单选题Which of the following uses pair authentication to provide a wireless connection between twodevices?()A802.11nBBluetoothCInfraredDCellular

单选题
Which of the following uses pair authentication to provide a wireless connection between twodevices?()
A

802.11n

B

Bluetooth

C

Infrared

D

Cellular


参考解析

解析: 暂无解析

相关考题:

Which of the following uses pair authentication to provide a wireless connection between twodevices?() A. 802.11nB. BluetoothC. InfraredD. Cellular

Which of the following authentication protocols uses certificates to negotiate access to the network?() A.PAPB.CHAPC.EAP-TLSD.Kerberos

Which of the following uses pair authentication to provide a wireless connection between twodevices?()A、802.11nB、BluetoothC、InfraredD、Cellular

Which of the following data network would you implement if you wanted a wireless network that had a relatively high data rate, but was limited to very short distances?()A、Broadband personal comm. Service (PCS)B、Broadband circuitC、InfraredD、Spread spectrumE、Cable

A SONET network typically uses which of the following transmission media?()A、Single-mode fiberB、Multimode fiberC、CopperD、Wireless

Which of the following logical network topologies is used to provide a secure connection acrossthe Internet?()A、VLANB、Peer to PeerC、VTPD、VPN

Which of the following wireless standards has the highest maximum data rate?()A、802.11nB、802.11bC、802.11aD、802.11g

Which of the following describes a secure connection over the Internet between two sites?()A、FTPB、VLANC、VPND、HTTP

The SCTP layer in the C7 signalling protocol stack is responsible for which of the following:()A、Establishing a signaling channel between two signaling entities in an ATM networkB、Provide reliable connection for signaling between two IP signaling nodesC、Provide routing for IP signaling messages in an IP signaling network

You are charged with implementing a secure wireless installation which will provide Internet access to client devices but will not allow communications between wireless clients. In addition toimplementing PSPF or peer-to-peer blocking on the wireless side. Which of the following actionsshould you perform on the wired infrastructure?()A、Implement a Cisco Secure IPS sensor.B、Implement 802.1X on the switch ports.C、Take no action, you have achieved your goal.D、Implement a protected port on the access switches.

Which two wireless devices acts as a communication connection between the client and WLAN()A、 bridgeB、 access pointC、 wireless adaptorD、 Layer 3 switchE、 antenna

A user reports sporadic connectivity with their wireless connection. A technician determines the wireless speed reported by the laptop to be 1Mbps. Which of the following is the MOST likely cause of this issue?()A、The client does not support 802.11nB、Incorrect frequency on the client is being usedC、Incorrect encryption on the APD、The client distance from the AP

An ISP has provided a DSL Internet connection with a static IP address. A technician is setting up a small office home office (SOHO) wireless router and needs to provide Internet access to five PCs on the network. Which of the following should be enabled?()A、NATB、WPSC、MAC filteringD、Port forwarding

A technician installed a new wireless access point on an existing small office home office (SOHO) network with a selective security option enabled. All wireless computers connect to the new network except one computer that cannot connect to the wireless network. Which of the following is the cause?()A、The network uses MAC filteringB、The network uses WEPC、The network uses SSID broadcastD、The network uses WPA

You install a new hardware router that provides wireless network connectivity between your computer and the Internet. You connect to the router by using a wireless network adapter. Your computer is able to access the Internet but is unable to discover other computers in the local wireless network.  You need to configure the wireless connection to allow your computer to discover other computers.  What should you do?()A、Configure the network category of your wireless network connection to Private.B、Configure the network category of your wireless network connection to Public.C、Configure the TCP/IP packet filtering on the wireless network connection.D、Configure the wireless network connection with the appropriate authentication to the router.

单选题You are charges with implementing a secure wireless installation which will provide Internet accessto client devices but will not allow communications between wireless clients. In addition to implementing PSPF or peer-to-peer blocking on the wireless side,which of the following actionsshould you perform on the wired infrastructure?()ATake no action, you have achieved your goal.BImplement a Cisco Secure IPS sensor.CImplement a protected port on the access switches.DImplement 802.1X on the switch ports.

多选题Which of the following connection types use a phone line as a carrier to provide access to theInternet?()ACellularBSatelliteCISDNDWiMAXEDSL

单选题A technician installed a new wireless access point on an existing small office home office (SOHO) network with a selective security option enabled. All wireless computers connect to the new network except one computer that cannot connect to the wireless network. Which of the following is the cause?()AThe network uses MAC filteringBThe network uses WEPCThe network uses SSID broadcastDThe network uses WPA

单选题Which of the following wireless standards uses the 5GHz frequency?()A802.11gB802.2C802.11aD802.3

单选题An ISP has provided a DSL Internet connection with a static IP address. A technician is setting up a small office home office (SOHO) wireless router and needs to provide Internet access to five PCs on the network. Which of the following should be enabled?()ANATBWPSCMAC filteringDPort forwarding

单选题Which of the following logical network topologies is used to provide a secure connection acrossthe Internet?()AVLANBPeer to PeerCVTPDVPN

单选题You install a new hardware router that provides wireless network connectivity between your computer and the Internet. You connect to the router by using a wireless network adapter. Your computer is able to access the Internet but is unable to discover other computers in the local wireless network.  You need to configure the wireless connection to allow your computer to discover other computers.  What should you do?()AConfigure the network category of your wireless network connection to Private.BConfigure the network category of your wireless network connection to Public.CConfigure the TCP/IP packet filtering on the wireless network connection.DConfigure the wireless network connection with the appropriate authentication to the router.

单选题Which of the following LAN technologies is considered fast Ethernet and uses two pairs of cabling,one pair for sending and the other pair for receiving?()A100Base-T4B100Base-TXC100Base-XD100Base-FX

单选题Which of the following describes a secure connection over the Internet between two sites?()AFTPBVLANCVPNDHTTP

单选题Client association using EAP-Cisco Wireless (LEAP) is failing, but EAP-PEAP is functioning on an autonomous access point. Which of the following needs to be enabled on the access point so EAP-Cisco Wireless (LEAP) is enabled?()Aopen authentication plus MACBopen authentication plus EAPCshared keyDnetwork EAP

单选题Which of the following authentication protocols uses certificates to negotiate access to the network?()APAPBCHAPCEAP-TLSDKerberos

多选题Which two wireless devices acts as a communication connection between the client and WLAN()AbridgeBaccess pointCwireless adaptorDLayer 3 switchEantenna