单选题Which of the following is used to deny or allow access to a wireless router network?()ASSIDBSNMPCIMAPDMAC filtering
单选题
Which of the following is used to deny or allow access to a wireless router network?()
A
SSID
B
SNMP
C
IMAP
D
MAC filtering
参考解析
解析:
暂无解析
相关考题:
Which of the following is used to deny or allow access to a wireless router network?() A. SSIDB. SNMPC. IMAPD. MAC filtering
Which of the following features on a wireless router maps the private IP address to a public IPaddress?() A. SSIDB. NATC. MAC filteringD. DHCP
Which of the following should be used to restrict access to a wireless network?() A. Port forwardingB. Enable SSID broadcastC. Wireless encryptionD. Enable DMZ
An administrator wants to limit access of a wireless network without requiring authorized users toenter a password or network key.Which of the following methods would MOST likely be implemented on the wireless network?()A. Disable SSIDB. WPAC. MAC filteringD. RAS
Which of the following access list statements would deny traffic from a specifichost?() A. Router(config)# access-list 1 deny 172.31.212.74 anyB. Router(config)# access-list 1 deny 10.6.111.48 hostC. Router(config)# access-list 1 deny 172.16.4.13 0.0.0.0D. Router(config)# access-list 1 deny 192.168.14.132 255.255.255.0E. Router(config)# access-list 1 deny 192.168.166.127 255.255.255.255
Which of the following should be used to restrict access to a wireless network?()A、Port forwardingB、Enable SSID broadcastC、Wireless encryptionD、Enable DMZ
Which of the following access list statements would deny traffic from a specifichost?()A、Router(config)# access-list 1 deny 172.31.212.74 anyB、Router(config)# access-list 1 deny 10.6.111.48 hostC、Router(config)# access-list 1 deny 172.16.4.13 0.0.0.0D、Router(config)# access-list 1 deny 192.168.14.132 255.255.255.0E、Router(config)# access-list 1 deny 192.168.166.127 255.255.255.255
In which of the following scenarios would MAC filtering be MOST effective as a part of wireless security? ()A、A public place where guests are free to access the wireless network.B、A small office where a defined number of specific wireless devices are used.C、A meeting room where various company users will access the wireless network during meetings. D、An office where some users are unable to use WPA encryption due to older wireless cards so they use MAC filtering.
Which of the following is the BEST way to deny unauthorized computers access to a network? ()A、Disable DHCP.B、Use MAC filtering.C、Disable the SSID broadcast.D、Use a network firewall.
An administrator wants to limit access of a wireless network without requiring authorized users to enter a password or network key. Which of the following methods would MOST likely be implemented on the wireless network?()A、Disable SSIDB、WPAC、MAC filteringD、RAS
Which wireless LAN design ensures that a mobile wireless client will not lose connectivity when moving from one access point to another?()A、using adapters and access points manufactured by the same companyB、overlapping the wireless cell coverage by at least 10%C、configuring all access points to use the same channelD、utilizing MAC address filtering to allow the client MAC address to authenticate with the surrounding APs
Which of the following features on a wireless router maps the private IP address to a public IPaddress?()A、SSIDB、NATC、MAC filteringD、DHCP
Which of the following would need to be implemented on a wireless router to allow network accessbased on a passphrase that the administrator would supply?()A、WPA-PSK encryptionB、SSID broadcastC、Port forwardingD、MAC filtering
Which of the following is used to deny or allow access to a wireless router network?()A、SSIDB、SNMPC、IMAPD、MAC filtering
An ISP has provided a DSL Internet connection with a static IP address. A technician is setting up a small office home office (SOHO) wireless router and needs to provide Internet access to five PCs on the network. Which of the following should be enabled?()A、NATB、WPSC、MAC filteringD、Port forwarding
You install a new hardware router that provides wireless network connectivity between your computer and the Internet. You connect to the router by using a wireless network adapter. Your computer is able to access the Internet but is unable to discover other computers in the local wireless network. You need to configure the wireless connection to allow your computer to discover other computers. What should you do?()A、Configure the network category of your wireless network connection to Private.B、Configure the network category of your wireless network connection to Public.C、Configure the TCP/IP packet filtering on the wireless network connection.D、Configure the wireless network connection with the appropriate authentication to the router.
单选题When installing a wireless access point, which of the following should the technician perform FIRST?()AEnable MAC filtering.BDownload and install the latest firmware.CDisable DHCP.DChange the default password.
单选题Which of the following is the BEST way to deny unauthorized computers access to a network? ()ADisable DHCP.BUse MAC filtering.CDisable the SSID broadcast.DUse a network firewall.
单选题Which of the following would need to be implemented on a wireless router to allow network accessbased on a passphrase that the administrator would supply?()AWPA-PSK encryptionBSSID broadcastCPort forwardingDMAC filtering
单选题You install a new hardware router that provides wireless network connectivity between your computer and the Internet. You connect to the router by using a wireless network adapter. Your computer is able to access the Internet but is unable to discover other computers in the local wireless network. You need to configure the wireless connection to allow your computer to discover other computers. What should you do?()AConfigure the network category of your wireless network connection to Private.BConfigure the network category of your wireless network connection to Public.CConfigure the TCP/IP packet filtering on the wireless network connection.DConfigure the wireless network connection with the appropriate authentication to the router.
单选题In which of the following scenarios would MAC filtering be MOST effective as a part of wireless security? ()AA public place where guests are free to access the wireless network.BA small office where a defined number of specific wireless devices are used.CA meeting room where various company users will access the wireless network during meetings. DAn office where some users are unable to use WPA encryption due to older wireless cards so they use MAC filtering.
单选题Which of the following should be used to restrict access to a wireless network?()APort forwardingBEnable SSID broadcastCWireless encryptionDEnable DMZ
单选题A home user wants to setup a wireless network. Which of the following would be the MOST important consideration?()AOperating system type of the connected PCsBLocation of the wireless routerCNumber of PCs that will access the networkDNumber of available Ethernet ports on the router
单选题A new department is formed and a new section of the building is being built out for them. All 50 new employees will need access to the wireless network. Which of the following should be completed to allow these new employees access to the wireless network?()AFrequency settings should be changedBAdditional WAPs should be installedCChannels should be changedDVLANs should be added
单选题Which of the following functions on the wireless LAN controller is used to determine whether ornot a rogue access point is connected to the same Layer 2 network?()Arogue detectorBrogue containmentCRLDPDRIDP
单选题Physical and logical network diagrams are used for which of the following configuration management goals?()ATrack DHCP distributionBCompare MAC and IP addressesCDocument Internet access historyDIdentity network devices
单选题Which wireless LAN design ensures that a mobile wireless client will not lose connectivity when moving from one access point to another?()Ausing adapters and access points manufactured by the same companyBoverlapping the wireless cell coverage by at least 10%Cconfiguring all access points to use the same channelDutilizing MAC address filtering to allow the client MAC address to authenticate with the surrounding APs