多选题What are three basic parameters to configure on a wireless access point? ()ASSIDBRTS/CTSCAES-CCMPDTKIP/MICERF channelFauthentication method

多选题
What are three basic parameters to configure on a wireless access point? ()
A

SSID

B

RTS/CTS

C

AES-CCMP

D

TKIP/MIC

E

RF channel

F

authentication method


参考解析

解析: 暂无解析

相关考题:

Your company has active directory certificate services (AD CS) and network access protection (NAP) deployed on the network. You need to configure the wireless network to accept smart cards. What should you do?()A.Configure the wireless network to use WPA2, PEAP and MSCHAP v2.B.Configure the wireless network to use WPA2, 802.1X authentication and EAP-TLS.C.Configure the wireless network to use WEP, 802.1X authentication, PEAP, and MSCHAP v2.D.Configure the wireless network to use WEP,PEAP, and MSCHAP v2 and also require strong user passwords.

What are three necessary steps for enabling 802.1X access when configuring Layer 2 enforcement?() A. Configure a location groupB. Createan authentication protocol setC. Configure the RADIUS AV pair listD. Configure RADIUS clientsE. Configure role and role-mapping rules

You install a wireless router and disable the Service Set identifier (SSID) broadcast feature. You need to configure your computer to connect to the wireless network.What should you do?() A.AB.BC.CD.D

Three access ports have been installed and configured to a small office.What term defines the wireless topology?() A. IBSSB. BSSC. ESSD. SSID

What are three basic parameters to configure on a wireless access point?() A.SSIDB.RTS/CTSC.AES-CCMPD.TKIP/MICE.RF channelF.authentication method

What are three configurable parameters when editing signatures in Security Device Manager (SDM)?()A、AlarmSeverityB、AlarmKeepaliveC、AlarmTraitsD、EventMediaE、EventAlarmF、EventAction

What three search criteria does cisco wcs use to search for wireless controllers?()A、controller nameB、outdoor areaC、floor areaD、networksE、mac addressF、ip address

What are two indicators that a customer should consider the installation of a Wireless LAN Controller? ()A、need one access pointB、want to provide unsecured wireless accessC、need between two and three access pointsD、want to provide employee wireless accessE、need more than four access pointsF、want to provide guest wireless access

Your network contains a wired network and a wireless network. Users report that they experience intermittent problems accessing network resources when they connect to the internal wireless network. You discover that an unsecured rogue wireless access point uses the same Service Set Identifier (SSID) as the internal wireless network. You need to ensure that the users only connect to the internal wireless network. What should you do?()A、Configure a Windows Connect Now Group Policy.B、Configure a Wireless Network (IEEE 802.11) Policy.C、Delete the rogue network from the Network and Sharing Center on each computer.D、Create a Connection Manager Administration Kit (CMAK) profile and deploy it to all users.

You are designing the wireless networks for the three warehouses. Your design must support the inventory and shipping management solution, and it must meet security requirements. What should you do?()A、Ensure that all wireless networking equipment fully supports the IEE 802.11a, IEEE 802.11b, and IEEE 802.11g wireless networking protocolsB、Assign a random service set identifier (SSID) to each wireless access point. Disable broadcasting of SSIDs on all wireless access pointsC、Create a firewall to block traffic to any IP address that did not originate from the company’s DHCP servers. Ensure that all wireless access points connect behind this new firewallD、Configure a server to use Internet Authentication Service (IAS). Configure the wireless networking equipment to use the IEEE 802.1x protocol and the IAS server

You are the network administrator for Company.  Five of Company’s employees have Windows 2000 Professional portable computers. The employees use their portable computers in a network enabled docking station when they are at their desks. When the employees are working outside of the office, they use the portable computers without network connectivity. You have just installed wireless PC Card network adapters in the portable computers so that the employees can access the network when they are in conference rooms in the office building.  You need to configure the portable computers to always allow the employees to choose which network environment to use when they start their portable computers.   What should you do?()A、Configure three different hardware profiles on each portable computer.B、Configure a single hardware profile and rename it to Universal Profile.C、Configure the wireless PC Card network adapters to use Automatic Private IP Addressing      (APIPA) when they cannot detect a DHCP server.D、Instruct each employee to unplug the wireless PC Card network adapter whenever the      portable computer is attached to a network-enabled docking station.E、Configure the hardware profiles selection to wait until a hardware profile is selected.F、Configure the hardware profiles selection to select the first profile listed and set the wait time to zero seconds.G、 Configure the wireless PC Card network adapters to use DHCP to obtain their IP addresses.

Your computer has a wireless network adapter installed. However, the computer fails to connect to the wireless network.  You need to ensure that the computer is able to connect to the wireless network.  What should you do?()A、Change the Network Category setting of the wireless connection to Public.B、Enable the Internet Connection Sharing feature on the wireless network adapter.C、Rename the wireless network adapter to match the Service Set Identifier (SSID) of the wireless network.D、Configure the wireless network adapter to connect to the appropriate wireless network from the Connect to a network list.

What are three necessary steps for enabling 802.1X access when configuring Layer 2 enforcement?()A、Configure a location groupB、Createan authentication protocol setC、Configure the RADIUS AV pair listD、Configure RADIUS clientsE、Configure role and role-mapping rules

What are three basic parameters to configure on a wireless access point?()A、SSIDB、RTS/CTSC、AES-CCMPD、TKIP/MICE、RF channelF、authentication method

You need to design a method to protect traffic on the wireless network. Your solution must meet the requirements of the chief security officer. What should you do?()A、Configure the wireless access points in Denver and Dallas to filter unauthorized Media Access Control (MAC) addressesB、Configure the wireless network connection properties for all computers in Denver and in Dallas to use the same network name that the wireless access points useC、Create a GPO and link it to the Denver OU and to the Dallas OU. Create a wireless network policy and configure it to use Windows to configure wireless network settings for the Denver and the Dallas networksD、Create a GPO and link it to the Denver OU and to the Dallas OU. Create a wireless network policy and enable data encryption and dynamic key assignments for the Denver and Dallas networks

Your computer has a wired network adapter and a wireless network adapter. You use the wireless network adapter only when traveling.  You need to configure the network adapter profile settings to ensure that other systems are allowed to discover your computer only when you are at home.  What are two possible ways to achieve this goal?()A、When you configure access to the wired network at home, set the wired network adapter location type to Private.B、When you configure access to the wired network at home, set the wired network adapter location type to Public.C、When you configure access to the public wireless access points, set the wireless network adapter location type to Private.D、When you configure access to the public wireless access points, set the wireless network adapter location type to Public.

You need to design an authentication solution for the wireless network. Your solution must meet the security requirements. What should you do?()A、Create wireless VPNs using L2TP/IPSec between the client computers to the wireless access pointB、Configure IEEE 802.1x authentication with smart cardsC、Configure the wireless network to use Wired Equivalent Privacy (WEP)D、Install and configure an Internet Authentication Service (IAS) server

Five of your company’s employees have Windows 2000 Professional portable computers. The employees use their portable computers in a network-enabled docking station when they are at their desks. When the employees are working outside of the office, they use the portable computers without network connectivity.   You have just installed wireless PC Card network adapters in the portable computers so that the employees can access the network when they are in conference rooms in the office building.   You need to configure the portable computers for optimum performance in all of the working environments. What should you do? ()A、Configure the wireless PC Card network adapters to use DHCP to obtain their IP addresses.B、Configure three different hardware profiles on each portable computer.C、Configure the wireless PC Card network adapters to use Automatic Private IP Addressing (APIPA) when they cannot detect a DHCP server.D、Instruct each employee to unplug the wireless PC Card network adapter whenever the portable computer is attached to a network-enabled.

You install a new hardware router that provides wireless network connectivity between your computer and the Internet. You connect to the router by using a wireless network adapter. Your computer is able to access the Internet but is unable to discover other computers in the local wireless network.  You need to configure the wireless connection to allow your computer to discover other computers.  What should you do?()A、Configure the network category of your wireless network connection to Private.B、Configure the network category of your wireless network connection to Public.C、Configure the TCP/IP packet filtering on the wireless network connection.D、Configure the wireless network connection with the appropriate authentication to the router.

多选题What three search criteria does cisco wcs use to search for wireless controllers?()Acontroller nameBoutdoor areaCfloor areaDnetworksEmac addressFip address

多选题When using the Cisco SDM Quick Setup Siteto-Site VPN wizard, which three parameters do you configure?()ASource interface where encrypted traffic originatesBIP address for the remote peerCTransform set for the IPsec tunnelDInterface for the VPN connection

多选题What are three configurable parameters when editing signatures in Security Device Manager (SDM)?()AAlarmSeverityBAlarmKeepaliveCAlarmTraitsDEventMediaEEventAlarmFEventAction

单选题Which of the following SMIT panel screens are used to configure a system’s basic network parameters for the very first time only?()AChange System User InterfaceBTCP/IP Further ConfigurationCTCP/IP Minimum ConfigurationDNetwork Installation Management

单选题You need to design a method to protect traffic on the wireless network. Your solution must meet the requirements of the chief security officer. What should you do?()AConfigure the wireless access points in Denver and Dallas to filter unauthorized Media Access Control (MAC) addressesBConfigure the wireless network connection properties for all computers in Denver and in Dallas to use the same network name that the wireless access points useCCreate a GPO and link it to the Denver OU and to the Dallas OU. Create a wireless network policy and configure it to use Windows to configure wireless network settings for the Denver and the Dallas networksDCreate a GPO and link it to the Denver OU and to the Dallas OU. Create a wireless network policy and enable data encryption and dynamic key assignments for the Denver and Dallas networks

单选题Three access ports have been installed and configured to a small office.What term defines the wireless topology?()AIBSSBBSSCESSDSSID

多选题What are two indicators that a customer should consider the installation of a Wireless LAN Controller? ()Aneed one access pointBwant to provide unsecured wireless accessCneed between two and three access pointsDwant to provide employee wireless accessEneed more than four access pointsFwant to provide guest wireless access

单选题You are designing the wireless networks for the three warehouses. Your design must support the inventory and shipping management solution, and it must meet security requirements. What should you do?()AEnsure that all wireless networking equipment fully supports the IEE 802.11a, IEEE 802.11b, and IEEE 802.11g wireless networking protocolsBAssign a random service set identifier (SSID) to each wireless access point. Disable broadcasting of SSIDs on all wireless access pointsCCreate a firewall to block traffic to any IP address that did not originate from the company’s DHCP servers. Ensure that all wireless access points connect behind this new firewallDConfigure a server to use Internet Authentication Service (IAS). Configure the wireless networking equipment to use the IEEE 802.1x protocol and the IAS server