网友您好, 请在下方输入框内输入要搜索的题目:

题目内容 (请给出正确答案)
单选题
A corporation is not concerned about wireless use by Teleworkers. Authentication for any application first requires access via a web browser to a protected site. Given these requirements, choose the appropriate security feature to use to enforce the security policy.()
A

Authentication Proxy

B

802.1X 

C

Context-Based Access Control

D

Intrusion Detection System

E

Stateful firewall


参考答案

参考解析
解析: 暂无解析
更多 “单选题A corporation is not concerned about wireless use by Teleworkers. Authentication for any application first requires access via a web browser to a protected site. Given these requirements, choose the appropriate security feature to use to enforce the security policy.()A Authentication ProxyB 802.1X C Context-Based Access ControlD Intrusion Detection SystemE Stateful firewall” 相关考题
考题 There are 4 people concerned _______ children's education. (A)in(B) about(C) with(D) for

考题 Two buildings on the San Jose campus of a small company must be connected to use Ethernet with a bandwidth of at least 100 Mbps. The company is concerned about possible problems from voltage potential differences between the two buildings. Which media type should be used for the connection()。A.UTP cableB.STP cableC.coaxial cableD.fiber optic cable

考题 Which two statements best describe the wireless security standard that is defined by WPA (Choose two.)()。 A.It specifies use of a static encryption key that must be changed frequently to enhance securityB.It requires use of an open authentication methodC.It specifies the use of dynamic encryption keys that change each time a client establishes a connectionD.It requires that all access points and wireless devices use the same encryption keyE.It includes authentication by PSK

考题 John is crazy about pop music.A:sorry B:mad C:concerned D:worried

考题 The most important features in the growth of American economy in the early 20th cenruty were()Athe use of steam and electricity as chief energy,the development of lare corporation and the development of railwayBthe development of large corporation,urbanization and the employment in production of new technologyCthe appearance of airplane,the use of electricity on a large scale and urbanizationDthe rapid development of industry,railway and large cities

考题 The most important features in the growth of American economy in the early 20th cenruty were()A、the use of steam and electricity as chief energy,the development of lare corporation and the development of railwayB、the development of large corporation,urbanization and the employment in production of new technologyC、the appearance of airplane,the use of electricity on a large scale and urbanizationD、the rapid development of industry,railway and large cities

考题 Which two features or capabilities are valid options for both an Autonomous WLAN solution and a  Lightweight WLAN solution? ()A、 PoE capabilityB、 Use of Cisco Secure Access Control Server (ACS) for securityC、 Cisco IOS software for configurationD、 Cisco Wireless Control System (WCS) for managementE、 Use of a Cisco Wireless Location Appliance location for tracking

考题 In which of the following scenarios would MAC filtering be MOST effective as a part of wireless security? ()A、A public place where guests are free to access the wireless network.B、A small office where a defined number of specific wireless devices are used.C、A meeting room where various company users will access the wireless network during meetings. D、An office where some users are unable to use WPA encryption due to older wireless cards so they use MAC filtering.

考题 A large corporation is concerned about the amount of time it takes to back up their main file server. They are also concerned that their IT technician frequently forgets to change the backup tapes, thereby leaving the company open to data loss. Which backup system would solve both problems?()A、 RAIDB、 tape libraryC、 optical storageD、 disk to disk to tape

考题 An administrator is concerned about users utilizing the company's wireless signal with their personal laptops. Which of the following is the BEST method to use to prevent unauthorized devices from using the company's wireless network?()A、Secure VPNB、MAC filteringC、IP filteringD、Static IP addresses

考题 Which two statements best describe the wireless security standard that is defined by WPA (Choose two.)()。A、It specifies use of a static encryption key that must be changed frequently to enhance securityB、It requires use of an open authentication methodC、It specifies the use of dynamic encryption keys that change each time a client establishes a connectionD、It requires that all access points and wireless devices use the same encryption keyE、It includes authentication by PSK

考题 Which statement is correct about the use of the virtual interface on a WLC ?()A、 Used to relay DHCP messagesB、 Used to communicate with LAPsC、 Used to bring up LWAPP tunnelsD、 Used to extend into the wireless client VLAN

考题 Which two statements about a wireless repeater topology are true?()A、A wireless repeater is an access point that is not connected to the wired LAN.B、The repeater feature is only available in lightweight access point topologies.C、The SSID of the root access point must be configured on the repeater access point.D、This topology requires a 10 - 15 percent overlap between a wired access point and the wireless repeater.E、This topology requires a 15 - 25 percent overlap between a wired access point and the wireless repeater.F、To avoid interference, the repeater access point must use a different channel from what the root access point uses.

考题 An administrator is planning for a six node cluster but is concerned about the administration needed tomanage user accounts throughout the cluster. What PowerHA feature could the administrator use to reducethe administration overhead?()A、LDAP Authentication ModuleB、Smart Assist for Active DirectoryC、C-SPOC for user and password managementD、File Collections designating one node as the primary authentication node

考题 You share your portable computer with a co-worker. You use separate user accounts to log on. A wireless network is available to you and your co-worker.  You need to prevent your co-worker from modifying your wireless network profile.  What should you do?()A、Disable the Connect even if the network is not broadcasting option.B、In the Network and Sharing Center window, click the Diagnose and repair option.C、Set the default wireless profile type to the Use all-users only profile (recommended) option. Recreate the wireless network.D、Set the default wireless profile type to the Use all-users and per-user profiles option. Recreate the wireless network by using the Save this network for me only option.

考题 You share your computer with a co-worker by using separate user accounts to log on. Your co-worker modifies the wireless network properties. When you use the computer, the change in properties is not reflected.  You need to ensure that you can view all the changes made to the wireless network properties.   What should you do?()A、Disable the Connect even if the network is not broadcasting option.B、In the Network and Sharing Center window, click the Diagnose and repair option.C、Set the default wireless profile type to the Use all-users only profile (recommended) option. Recreate the wireless network.D、Set the default wireless profile type to the Use all-users and per-user profiles option. Recreate the wireless network with the Save this network for me only option.

考题 单选题A large corporation is concerned about the amount of time it takes to back up their main file server. They are also concerned that their IT technician frequently forgets to change the backup tapes, thereby leaving the company open to data loss. Which backup system would solve both problems?()A  RAIDB  tape libraryC  optical storageD  disk to disk to tape

考题 单选题In this passage about secondary schools, the author is mainly concerned about ______.A academic standardsB the role of specialist teachersC the training of the individual teachersD the personal development of pupils

考题 单选题You are the Exchange administrator of the Xxx Corporation’s Exchange 2010 organization.You are  concerned about the total size of items that are stored in a public folder namedExpenseReport.Click the Exhibit (s) button to view the public folder configuration. Which of the following techniques should you use to determine the size of items and the attachments in the public folder?()A Run the following script: Get-PublicFolderItemStatistics -Identity "/ExpenseReport/2009"B Click on the Statistics tab in the properties of the public folder with the Public Folder Management ConsoleC Use the MSExchangeIS Public object in System MonitorD Use the MSExchangeIS object in System Monitor

考题 单选题Although worried about the dangers on going into debt, Helena’s concern was more about the possibility of losing her business.A Helena’s concern was more about the possibility of losing her businessB it was the possibility of losing her business that gave Helena more concernC Helena was more concerned towards her business and the possibility of losing itD the possibility of losing her business gave Helena more concernE Helena was more concerned about the possibility of losing her business

考题 单选题If you are curious about the history of our school or concerned about the future, you________ miss the excellent opportunity.A mayB needn'tC couldD mustn't

考题 单选题Your company has active directory certificate services (AD CS) and network access protection (NAP) deployed on the network. You need to configure the wireless network to accept smart cards. What should you do?()A Configure the wireless network to use WPA2, PEAP and MSCHAP v2.B Configure the wireless network to use WPA2, 802.1X authentication and EAP-TLS.C Configure the wireless network to use WEP, 802.1X authentication, PEAP, and MSCHAP v2.D Configure the wireless network to use WEP,PEAP, and MSCHAP v2 and also require strong user passwords.

考题 单选题In which of the following scenarios would MAC filtering be MOST effective as a part of wireless security? ()A A public place where guests are free to access the wireless network.B A small office where a defined number of specific wireless devices are used.C A meeting room where various company users will access the wireless network during meetings. D An office where some users are unable to use WPA encryption due to older wireless cards so they use MAC filtering.

考题 多选题Which two statements about a wireless repeater topology are true?()AA wireless repeater is an access point that is not connected to the wired LAN.BThe repeater feature is only available in lightweight access point topologies.CThe SSID of the root access point must be configured on the repeater access point.DThis topology requires a 10 - 15 percent overlap between a wired access point and the wireless repeater.EThis topology requires a 15 - 25 percent overlap between a wired access point and the wireless repeater.FTo avoid interference, the repeater access point must use a different channel from what the root access point uses.

考题 单选题You need to design a method to protect traffic on the wireless network. Your solution must meet the requirements of the chief security officer. What should you do?()A Configure the wireless access points in Denver and Dallas to filter unauthorized Media Access Control (MAC) addressesB Configure the wireless network connection properties for all computers in Denver and in Dallas to use the same network name that the wireless access points useC Create a GPO and link it to the Denver OU and to the Dallas OU. Create a wireless network policy and configure it to use Windows to configure wireless network settings for the Denver and the Dallas networksD Create a GPO and link it to the Denver OU and to the Dallas OU. Create a wireless network policy and enable data encryption and dynamic key assignments for the Denver and Dallas networks

考题 单选题Which statement is correct about the use of the virtual interface on a WLC ?()A  Used to relay DHCP messagesB  Used to communicate with LAPsC  Used to bring up LWAPP tunnelsD  Used to extend into the wireless client VLAN

考题 单选题The most important features in the growth of American economy in the early 20th cenruty were()A the use of steam and electricity as chief energy,the development of lare corporation and the development of railwayB the development of large corporation,urbanization and the employment in production of new technologyC the appearance of airplane,the use of electricity on a large scale and urbanizationD the rapid development of industry,railway and large cities