网友您好, 请在下方输入框内输入要搜索的题目:

题目内容 (请给出正确答案)
单选题
A company wants to secure access to its internal wireless network. The company wants to use themost secure means to access the network. Which of the following is the BEST choice for wireless security in this situation?()
A

WEP encryption

B

Channel rotation

C

Disable SSID

D

WPA encryption


参考答案

参考解析
解析: 暂无解析
更多 “单选题A company wants to secure access to its internal wireless network. The company wants to use themost secure means to access the network. Which of the following is the BEST choice for wireless security in this situation?()A WEP encryptionB Channel rotationC Disable SSIDD WPA encryption” 相关考题
考题 A company wants to secure access to its internal wireless network. The company wants to use themost secure means to access the network. Which of the following is the BEST choice for wireless security in this situation?()A. WEP encryptionB. Channel rotationC. Disable SSIDD. WPA encryption

考题 The Schuyler and Livingston Iron Works has been working on getting its network security under control. It has set up VPN with IPSec links to its suppliers. It has installed network vulnerability scanners to proactively identify areas of weakness, and it monitors and responds to security events as they occur. It also employs extensive access control lists, stateful firewall implementations, and dedicated firewall appliances. The company has been growing very fast lately and wants to make sure it is up to date on security measures.Which two areas of security would you advise the company to strengthen? ()A. intrusion protectionB. identityC. secure connectivityD. security management

考题 When configuring Cisco Secure ACS to support wireless EAP authentication,which device mustbeconfigured as a AAA client?()A、Location ApplianceB、controller-based access pointsC、wireless clientsD、Wireless Control SystemE、wireless controllers

考题 LDAP is being utilized throughout the Company Wireless network.  Which issue or set of issues  does the Lightweight Access Point Protocol (LWAPP) address? ()A、 Reduction of processing in wireless controllersB、 Distributed approach to authentication, encryption, and policy enforcementC、 Access point discovery, information exchange, and configurationD、 Provides security by blocking communication between access points and wireless clientsE、 None of the other alternatives apply.

考题 LDAP is being used throughout the Company wireless network.  Which statement about the  Lightweight Access Point Protocol (LWAPP) protocol is true?()A、 The processing of 802.11 data and management protocols and access point capabilities is  distributed between a lightweight access point and a centralized WLAN controller.B、 LWAPP advertises its WDS capability and participates in electing the best WDS device for the  wireless LAN.C、 LWAPP aggregates radio management forward information and sends it to a wireless LAN  solution engine.D、 LWAPP authenticates all access points in the subnet and establishes a secure communication  channel with each of them.E、 None of the other alternatives apply

考题 An administrator is concerned about users utilizing the company's wireless signal with their personal laptops. Which of the following is the BEST method to use to prevent unauthorized devices from using the company's wireless network?()A、Secure VPNB、MAC filteringC、IP filteringD、Static IP addresses

考题 You need to set up a Company AP to act as a wireless repeater.  What are three characteristics of  this wireless repeater topology?()A、 The recommended overlap of the access point on the wired LAN and the wireless repeater is  25%.B、 Autonomous access points are required.C、 The SSID of the root access point must be configured on the repeater access point.D、 The recommended overlap of the access point on the wired LAN and the wireless repeater is  50%.E、 Lightweight access points are required.F、 The recommended overlap of the access point on the wired LAN and the wireless repeater is  75%.G、 The SSID of the root access point must be distinct from that of the repeater access point.

考题 The Schuyler and Livingston Iron Works has been working on getting its network security undercontrol. It has set up VPN with IPSec links to its suppliers. It has installed network vulnerabilityscanners to proactively identify areas of weakness, and it monitors and responds to securityevents as they occur. It also employs extensive access control lists, stateful firewall implementations, and dedicated firewall appliances. The company has been growing very fastlately and wants to make sure it is up to date on security measures. Which two areas of securitywould you advise the company to strengthen? ()A、 intrusion protectionB、 identityC、 secure connectivityD、 security management

考题 In the Company wireless LAN,  what is the function of the Service Set Identifier (SSID)?()A、 The SSID must match on both the Company client and the Company access point and provides  MAC Address Authentication to authenticate the client to the access point.B、 The SSID should be configured on the Company client site only and provides data-privacy  functions and authentication to the access point.C、 The SSID must match on both the Company client and the Company access point and provides encryption keys for authentication to the access point.D、 The SSID must match on both the Company client and the Company access point. The SSID is  advertised in plain-text in the access point beacon messages.  E、 None of the other alternatives apply

考题 The Schuyler and Livingston Iron Works has been working on getting its network security under control. It has set up VPN with IPSec links to its suppliers. It has installed network vulnerability scanners to proactively identify areas of weakness, and it monitors and responds to security events as they occur. It also employs extensive access control lists, stateful firewall implementations, and dedicated firewall appliances. The company has been growing very fast lately and wants to make sure it is up to date on security measures.Which two areas of security would you advise the company to strengthen? ()A、intrusion protectionB、identityC、secure connectivityD、security management

考题 A customer has deployed a wireless core feature set using autonomous access points and now wants to include a satellite building 4500 feet away from the main campus. The customer also wants to provide wireless access to a courtyard for wireless clients in close proximity to the antenna mounting position. Which Cisco Aironet product is the most applicable solution?()A、 Cisco Aironet 1000 SeriesB、 Cisco Aironet 1100 SeriesC、 Cisco Aironet 1200 SeriesD、 Cisco Aironet 1300 SeriesE、 Cisco Aironet 1400 Series

考题 When configuring Cisco Secure ACS to support wireless EAP authentication, which device must be configured as a AAA client?()A、Wireless Control SystemB、wireless clientsC、wireless controllersD、controller-based access pointsE、Location Appliance

考题 Identity authentication, protocol encryption, secure guest access, voice over WLAN features, and a small device footprint are all highlights of what product in the wireless technology market?()A、wireless monitoring deviceB、wireless LAN controllerC、wireless bridgeD、wireless management deviceE、access point

考题 You are charged with implementing a secure wireless installation which will provide Internet access to clientdevices but will not allow communications between wireless clients. In addition to implementing PSPF orpeer-to-peer blocking on the wireless side. Which of the following actions should you perform on the wiredinfrastructure?()A、Take no action, you have achieved your goal.B、Implement a Cisco Secure IPS sensor.C、Implement a protected port on the access switches.D、Implement 802.1X on the switch ports.

考题 Under which three conditions does a client initiate roaming between wireless cells in the Company  WLAN? ()A、 The access point has broadcast too many SSIDs.B、 The wireless client has missed too many beacons from the access point.C、 The maximum data retry count, initiated by the wireless client, is exceeded.D、 The wireless client has reduced the data rate.E、 The access point has requested client reauthentication.F、 The wireless client has missed too many IAPP (Inter Access Point Protocol) updates.

考题 Which statement about the Lightweight Access Point Protocol (LWAPP) protocol is true?()A、 The processing of 802.11 data and management protocols and access point capabilities is distributed  between a lightweight access point and a centralized WLAN controller.B、 LWAPP aggregates radio management forward information and sends it to a wireless LAN solution  engine.C、 LWAPP authenticates all access points in the subnet and establishes a secure communication channel  with each of them.D、 LWAPP advertises its WDS capability and participates in electing the best WDS device for the wireless  LAN

考题 A company has implemented a wireless network for its employees. Since implementing the new network, individuals have been receiving duplicate IP addresses causing network issues. Which of the following would resolve this issue?()A、Add another wireless access point.B、Add another DHCP server.C、Disable the wireless DHCP server.D、Change the default gateway of the wireless router

考题 A company finished upgrading the wireless encryption to WPA2 Enterprise. The administrator receives a call from a user who is unable to connect to the company wireless. Which of the following is MOST likely causing the connection problem?()A、The laptop is missing the software supplicantB、The access point SSID is hidden.C、The laptop only supports TKIP and AES encryption,D、The access point is on the wrong channel.

考题 You need to design a Security strategy for the wireless network at all resort locations.What should you do?()A、Connect the wireless access points to a dedicated subnet. Allow the subnet direct access to the Internet,but not to the company network.Require company users to establish a VPN to access company resourcesB、Install Internet Authentication Service (IAS) on a domain controller.Configure the wireless access points to require IEEE 802.1x authenticationC、Establish IPSec policies on all company servers to request encryption from all computers that connect from the wireless IP networksD、Configure all wireless access points to require the Wired Equivalent Privacy (WEP) protocol for all connections. Use a Group Policy object (GPO) to distribute the WEP keys to all computers in the domain

考题 Your company has deployed Network Access Protection (NAP). You configure secure wireless access to the network by using 802.1x authentication from any access point. You need to ensure that all client computers that access the network are evaluated by NAP.  what should you do()? A、Configure all access points as RADIUS clients to the Remediation ServersB、Configure all access points as RADIUS clients to the Network Policy Server (NPS)C、Create a Network Policy that defines Remote Access Server as a network connection methodD、Create a Network Policy that specifies EAP-TLS as the only availible authentication method.

考题 单选题In the Company wireless LAN,  what is the function of the Service Set Identifier (SSID)?()A  The SSID must match on both the Company client and the Company access point and provides  MAC Address Authentication to authenticate the client to the access point.B  The SSID should be configured on the Company client site only and provides data-privacy  functions and authentication to the access point.C  The SSID must match on both the Company client and the Company access point and provides encryption keys for authentication to the access point.D  The SSID must match on both the Company client and the Company access point. The SSID is  advertised in plain-text in the access point beacon messages.  E  None of the other alternatives apply

考题 单选题A company wants to secure access to its internal wireless network. The company wants to use themost secure means to access the network. Which of the following is the BEST choice for wireless security in this situation?()A WEP encryptionB Channel rotationC Disable SSIDD WPA encryption

考题 单选题LDAP is being utilized throughout the Company Wireless network.  Which issue or set of issues  does the Lightweight Access Point Protocol (LWAPP) address? ()A  Reduction of processing in wireless controllersB  Distributed approach to authentication, encryption, and policy enforcementC  Access point discovery, information exchange, and configurationD  Provides security by blocking communication between access points and wireless clientsE  None of the other alternatives apply.

考题 单选题A company has implemented a wireless network for its employees. Since implementing the newnetwork, individuals have been receiving duplicate IP addresses causing network issues.  Which of the following would resolve this issue? ()A  Add another wireless access point.B  Add another DHCP server.C  Disable the wireless DHCP server.D  Change the default gateway of the wireless router.

考题 单选题Which statement about the Lightweight Access Point Protocol (LWAPP) protocol is true?()A  The processing of 802.11 data and management protocols and access point capabilities is distributed  between a lightweight access point and a centralized WLAN controller.B  LWAPP aggregates radio management forward information and sends it to a wireless LAN solution  engine.C  LWAPP authenticates all access points in the subnet and establishes a secure communication channel  with each of them.D  LWAPP advertises its WDS capability and participates in electing the best WDS device for the wireless  LAN

考题 单选题A home user wants to setup a wireless network. Which of the following would be the MOST important consideration?()A Operating system type of the connected PCsB Location of the wireless routerC Number of PCs that will access the networkD Number of available Ethernet ports on the router

考题 单选题LDAP is being used throughout the Company wireless network.  Which statement about the  Lightweight Access Point Protocol (LWAPP) protocol is true?()A  The processing of 802.11 data and management protocols and access point capabilities is  distributed between a lightweight access point and a centralized WLAN controller.B  LWAPP advertises its WDS capability and participates in electing the best WDS device for the  wireless LAN.C  LWAPP aggregates radio management forward information and sends it to a wireless LAN  solution engine.D  LWAPP authenticates all access points in the subnet and establishes a secure communication  channel with each of them.E  None of the other alternatives apply

考题 单选题A customer has deployed a wireless core feature set using autonomous access points and now wants to include a satellite building 4500 feet away from the main campus. The customer also wants to provide wireless access to a courtyard for wireless clients in close proximity to the antenna mounting position. Which Cisco Aironet product is the most applicable solution?()A  Cisco Aironet 1000 SeriesB  Cisco Aironet 1100 SeriesC  Cisco Aironet 1200 SeriesD  Cisco Aironet 1300 SeriesE  Cisco Aironet 1400 Series