单选题Which of the following should be changed to secure access to a WAPs configuration management interface?()ASSIDBWPA2CDHCPDPassword

单选题
Which of the following should be changed to secure access to a WAPs configuration management interface?()
A

SSID

B

WPA2

C

DHCP

D

Password


参考解析

解析: 暂无解析

相关考题:

A customer is deploying a new Junos Pulse Access Control Service and has completed the initial boot configuration as prompted using a serial connection. The customer now wants to complete the rest of the configuration using the admin GUI.Into which port on the Junos Pulse Access Control Service should the customer plug the network cable to enable access to the admin GUI?()A. the internal interfaceB. the external interfaceC. the management interfaceD. the console interface

Which three steps are considered part of the initial configuration?() A.SNMPB.hostnameC.root passwordD.user passwordE.management access interface

Which of the following is used to deny or allow access to a wireless router network?() A. SSIDB. SNMPC. IMAPD. MAC filtering

An administrator wants to limit access of a wireless network without requiring authorized users toenter a password or network key.Which of the following methods would MOST likely be implemented on the wireless network?()A. Disable SSIDB. WPAC. MAC filteringD. RAS

Physical and logical network diagrams are used for which of the following configuration management goals?() A. Track DHCP distributionB. Compare MAC and IP addressesC. Document Internet access historyD. Identity network devices

Which of the following should be changed to secure access to a WAPs configuration management interface?() A.SSIDB.WPA2C.DHCPD.Password

What can be done to secure the virtual terminal interfaces on a router?() A. Administratively shut down the interface.B. Physically secure the interface.C. Create an access list and apply it to the virtual terminal interfaces with the access-group command.D. Configure a virtual terminal password and login process.E. Enter an access list and apply it to the virtual terminal interfaces using the access-class command.

You are trying to deploy a configuration job to an ios access point using the wlse, but the job fails. Which of the following would cause this failure?()A、snmp communitiesB、telnet/ssh user/passwordC、wlccp credentialsD、http user/password

You are trying to deploy a configuration job to an IOS access point using the WLSE, but the jobfails. Which of the following would cause this failure?()A、SNMP communitiesB、Telnet/SSH user/passwordC、WLCCP credentialsD、HTTP user/password

On the WLSE, which of the following fault policies would be used to verify that access to thecommand-line interface of the access point is secure?()A、registration errorB、authentication failures thresholdC、HTTP disabledD、Telnet disabled

An administrator wants to limit access of a wireless network without requiring authorized users to enter a password or network key. Which of the following methods would MOST likely be implemented on the wireless network?()A、Disable SSIDB、WPAC、MAC filteringD、RAS

A new department is formed and a new section of the building is being built out for them. All 50 new employees will need access to the wireless network. Which of the following should be completed to allow these new employees access to the wireless network?()A、Frequency settings should be changedB、Additional WAPs should be installedC、Channels should be changedD、VLANs should be added

A customer is deploying a new Junos Pulse Access Control Service and has completed the initial boot configuration as prompted using a serial connection. The customer now wants to complete the rest of the configuration using the admin GUI.Into which port on the Junos Pulse Access Control Service should the customer plug the network cable to enable access to the admin GUI?()A、the internal interfaceB、the external interfaceC、the management interfaceD、the console interface

What can be done to secure the virtual terminal interfaces on a router? ()A、Administratively shut down the interface.B、Physically secure the interface.C、Create an access list and apply it to the virtual terminal interfaces with the access-group command.D、Configure a virtual terminal password and login process.E、Enter an access list and apply it to the virtual terminal interfaces using the access-class command.

Physical and logical network diagrams are used for which of the following configuration management goals?()A、Track DHCP distributionB、Compare MAC and IP addressesC、Document Internet access historyD、Identity network devices

Which of the following is used to deny or allow access to a wireless router network?()A、SSIDB、SNMPC、IMAPD、MAC filtering

Which of the following should be changed to secure access to a WAPs configuration management interface?()A、SSIDB、WPA2C、DHCPD、Password

Which three steps are considered part of the initial configuration?()A、SNMPB、hostnameC、root passwordD、user passwordE、management access interface

单选题When installing a wireless access point, which of the following should the technician perform FIRST?()AEnable MAC filtering.BDownload and install the latest firmware.CDisable DHCP.DChange the default password.

单选题You are trying to deploy a configuration job to an IOS access point using the WLSE, but the jobfails. Which of the following would cause this failure?()ASNMP communitiesBTelnet/SSH user/passwordCWLCCP credentialsDHTTP user/password

单选题Which of the following should be changed to secure access to a WAPs configuration management interface?()ASSIDBWPA2CDHCPDPassword

单选题Which of the following is a secure method of remote access via command line?()ARCPBTelnetCRSHDSSH

单选题On the wlse, which of the following fault policies would be used to verify that access to the command-line interface of the access point is secure?()Aregistration errorBauthentication failures thresholdChttp disabledDtelnet disabled

单选题A new department is formed and a new section of the building is being built out for them. All 50 new employees will need access to the wireless network. Which of the following should be completed to allow these new employees access to the wireless network?()AFrequency settings should be changedBAdditional WAPs should be installedCChannels should be changedDVLANs should be added

单选题Which one of the following items may be added to a password stored in MD5 to make it more secure?()ACiphertextBSaltCCryptotextDRainbow table

单选题A customer is deploying a new Junos Pulse Access Control Service and has completed the initial boot configuration as prompted using a serial connection. The customer now wants to complete the rest of the configuration using the admin GUI.Into which port on the Junos Pulse Access Control Service should the customer plug the network cable to enable access to the admin GUI?()Athe internal interfaceBthe external interfaceCthe management interfaceDthe console interface

单选题Physical and logical network diagrams are used for which of the following configuration management goals?()ATrack DHCP distributionBCompare MAC and IP addressesCDocument Internet access historyDIdentity network devices

单选题You are trying to deploy a configuration job to an ios access point using the wlse, but the job fails. Which of the following would cause this failure?()Asnmp communitiesBtelnet/ssh user/passwordCwlccp credentialsDhttp user/password