网友您好, 请在下方输入框内输入要搜索的题目:
题目内容
(请给出正确答案)
单选题
An administrator is implementing a wireless network. Which of the following encryption technologies is the MOST secure method and will authenticate devices to the network?()
A
SSH
B
WEP
C
VPN
D
WPA
参考答案
参考解析
解析:
暂无解析
更多 “单选题An administrator is implementing a wireless network. Which of the following encryption technologies is the MOST secure method and will authenticate devices to the network?()A SSHB WEPC VPND WPA” 相关考题
考题
Which of the following standards or encryption types is the MOST secure for wireless networking?()
A.WEPB.AESC.TKIPD.DES
考题
A company wants to secure access to its internal wireless network. The company wants to use themost secure means to access the network. Which of the following is the BEST choice for wireless security in this situation?()A. WEP encryptionB. Channel rotationC. Disable SSIDD. WPA encryption
考题
An administrator is implementing a wireless network. Which of the following encryption technologies is the MOST secure method and will authenticate devices to the network?()
A.SSHB.WEPC.VPND.WPA
考题
A network technician is installing a small wireless network. A requirement is that individual users must authenticate using usernames and passwords.Which of the following technologies would support users authenticating with encrypted usernames and passwords?()A.WPA TLSB.WPA PEAPC.64-bit WEPD.128-bit WEP
考题
A company wants to secure access to its internal wireless network. The company wants to use themost secure means to access the network. Which of the following is the BEST choice for wireless security in this situation?()A、WEP encryptionB、Channel rotationC、Disable SSIDD、WPA encryption
考题
In which of the following scenarios would MAC filtering be MOST effective as a part of wireless security? ()A、A public place where guests are free to access the wireless network.B、A small office where a defined number of specific wireless devices are used.C、A meeting room where various company users will access the wireless network during meetings. D、An office where some users are unable to use WPA encryption due to older wireless cards so they use MAC filtering.
考题
Which of the following standards or encryption types is the MOST secure for wireless networking?()A、WEPB、AESC、TKIPD、DES
考题
An administrator is concerned about users utilizing the company's wireless signal with their personal laptops. Which of the following is the BEST method to use to prevent unauthorized devices from using the company's wireless network?()A、Secure VPNB、MAC filteringC、IP filteringD、Static IP addresses
考题
An administrator wants to limit access of a wireless network without requiring authorized users to enter a password or network key. Which of the following methods would MOST likely be implemented on the wireless network?()A、Disable SSIDB、WPAC、MAC filteringD、RAS
考题
Which two statements best describe the wireless security standard that is defined by WPA? (Choose two.)()A、It specifies use of a static encryption key that must be changed frequently to enhance security.B、It requires use of an open authentication method.C、It specifies the use of dynamic encryption keys that change each time a client establishes a connection.D、It requires that all access points and wireless devices use the same encryption key.E、It includes authentication by PSK
考题
You are charged with implementing a secure wireless installation which will provide Internet accessto client devices but will not allow communications between wireless clients. In addition to implementing PSPF or peer-to-peer blocking on the wireless side. Which of the following actions should you perform on the wired infrastructure?()A、Implement a Cisco Secure IPS sensor.B、Implement 802.1X on the switch ports.C、Take no action, you have achieved your goal.D、Implement a protected port on the access switches.
考题
Which of the following would need to be implemented on a wireless router to allow network accessbased on a passphrase that the administrator would supply?()A、WPA-PSK encryptionB、SSID broadcastC、Port forwardingD、MAC filtering
考题
Which of the following technologies is the MOST secure form of wireless encryption?()A、SSLB、WPAC、WEPD、TLS
考题
A network technician is installing a small wireless network. A requirement is that individual users must authenticate using usernames and passwords. Which of the following technologies would support users authenticating with encrypted usernames and passwords?()A、WPA TLSB、WPA PEAPC、64-bit WEPD、128-bit WEP
考题
An administrator is implementing a wireless network. Which of the following encryption technologies is the MOST secure method and will authenticate devices to the network?()A、SSHB、WEPC、VPND、WPA
考题
A technician installed a new wireless access point on an existing small office home office (SOHO) network with a selective security option enabled. All wireless computers connect to the new network except one computer that cannot connect to the wireless network. Which of the following is the cause?()A、The network uses MAC filteringB、The network uses WEPC、The network uses SSID broadcastD、The network uses WPA
考题
单选题An administrator is concerned about users utilizing the company's wireless signal with their personal laptops. Which of the following is the BEST method to use to prevent unauthorized devices from using the company's wireless network?()A
Secure VPNB
MAC filteringC
IP filteringD
Static IP addresses
考题
单选题You are charges with implementing a secure wireless installation which will provide Internet accessto client devices but will not allow communications between wireless clients. In addition to implementing PSPF or peer-to-peer blocking on the wireless side,which of the following actionsshould you perform on the wired infrastructure?()A
Take no action, you have achieved your goal.B
Implement a Cisco Secure IPS sensor.C
Implement a protected port on the access switches.D
Implement 802.1X on the switch ports.
考题
单选题Which of the following technologies is the MOST secure form of wireless encryption?()A
SSLB
WPAC
WEPD
TLS
考题
单选题In which of the following scenarios would MAC filtering be MOST effective as a part of wireless security? ()A
A public place where guests are free to access the wireless network.B
A small office where a defined number of specific wireless devices are used.C
A meeting room where various company users will access the wireless network during meetings. D
An office where some users are unable to use WPA encryption due to older wireless cards so they use MAC filtering.
考题
单选题An administrator wants to limit access of a wireless network without requiring authorized users to enter a password or network key. Which of the following methods would MOST likely be implemented on the wireless network?()A
Disable SSIDB
WPAC
MAC filteringD
RAS
考题
单选题A home user wants to setup a wireless network. Which of the following would be the MOST important consideration?()A
Operating system type of the connected PCsB
Location of the wireless routerC
Number of PCs that will access the networkD
Number of available Ethernet ports on the router
考题
单选题A company finished upgrading the wireless encryption to WPA2 Enterprise. The administrator receives a call from a user who is unable to connect to the company wireless. Which of the following is MOST likely causing the connection problem?()A
The laptop is missing the software supplicantB
The access point SSID is hidden.C
The laptop only supports TKIP and AES encryption,D
The access point is on the wrong channel.
考题
单选题Which of the following standards or encryption types is the MOST secure for wireless networking?()A
WEPB
AESC
TKIPD
DES
考题
单选题A company wants to secure access to its internal wireless network. The company wants to use themost secure means to access the network. Which of the following is the BEST choice for wireless security in this situation?()A
WEP encryptionB
Channel rotationC
Disable SSIDD
WPA encryption
考题
单选题A network technician is installing a small wireless network. A requirement is that individual users must authenticate using usernames and passwords. Which of the following technologies would support users authenticating with encrypted usernames and passwords?()A
WPA TLSB
WPA PEAPC
64-bit WEPD
128-bit WEP
考题
单选题An administrator has found interference on a network. Which of the following cable types is thenetwork MOST likely composed of?()A
UTPB
FiberC
RG-6D
STP
热门标签
最新试卷