单选题Which of the following should be used to restrict access to a wireless network?()APort forwardingBEnable SSID broadcastCWireless encryptionDEnable DMZ

单选题
Which of the following should be used to restrict access to a wireless network?()
A

Port forwarding

B

Enable SSID broadcast

C

Wireless encryption

D

Enable DMZ


参考解析

解析: 暂无解析

相关考题:

Which of the following should be used to restrict access to a wireless network?() A. Port forwardingB. Enable SSID broadcastC. Wireless encryptionD. Enable DMZ

Which of the following protocols should be used to monitor network performance?() A.SNTPB.SMTPC.HTTPD.SNMP

Which two statements are true regarding the USING clause in table joins?()A、It can be used to join a maximum of three tables B、It can be used to restrict the number of columns used in a NATURAL join C、It can be used to access data from tables through equijoins as well as nonequijoins D、It can be used to join tables that have columns with the same name and compatible data types

Which of the following technologies can be used to remotely gain access to a server console?()A、PS/2 KVMB、LDAPC、VNCD、Remote desktopE、VPN

Which of the following could be used to restrict access to the local web server to only certain IP addresses?()A、 Create an ACL.B、 Create an application exception.C、 Configure IPSec.D、 Block port 80.

Which of the following would be the BEST way to restrict access to the WAP from certain clients?()A、Disable DHCP serverB、Enable WEP encryptionC、Disable SSID broadcastD、Enable MAC filtering

A network technician is installing a series of three access points to cover the entire wing of a building. Each access point has a wired connection and 802.11g is being used for the wireless transmission. Which of the following channels should be used for the access points?()A、Channels 1-6-11B、Channels 1-3-5C、Channels 7-11-1D、Channels 2-4-6

Which of the following is used to deny or allow access to a wireless router network?()A、SSIDB、SNMPC、IMAPD、MAC filtering

Which of the following should be used to check a serial port for functionality?()A、Loopback plugB、Toner probeC、MultimeterD、Cable tester

An administrator needs to configure a server to restrict mail traffic to an application server for security reasons.  Which of the following techniques can be used to manage this?()A、 PATB、 ACLsC、 Subnet maskingD、 Port blocking

Which of the following commands should be used to show DNS information?()A、 traceB、 netstatC、 ifconfigD、 nslookup

Which of the following tools should be used to analyze the placement of file fragments on a mirrored logical volume?()A、 dfB、 lslvC、 filemonD、 fileplace

Which of the following tools should be used to report current network status and is often used to check the reliability of a network?()A、 netpmonB、 netstatC、 nfsstatD、 vmstat

Which of the following commands should be used to delete an entry from the /etc/inittab?()A、xitabB、rmitabC、chitabD、delitab

Which of the following commands should be used to determine which disk of a system is experiencing a disk I/O performance problem?()A、 filemonB、 istatC、 vmstatD、 iostat

Which of the following commands should be used to report statistics on network protocols used by the system?()A、 lsattrB、 pstatC、 netstatD、 ifconfig

Which statements describe the capabilities of the DBMS_NETWORK_ACL_ADMIN package?()A、It can be used to allow the access privilege settings for users but not roles.B、It can be used to allow the access privilege settings for users as well as roles.C、It can be used to control the time interval for which the access privilege is available to a user.D、It can be used to selectively restrict the access for each user in a database to different host computers.E、It can be used to selectively restrict a user's access to different applications in a specific host computer.

单选题Which of the following tools should be used to report current network status and is often used to check the reliability of a network?()A netpmonB netstatC nfsstatD vmstat

单选题An administrator needs to configure a server to restrict mail traffic to an application server for security reasons.  Which of the following techniques can be used to manage this?()A PATB ACLsC Subnet maskingD Port blocking

多选题Which of the following technologies can be used to remotely gain access to a server console?()APS/2 KVMBLDAPCVNCDRemote desktopEVPN

多选题Which two statements are true regarding the USING clause in table joins?()AIt can be used to join a maximum of three tablesBIt can be used to restrict the number of columns used in a NATURAL joinCIt can be used to access data from tables through equijoins as well as nonequijoinsDIt can be used to join tables that have columns with the same name and compatible data types

单选题On the WLSE, which of the following fault policies would be used to verify that access to thecommand-line interface of the access point is secure?()Aregistration errorBauthentication failures thresholdCHTTP disabledDTelnet disabled

单选题Which of the following could be used to restrict access to the local web server to only certain IP addresses?()A Create an ACL.B Create an application exception.C Configure IPSec.D Block port 80.

多选题Which statements describe the capabilities of the DBMS_NETWORK_ACL_ADMIN package?()AIt can be used to allow the access privilege settings for users but not roles.BIt can be used to allow the access privilege settings for users as well as roles.CIt can be used to control the time interval for which the access privilege is available to a user.DIt can be used to selectively restrict the access for each user in a database to different host computers.EIt can be used to selectively restrict a user's access to different applications in a specific host computer.