stays on. Which of the following should the technician perform to prevent users from rebooting the router?()A
Change the default administrator passwordB
Change the IP range of the wireless networkC
Hide the SSIDD
Disable WEP
考题
单选题All client computers on your company network run Windows 7 and are members of an Active Directory Domain Services domain. Employees using portable computers report that they get connected to a coffee shop wireless network from the company conference room. You need to ensure that the employees connect to the company wireless network by default from anywhere within the company premises. What should you do?()A
Configure the Network authentication (Shared mode) setting.B
Apply a Wireless Network Policy to set the network type to WPA-PSK.C
Apply a Wireless Network Policy to automatically connect to the company wireless network.D
Apply a Wireless Network Policy to set the company wireless network as the preferred network.
考题
单选题In which of the following scenarios would MAC filtering be MOST effective as a part of wireless security? ()A
A public place where guests are free to access the wireless network.B
A small office where a defined number of specific wireless devices are used.C
A meeting room where various company users will access the wireless network during meetings. D
An office where some users are unable to use WPA encryption due to older wireless cards so they use MAC filtering.
考题
单选题An administrator wants to limit access of a wireless network without requiring authorized users to enter a password or network key. Which of the following methods would MOST likely be implemented on the wireless network?()A
Disable SSIDB
WPAC
MAC filteringD
RAS
考题
单选题You need to design a Security strategy for the wireless network at all resort locations.What should you do?()A
Connect the wireless access points to a dedicated subnet. Allow the subnet direct access to the Internet,but not to the company network.Require company users to establish a VPN to access company resourcesB
Install Internet Authentication Service (IAS) on a domain controller.Configure the wireless access points to require IEEE 802.1x authenticationC
Establish IPSec policies on all company servers to request encryption from all computers that connect from the wireless IP networksD
Configure all wireless access points to require the Wired Equivalent Privacy (WEP) protocol for all connections. Use a Group Policy object (GPO) to distribute the WEP keys to all computers in the domain
考题
单选题Users are unable to stay connected to the company's wireless network. Several times throughout the day the users' signals are dropped and they are forced to reconnect to the network. A technician determines the network cabling that supplies the WAP has been run inside with several power lines. Which of the following is the MOST likely cause of the network issue?()A
AshortB
Open pairsC
ESDD
EMI
考题
单选题An administrator is implementing a wireless network. Which of the following encryption technologies is the MOST secure method and will authenticate devices to the network?()A
SSHB
WEPC
VPND
WPA
考题
单选题A company needs strong wireless security enabled for minimal cost. Which of the following security measures is the BEST to use?()A
WEPB
Port filteringC
WPAD
Longer SSID broadcast intervals
考题
单选题A company wants to secure access to its internal wireless network. The company wants to use themost secure means to access the network. Which of the following is the BEST choice for wireless security in this situation?()A
WEP encryptionB
Channel rotationC
Disable SSIDD
WPA encryption
热门标签
最新试卷