网友您好, 请在下方输入框内输入要搜索的题目:

题目内容 (请给出正确答案)
单选题
A company needs strong wireless security enabled for minimal cost. Which of the following security measures is the BEST to use?()
A

WEP

B

Port filtering

C

WPA

D

Longer SSID broadcast intervals


参考答案

参考解析
解析: 暂无解析
更多 “单选题A company needs strong wireless security enabled for minimal cost. Which of the following security measures is the BEST to use?()A WEPB Port filteringC WPAD Longer SSID broadcast intervals” 相关考题
考题 Mike, a technician, is replacing a wireless router on an existing small office home office (SOHO) network. The SSID, WPA and DHCP information has been correctly added. Which of the following must also be addressed?()A. The administrative password needs to be changed.B. The TKIP option needs to be enabled.C. The WEP key needs to be changed.D. Wireless access points need to be added.

考题 After swapping an internal wireless card on a laptop with an identical model, the technician notices that the wireless does not work. Which of the following would be the MOST likely cause?() A. Antennae is not connectedB. Wireless card is defectiveC. Drivers needs to be updatedD. OS needs to be updated

考题 A company needs strong wireless security enabled for minimal cost. Which of the following security measures is the BEST to use?() A. WEPB. Port filteringC. WPAD. Longer SSID broadcast intervals

考题 A company wants to secure access to its internal wireless network. The company wants to use themost secure means to access the network. Which of the following is the BEST choice for wireless security in this situation?()A. WEP encryptionB. Channel rotationC. Disable SSIDD. WPA encryption

考题 What best describes the features of the Cisco 850 Series routers?() A、integrates data,security,and wirelessB、integrates data,ecurity,wireless and application optimizationC、integrates voice,data,security,wireless and application optimizationD、integrates data and wireless

考题 LDAP is being utilized throughout the Company Wireless network.  Which issue or set of issues  does the Lightweight Access Point Protocol (LWAPP) address? ()A、 Reduction of processing in wireless controllersB、 Distributed approach to authentication, encryption, and policy enforcementC、 Access point discovery, information exchange, and configurationD、 Provides security by blocking communication between access points and wireless clientsE、 None of the other alternatives apply.

考题 In which of the following scenarios would MAC filtering be MOST effective as a part of wireless security? ()A、A public place where guests are free to access the wireless network.B、A small office where a defined number of specific wireless devices are used.C、A meeting room where various company users will access the wireless network during meetings. D、An office where some users are unable to use WPA encryption due to older wireless cards so they use MAC filtering.

考题 Client association using EAP-Cisco Wireless (LEAP) is failing, but EAP-PEAP is functioning on an autonomous access point. Which of the following needs to be enabled on the access point so EAP-Cisco Wireless (LEAP) is enabled?()A、open authentication plus MACB、open authentication plus EAPC、shared keyD、network EAP

考题 Refer to the exhibit. A junior network administrator was given the task of configuring port security on SwitchA to allow only PC_A to access the switched network through port fa0/1. If any other device is detected, the port is to drop frames from this device. The administrator configured the interface and tested it with successful pings from PC_A to RouterA, and then observes the output from these two show commands.Which two of these changes are necessary for SwitchA to meet the requirements? ()A、Port security needs to be globally enabled.B、Port security needs to be enabled on the interface.C、Port security needs to be configured to shut down the interface in the event of a violation.D、Port security needs to be configured to allow only one learned MAC address.E、Port security interface counters need to be cleared before using the show command.F、The port security configuration needs to be saved to NVRAM before it can become active.

考题 On a standalone access point, client association using EAP-Cisco Wireless (Cisco-LEAP) isfailing, but association using EAP-PEAP is functioning. What needs to be enabled on the standalone accesspoint to correct this issue?()A、network EAPB、open authentication plus MACC、open authentication plus EAPD、a shared key

考题 After swapping an internal wireless card on a laptop with an identical model, the technician notices that the wireless does not work. Which of the following would be the MOST likely cause?()A、Antennae is not connectedB、Wireless card is defectiveC、Drivers needs to be updatedD、OS needs to be updated

考题 Mike, a technician, is replacing a wireless router on an existing small office home office (SOHO) network. The SSID, WPA and DHCP information has been correctly added. Which of the following must also be addressed?()A、The administrative password needs to be changed.B、The TKIP option needs to be enabled.C、The WEP key needs to be changed.D、Wireless access points need to be added.

考题 A company needs strong wireless security enabled for minimal cost. Which of the following security measures is the BEST to use?()A、WEPB、Port filteringC、WPAD、Longer SSID broadcast intervals

考题 An ISP has provided a DSL Internet connection with a static IP address. A technician is setting up a small office home office (SOHO) wireless router and needs to provide Internet access to five PCs on the network. Which of the following should be enabled?()A、NATB、WPSC、MAC filteringD、Port forwarding

考题 A technician installed a new wireless access point on an existing small office home office (SOHO) network with a selective security option enabled. All wireless computers connect to the new network except one computer that cannot connect to the wireless network. Which of the following is the cause?()A、The network uses MAC filteringB、The network uses WEPC、The network uses SSID broadcastD、The network uses WPA

考题 A System p administrator needs to set the default password length for all users to six characters.  Which of the following files needs to be edited to accomplish this ()A、/etc/security/limitsB、/etc/security/mkuser.sysC、/etc/security/privD、/etc/security/user

考题 You need to design a Security strategy for the wireless network at all resort locations.What should you do?()A、Connect the wireless access points to a dedicated subnet. Allow the subnet direct access to the Internet,but not to the company network.Require company users to establish a VPN to access company resourcesB、Install Internet Authentication Service (IAS) on a domain controller.Configure the wireless access points to require IEEE 802.1x authenticationC、Establish IPSec policies on all company servers to request encryption from all computers that connect from the wireless IP networksD、Configure all wireless access points to require the Wired Equivalent Privacy (WEP) protocol for all connections. Use a Group Policy object (GPO) to distribute the WEP keys to all computers in the domain

考题 All client computers on your company network run Windows 7 and are members of an Active Directory Domain Services domain. Employees using portable computers report that they get connected to a coffee shop wireless network from the company conference room. You need to ensure that the employees connect to the company wireless network by default from anywhere within the company premises. What should you do?()A、Configure the Network authentication (Shared mode) setting.B、Apply a Wireless Network Policy to set the network type to WPA-PSK.C、Apply a Wireless Network Policy to automatically connect to the company wireless network.D、Apply a Wireless Network Policy to set the company wireless network as the preferred network.

考题 Your company has deployed network access protection (NAP) enforcement for VPNs. You need to ensure that the health of all clients can be monitored and reported. What should you do?()A、Create a group policy object (GPO) that enabled security center and link the policy to the domain.B、Create a group policy object (GPO) that enabled security center and link the policy to the domain controllers organizational unit (OU).C、Create a group policy object (GPO) and set the require trusted path for credential entry option to enabled. Link the policy to the domain.D、Create a group policy object (GPO) and set the require trusted path for credential entry option to Enabled. Link the policy to the domain controllers organizational unit (OU).

考题 A customer’s laptop display panel assembly had just been replaced. The customer notices that the wireless network adapter is enabled but detecting a weak signal. Which of the following is the MOST likely cause?()A、The wireless card needs to be replaced.B、The antenna wires are not connected properly.C、The wireless drivers need to be updated.D、The display panel is defective.

考题 单选题A customer’s laptop display panel assembly had just been replaced. The customer notices that the wireless network adapter is enabled but detecting a weak signal. Which of the following is the MOST likely cause?()A The wireless card needs to be replaced.B The antenna wires are not connected properly.C The wireless drivers need to be updated.D The display panel is defective.

考题 单选题A company wants to secure access to its internal wireless network. The company wants to use themost secure means to access the network. Which of the following is the BEST choice for wireless security in this situation?()A WEP encryptionB Channel rotationC Disable SSIDD WPA encryption

考题 单选题A technician installed a new wireless access point on an existing small office home office (SOHO) network with a selective security option enabled. All wireless computers connect to the new network except one computer that cannot connect to the wireless network. Which of the following is the cause?()A The network uses MAC filteringB The network uses WEPC The network uses SSID broadcastD The network uses WPA

考题 单选题LDAP is being utilized throughout the Company Wireless network.  Which issue or set of issues  does the Lightweight Access Point Protocol (LWAPP) address? ()A  Reduction of processing in wireless controllersB  Distributed approach to authentication, encryption, and policy enforcementC  Access point discovery, information exchange, and configurationD  Provides security by blocking communication between access points and wireless clientsE  None of the other alternatives apply.

考题 单选题In which of the following scenarios would MAC filtering be MOST effective as a part of wireless security? ()A A public place where guests are free to access the wireless network.B A small office where a defined number of specific wireless devices are used.C A meeting room where various company users will access the wireless network during meetings. D An office where some users are unable to use WPA encryption due to older wireless cards so they use MAC filtering.

考题 多选题Refer to the exhibit. A junior network administrator was given the task of configuring port security on SwitchA to allow only PC_A to access the switched network through port fa0/1. If any other device is detected, the port is to drop frames from this device. The administrator configured the interface and tested it with successful pings from PC_A to RouterA, and then observes the output from these two show commands.Which two of these changes are necessary for SwitchA to meet the requirements? ()APort security needs to be globally enabled.BPort security needs to be enabled on the interface.CPort security needs to be configured to shut down the interface in the event of a violation.DPort security needs to be configured to allow only one learned MAC address.EPort security interface counters need to be cleared before using the show command.FThe port security configuration needs to be saved to NVRAM before it can become active.

考题 单选题On a standalone access point, client association using EAP-Cisco Wireless (Cisco-LEAP) is failing, butassociation using EAP-PEAP is functioning. What needs to be enabled on the standalone access point tocorrect this issue?()A a shared keyB network EAPC open authentication plus EAPD open authentication plus MAC

考题 单选题Mike, a technician, is replacing a wireless router on an existing small office home office (SOHO) network. The SSID, WPA and DHCP information has been correctly added. Which of the following must also be addressed?()A The administrative password needs to be changed.B The TKIP option needs to be enabled.C The WEP key needs to be changed.D Wireless access points need to be added.