单选题Which of the following uses pair authentication to provide a wireless connection between twodevices?()A802.11nBBluetoothCInfraredDCellular
单选题
Which of the following uses pair authentication to provide a wireless connection between twodevices?()
A
802.11n
B
Bluetooth
C
Infrared
D
Cellular
参考解析
解析:
暂无解析
相关考题:
Which of the following uses pair authentication to provide a wireless connection between twodevices?() A. 802.11nB. BluetoothC. InfraredD. Cellular
Which of the following authentication protocols uses certificates to negotiate access to the network?() A.PAPB.CHAPC.EAP-TLSD.Kerberos
Which of the following uses pair authentication to provide a wireless connection between twodevices?()A、802.11nB、BluetoothC、InfraredD、Cellular
Which of the following data network would you implement if you wanted a wireless network that had a relatively high data rate, but was limited to very short distances?()A、Broadband personal comm. Service (PCS)B、Broadband circuitC、InfraredD、Spread spectrumE、Cable
A SONET network typically uses which of the following transmission media?()A、Single-mode fiberB、Multimode fiberC、CopperD、Wireless
Which of the following logical network topologies is used to provide a secure connection acrossthe Internet?()A、VLANB、Peer to PeerC、VTPD、VPN
Which of the following wireless standards has the highest maximum data rate?()A、802.11nB、802.11bC、802.11aD、802.11g
Which of the following describes a secure connection over the Internet between two sites?()A、FTPB、VLANC、VPND、HTTP
The SCTP layer in the C7 signalling protocol stack is responsible for which of the following:()A、Establishing a signaling channel between two signaling entities in an ATM networkB、Provide reliable connection for signaling between two IP signaling nodesC、Provide routing for IP signaling messages in an IP signaling network
You are charged with implementing a secure wireless installation which will provide Internet access to client devices but will not allow communications between wireless clients. In addition toimplementing PSPF or peer-to-peer blocking on the wireless side. Which of the following actionsshould you perform on the wired infrastructure?()A、Implement a Cisco Secure IPS sensor.B、Implement 802.1X on the switch ports.C、Take no action, you have achieved your goal.D、Implement a protected port on the access switches.
Which two wireless devices acts as a communication connection between the client and WLAN()A、 bridgeB、 access pointC、 wireless adaptorD、 Layer 3 switchE、 antenna
A user reports sporadic connectivity with their wireless connection. A technician determines the wireless speed reported by the laptop to be 1Mbps. Which of the following is the MOST likely cause of this issue?()A、The client does not support 802.11nB、Incorrect frequency on the client is being usedC、Incorrect encryption on the APD、The client distance from the AP
An ISP has provided a DSL Internet connection with a static IP address. A technician is setting up a small office home office (SOHO) wireless router and needs to provide Internet access to five PCs on the network. Which of the following should be enabled?()A、NATB、WPSC、MAC filteringD、Port forwarding
A technician installed a new wireless access point on an existing small office home office (SOHO) network with a selective security option enabled. All wireless computers connect to the new network except one computer that cannot connect to the wireless network. Which of the following is the cause?()A、The network uses MAC filteringB、The network uses WEPC、The network uses SSID broadcastD、The network uses WPA
You install a new hardware router that provides wireless network connectivity between your computer and the Internet. You connect to the router by using a wireless network adapter. Your computer is able to access the Internet but is unable to discover other computers in the local wireless network. You need to configure the wireless connection to allow your computer to discover other computers. What should you do?()A、Configure the network category of your wireless network connection to Private.B、Configure the network category of your wireless network connection to Public.C、Configure the TCP/IP packet filtering on the wireless network connection.D、Configure the wireless network connection with the appropriate authentication to the router.
单选题You are charges with implementing a secure wireless installation which will provide Internet accessto client devices but will not allow communications between wireless clients. In addition to implementing PSPF or peer-to-peer blocking on the wireless side,which of the following actionsshould you perform on the wired infrastructure?()ATake no action, you have achieved your goal.BImplement a Cisco Secure IPS sensor.CImplement a protected port on the access switches.DImplement 802.1X on the switch ports.
多选题Which of the following connection types use a phone line as a carrier to provide access to theInternet?()ACellularBSatelliteCISDNDWiMAXEDSL
单选题A technician installed a new wireless access point on an existing small office home office (SOHO) network with a selective security option enabled. All wireless computers connect to the new network except one computer that cannot connect to the wireless network. Which of the following is the cause?()AThe network uses MAC filteringBThe network uses WEPCThe network uses SSID broadcastDThe network uses WPA
单选题Which of the following wireless standards uses the 5GHz frequency?()A802.11gB802.2C802.11aD802.3
单选题An ISP has provided a DSL Internet connection with a static IP address. A technician is setting up a small office home office (SOHO) wireless router and needs to provide Internet access to five PCs on the network. Which of the following should be enabled?()ANATBWPSCMAC filteringDPort forwarding
单选题Which of the following logical network topologies is used to provide a secure connection acrossthe Internet?()AVLANBPeer to PeerCVTPDVPN
单选题You install a new hardware router that provides wireless network connectivity between your computer and the Internet. You connect to the router by using a wireless network adapter. Your computer is able to access the Internet but is unable to discover other computers in the local wireless network. You need to configure the wireless connection to allow your computer to discover other computers. What should you do?()AConfigure the network category of your wireless network connection to Private.BConfigure the network category of your wireless network connection to Public.CConfigure the TCP/IP packet filtering on the wireless network connection.DConfigure the wireless network connection with the appropriate authentication to the router.
单选题Which of the following LAN technologies is considered fast Ethernet and uses two pairs of cabling,one pair for sending and the other pair for receiving?()A100Base-T4B100Base-TXC100Base-XD100Base-FX
单选题Which of the following describes a secure connection over the Internet between two sites?()AFTPBVLANCVPNDHTTP
单选题Client association using EAP-Cisco Wireless (LEAP) is failing, but EAP-PEAP is functioning on an autonomous access point. Which of the following needs to be enabled on the access point so EAP-Cisco Wireless (LEAP) is enabled?()Aopen authentication plus MACBopen authentication plus EAPCshared keyDnetwork EAP
单选题Which of the following authentication protocols uses certificates to negotiate access to the network?()APAPBCHAPCEAP-TLSDKerberos
多选题Which two wireless devices acts as a communication connection between the client and WLAN()AbridgeBaccess pointCwireless adaptorDLayer 3 switchEantenna