单选题Which of the following would need to be implemented on a wireless router to allow network accessbased on a passphrase that the administrator would supply?()AWPA-PSK encryptionBSSID broadcastCPort forwardingDMAC filtering
单选题
Which of the following would need to be implemented on a wireless router to allow network accessbased on a passphrase that the administrator would supply?()
A
WPA-PSK encryption
B
SSID broadcast
C
Port forwarding
D
MAC filtering
参考解析
解析:
暂无解析
相关考题:
Which of the following features would hide internal IP addresses from the Internet?() A. Network Address TranslationB. Port forwardingC. Quality of ServiceD. SSID broadcast
Which of the following is used to deny or allow access to a wireless router network?() A. SSIDB. SNMPC. IMAPD. MAC filtering
Which of the following should be used to restrict access to a wireless network?() A. Port forwardingB. Enable SSID broadcastC. Wireless encryptionD. Enable DMZ
Which of the following tools would allow an administrator to push out a software update to allswitches on the network?() A. Network managementB. Protocol analyzerC. Network monitoringD. System diagnostic
An administrator wants to limit access of a wireless network without requiring authorized users toenter a password or network key.Which of the following methods would MOST likely be implemented on the wireless network?()A. Disable SSIDB. WPAC. MAC filteringD. RAS
Which of the following should be used to restrict access to a wireless network?()A、Port forwardingB、Enable SSID broadcastC、Wireless encryptionD、Enable DMZ
In which of the following scenarios would MAC filtering be MOST effective as a part of wireless security? ()A、A public place where guests are free to access the wireless network.B、A small office where a defined number of specific wireless devices are used.C、A meeting room where various company users will access the wireless network during meetings. D、An office where some users are unable to use WPA encryption due to older wireless cards so they use MAC filtering.
A user would like to ensure that only their family and their laptops can access a newly installed wireless router. Which of the following BEST accomplishes this?()A、MAC filteringB、Disable DHCPC、Static IP addressesD、Port forwarding
Which of the following features would hide internal IP addresses from the Internet?()A、Network Address TranslationB、Port forwardingC、Quality of ServiceD、SSID broadcast
A company has implemented a wireless network for its employees. Since implementing the newnetwork, individuals have been receiving duplicate IP addresses causing network issues. Which of the following would resolve this issue? ()A、 Add another wireless access point.B、 Add another DHCP server.C、 Disable the wireless DHCP server.D、 Change the default gateway of the wireless router.
An administrator wants to limit access of a wireless network without requiring authorized users to enter a password or network key. Which of the following methods would MOST likely be implemented on the wireless network?()A、Disable SSIDB、WPAC、MAC filteringD、RAS
Which of the following would be the BEST way to restrict access to the WAP from certain clients?()A、Disable DHCP serverB、Enable WEP encryptionC、Disable SSID broadcastD、Enable MAC filtering
Which of the following would need to be implemented on a wireless router to allow network accessbased on a passphrase that the administrator would supply?()A、WPA-PSK encryptionB、SSID broadcastC、Port forwardingD、MAC filtering
A user has a small network of four computers that they want to connect to a single cable modem. Which of the following devices would allow the user to do this?()A、Four port switchB、Four port wireless routerC、Four port WAPD、Four port hub
A company has implemented a wireless network for its employees. Since implementing the new network, individuals have been receiving duplicate IP addresses causing network issues. Which of the following would resolve this issue?()A、Add another wireless access point.B、Add another DHCP server.C、Disable the wireless DHCP server.D、Change the default gateway of the wireless router
Which of the following is used to deny or allow access to a wireless router network?()A、SSIDB、SNMPC、IMAPD、MAC filtering
Which of the following tools would allow an administrator to push out a software update to allswitches on the network?()A、Network managementB、Protocol analyzerC、Network monitoringD、System diagnostic
Which of the following wireless security techniques is the MOST secure?()A、Enable Wired Equivalent PrivacyB、Disable SSID broadcastC、Enable Wi-Fi Protected AccessD、Enable MAC filtering
单选题A company has implemented a wireless network for its employees. Since implementing the newnetwork, individuals have been receiving duplicate IP addresses causing network issues. Which of the following would resolve this issue? ()A Add another wireless access point.B Add another DHCP server.C Disable the wireless DHCP server.D Change the default gateway of the wireless router.
单选题Which of the following is used to deny or allow access to a wireless router network?()ASSIDBSNMPCIMAPDMAC filtering
单选题Which of the following would be the BEST way to restrict access to the WAP from certain clients?()ADisable DHCP serverBEnable WEP encryptionCDisable SSID broadcastDEnable MAC filtering
单选题In which of the following scenarios would MAC filtering be MOST effective as a part of wireless security? ()AA public place where guests are free to access the wireless network.BA small office where a defined number of specific wireless devices are used.CA meeting room where various company users will access the wireless network during meetings. DAn office where some users are unable to use WPA encryption due to older wireless cards so they use MAC filtering.
单选题An administrator wants to limit access of a wireless network without requiring authorized users to enter a password or network key. Which of the following methods would MOST likely be implemented on the wireless network?()ADisable SSIDBWPACMAC filteringDRAS
单选题Which of the following tools would allow an administrator to push out a software update to allswitches on the network?()ANetwork managementBProtocol analyzerCNetwork monitoringDSystem diagnostic
单选题An administrator wants to proactively collect information on attackers and their attempted methods of gaining access to the internal network. Which of the following would allow the administrator to do this?()ANIPSBHoneypotCDMZDNIDS
单选题A company has implemented a wireless network for its employees. Since implementing the new network, individuals have been receiving duplicate IP addresses causing network issues. Which of the following would resolve this issue?()AAdd another wireless access point.BAdd another DHCP server.CDisable the wireless DHCP server.DChange the default gateway of the wireless router
单选题A user has a small network of four computers that they want to connect to a single cable modem. Which of the following devices would allow the user to do this?()AFour port switchBFour port wireless routerCFour port WAPDFour port hub