单选题An administrator wants to limit access of a wireless network without requiring authorized users to enter a password or network key. Which of the following methods would MOST likely be implemented on the wireless network?()ADisable SSIDBWPACMAC filteringDRAS
单选题
An administrator wants to limit access of a wireless network without requiring authorized users to enter a password or network key. Which of the following methods would MOST likely be implemented on the wireless network?()
A
Disable SSID
B
WPA
C
MAC filtering
D
RAS
参考解析
解析:
暂无解析
相关考题:
The network administrator has configured port security on a Ezonexam switch. Why would a network administrator configure port security on this Ezonexam device?A.To prevent unauthorized hosts from getting access to the LANB.To limit the number of Layer 2 broadcasts on a particular switch portC.To prevent unauthorized Telnet or SSH access to a switch portD.To prevent the IP and MAC address of the switch and associated portsE.None of the above
A network administrator wants to control which user hosts can access the network based on their MAC address. What will prevent workstations with unauthorized MAC addresses from connecting to the network through a switch?A. BPDUB. Port securityC. RSTPD. STPE. VTPF. Blocking mode
A home user wants to setup a wireless network. Which of the following would be the MOST important consideration?() A. Operating system type of the connected PCsB. Location of the wireless routerC. Number of PCs that will access the networkD. Number of available Ethernet ports on the router
A company wants to secure access to its internal wireless network. The company wants to use themost secure means to access the network. Which of the following is the BEST choice for wireless security in this situation?()A. WEP encryptionB. Channel rotationC. Disable SSIDD. WPA encryption
An administrator wants to limit access of a wireless network without requiring authorized users toenter a password or network key.Which of the following methods would MOST likely be implemented on the wireless network?()A. Disable SSIDB. WPAC. MAC filteringD. RAS
A ______ system placed between the company network and the outside world may limit outside access to the internal network.A.firewallB.modemC.gatewayD.key
A service provider wants to prevent the repeat of a denial of service (DoS) attack that recently disabled Internet access for several thousand customers. Which Cisco solution best matches this business need?()A.Network securityB.Virtual Private Network (VPN)C.Wireless networkD.Content networking
Which of the following should be used to restrict access to a wireless network?()A、Port forwardingB、Enable SSID broadcastC、Wireless encryptionD、Enable DMZ
Why would a network administrator configure port security on a switch?()A、to prevent unauthorized Telnet access to a switch portB、to limit the number of Layer 2 broadcasts on a particular switch portC、to prevent unauthorized hosts from accessing the LAND、to protect the IP and MAC address of the switch and associated portsE、to block unauthorized access to the switch management interfaces over common TCP ports
A service provider wants to prevent the repeat of a denial of service (DoS) attack that recently disabled Internet access for several thousand customers. Which Cisco solution best matches this business need?()A、Network securityB、Virtual Private Network (VPN)C、Wireless networkD、Content networking
A service provider wants to prevent the repeat of a denial of service (DoS) attack that recently disabled Internet access for several thousand customers. Which Cisco solution best matches this business need?()A、Network securityB、Wireless networkC、Content networkingD、Virtual Private Network (VPN)
A network administrator wants to control which user hosts can access the network based on their MAC address. What will prevent workstations with unauthorized MAC addresses from connecting to the network through a switch?()A、BPDUB、Port securityC、RSTPD、STPE、VTPF、Blocking mode
You are the network administrator for passguide.com. Which device will you install in your computer to make wireless connections you and a network?()A、RepeaterB、Wireless routerC、HubD、Wireless network adapter
A network consultant is asked to set up a wireless network in a home. The home user wants the wireless network to be available in every comer of the house. Which of the following additional information will the technician need to determine the equipment for the installation? ()(Select TWO)A、The length of the houseB、How many rooms are in the houseC、How many users will be using the wireless networkD、The building material of the houseE、The cost of the house
A technician installed a new wireless access point on an existing small office home office (SOHO) network with a selective security option enabled. All wireless computers connect to the new network except one computer that cannot connect to the wireless network. Which of the following is the cause?()A、The network uses MAC filteringB、The network uses WEPC、The network uses SSID broadcastD、The network uses WPA
An administrator wants to proactively collect information on attackers and their attempted methods of gaining access to the internal network. Which of the following would allow the administrator to do this?()A、NIPSB、HoneypotC、DMZD、NIDS
You have a computer that runs Windows XP Professional. The computer has an 802. 11g wireless network card. You have a wireless access point that is secured by using WiFi Protected Access (WPA). The service set identifier (SSID) of the wireless access point does not broadcast. You need to establish a wireless connection to the wireless access point. What should you do?() A、From the Device Manager, open the wireless network adapter properties and click Advanced. B、From the Device Manager, right-click the wireless network adapter and click Scan for hardware changes. C、From the Wireless Network Connection Properties, select View Wireless Networks. D、From the Wireless Network Connection Properties, click Change Advanced Settings. From the Wireless Networks tab, select Add a preferred network.
Your computer has a wired network adapter and a wireless network adapter. You use the wireless network adapter only when traveling. You need to configure the network adapter profile settings to ensure that other systems are allowed to discover your computer only when you are at home. What are two possible ways to achieve this goal?()A、When you configure access to the wired network at home, set the wired network adapter location type to Private.B、When you configure access to the wired network at home, set the wired network adapter location type to Public.C、When you configure access to the public wireless access points, set the wireless network adapter location type to Private.D、When you configure access to the public wireless access points, set the wireless network adapter location type to Public.
单选题A company wants to secure access to its internal wireless network. The company wants to use themost secure means to access the network. Which of the following is the BEST choice for wireless security in this situation?()AWEP encryptionBChannel rotationCDisable SSIDDWPA encryption
单选题An administrator has added a new access point to the network to provide additional coverage. A heat-map survey shows coverage now extends beyond company property and is interfering with other wireless networks in the area. How should the administrator modify the new installation to stop the interference?()ATurn down the transmission strength of the access point.BReplace the antenna with a smaller one.CChange the wireless password to a more complex one.DChange the SSID of the access point
多选题As the Company wireless administrator, you required to be knowledgeable about the wireless LAN components. Which two statements about these components are true? ()AIn the autonomous access point solution, control is provided by the WLAN controller.BIn the lightweight access point solution, WLAN management is provided by the WLAN Control System (WCS).CIn the autonomous access point solution, control is provided by the WDS (Wireless Domain Services).DCisco Aironet autonomous access points cannot be supported by the Cisco Unified Wireless Network.EIi the lightweight access point solution, WLAN management is provided by the WLAN Solution Engine (WLSE).FCisco Aironet lightweight access points cannot be supported by the Cisco Unified Wireless Network.
多选题Your computer has a wired network adapter and a wireless network adapter. You use the wireless network adapter only when you are traveling. You need to configure the network adapter profile settings to ensure that the computer discovers other network devices only when you are at home. Which two actions should you perform?()AWhen you configure access to the wired network at home, set the wired network adapter location type to Public.BWhen you configure access to the wired network at home, set the wired network adapter location type to Private.CWhen you configure access to the public wireless access points, set the wireless network adapter location type to Public.DWhen you configure access to the public wireless access points, set the wireless network adapter location type to Private.
单选题Your computer connects to both an ad hoc wireless network and a wired network. You need to allow other wireless clients to access the wired network. What should you do? ()ASet the security type to the No authentication (Open) option.BConfigure the wired and wireless network adapters as a network bridge.CModify the wireless network profile type to the Use all-user profiles only (recommended) option.DOn each wireless client, set the Service Set Identifier (SSID) for a new wireless network to the name of your wired network adapter.
单选题A network administrator wants to control which user hosts can access the network based on their MAC address. What will prevent workstations with unauthorized MAC addresses from connecting to the network through a switch?()ABPDUBPort securityCRSTPDSTPEVTPFBlocking mode
单选题A home user wants to setup a wireless network. Which of the following would be the MOST important consideration?()AOperating system type of the connected PCsBLocation of the wireless routerCNumber of PCs that will access the networkDNumber of available Ethernet ports on the router
单选题You need to design a method to protect traffic on the wireless network. Your solution must meet the requirements of the chief security officer. What should you do?()AConfigure the wireless access points in Denver and Dallas to filter unauthorized Media Access Control (MAC) addressesBConfigure the wireless network connection properties for all computers in Denver and in Dallas to use the same network name that the wireless access points useCCreate a GPO and link it to the Denver OU and to the Dallas OU. Create a wireless network policy and configure it to use Windows to configure wireless network settings for the Denver and the Dallas networksDCreate a GPO and link it to the Denver OU and to the Dallas OU. Create a wireless network policy and enable data encryption and dynamic key assignments for the Denver and Dallas networks
单选题Your network contains a wireless access point. You have a computer that runs Windows 7. The computerconnects to the wireless access point. You disable Service Set Identifier (SSID) broadcasts on the wirelessaccess point. You discover that you are now unable to connect to the wireless access point from theWindows 7 computer. You need to ensure that the computer can connect to the wireless access point. What should you do?()AFrom Credential Manager, modify the generic credentials.BFrom Credential Manager, modify the Windows credentials.CFrom Network and Sharing Center, turn on Network discovery.DFrom Network and Sharing Center, modify the wireless network connection settings.