单选题An administrator is concerned about users utilizing the company's wireless signal with their personal laptops. Which of the following is the BEST method to use to prevent unauthorized devices from using the company's wireless network?()ASecure VPNBMAC filteringCIP filteringDStatic IP addresses

单选题
An administrator is concerned about users utilizing the company's wireless signal with their personal laptops. Which of the following is the BEST method to use to prevent unauthorized devices from using the company's wireless network?()
A

Secure VPN

B

MAC filtering

C

IP filtering

D

Static IP addresses


参考解析

解析: 暂无解析

相关考题:

A company wants to secure access to its internal wireless network. The company wants to use themost secure means to access the network. Which of the following is the BEST choice for wireless security in this situation?()A. WEP encryptionB. Channel rotationC. Disable SSIDD. WPA encryption

An administrator is implementing a wireless network. Which of the following encryption technologies is the MOST secure method and will authenticate devices to the network?() A.SSHB.WEPC.VPND.WPA

Users are unable to stay connected to the company‘s wireless network. Several times throughoutthe day the users‘ signals are dropped and they are forced to reconnect to the network.A technician determines the network cabling that supplies the WAP has been run inside with severalpower lines.Which of the following is the MOST likely cause of the network issue?()A.AshortB.Open pairsC.ESDD.EMI

You have a computer that runs Windows Vista. You create a virtual private network (VPN) connection between the computer and your company’s network.You notice that while the computer is connected through the VPN connection, users on the company network can access shared folders on the computer.You need to prevent network users from accessing your shared folders when you are connected to the company’s network by using the VPN connection.What should you do?()A.AB.BC.CD.D

A company wants to secure access to its internal wireless network. The company wants to use themost secure means to access the network. Which of the following is the BEST choice for wireless security in this situation?()A、WEP encryptionB、Channel rotationC、Disable SSIDD、WPA encryption

In which of the following scenarios would MAC filtering be MOST effective as a part of wireless security? ()A、A public place where guests are free to access the wireless network.B、A small office where a defined number of specific wireless devices are used.C、A meeting room where various company users will access the wireless network during meetings. D、An office where some users are unable to use WPA encryption due to older wireless cards so they use MAC filtering.

An administrator is concerned about users utilizing the company's wireless signal with their personal laptops. Which of the following is the BEST method to use to prevent unauthorized devices from using the company's wireless network?()A、Secure VPNB、MAC filteringC、IP filteringD、Static IP addresses

A company’s wireless network is called FOO and it is not publicly visible. In a wirelessconfiguration wizard, in which of the following locations should the technician put FOO?()A、SSIDB、WPA PassphraseC、WEP KeyD、Network Path

Users are unable to stay connected to the company's wireless network. Several times throughout the day the users' signals are dropped and they are forced to reconnect to the network. A technician determines the network cabling that supplies the WAP has been run inside with several power lines. Which of the following is the MOST likely cause of the network issue?()A、AshortB、Open pairsC、ESDD、EMI

A user states that the wireless router keeps rebooting while the power to the other equipment stays on. Which of the following should the technician perform to prevent users from rebooting the router?()A、Change the default administrator passwordB、Change the IP range of the wireless networkC、Hide the SSIDD、Disable WEP

A company needs strong wireless security enabled for minimal cost. Which of the following security measures is the BEST to use?()A、WEPB、Port filteringC、WPAD、Longer SSID broadcast intervals

An administrator is implementing a wireless network. Which of the following encryption technologies is the MOST secure method and will authenticate devices to the network?()A、SSHB、WEPC、VPND、WPA

You share your portable computer with a co-worker. You use separate user accounts to log on. A wireless network is available to you and your co-worker.  You need to prevent your co-worker from modifying your wireless network profile.  What should you do?()A、Disable the Connect even if the network is not broadcasting option.B、In the Network and Sharing Center window, click the Diagnose and repair option.C、Set the default wireless profile type to the Use all-users only profile (recommended) option. Recreate the wireless network.D、Set the default wireless profile type to the Use all-users and per-user profiles option. Recreate the wireless network by using the Save this network for me only option.

You need to design a Security strategy for the wireless network at all resort locations.What should you do?()A、Connect the wireless access points to a dedicated subnet. Allow the subnet direct access to the Internet,but not to the company network.Require company users to establish a VPN to access company resourcesB、Install Internet Authentication Service (IAS) on a domain controller.Configure the wireless access points to require IEEE 802.1x authenticationC、Establish IPSec policies on all company servers to request encryption from all computers that connect from the wireless IP networksD、Configure all wireless access points to require the Wired Equivalent Privacy (WEP) protocol for all connections. Use a Group Policy object (GPO) to distribute the WEP keys to all computers in the domain

All client computers on your company network run Windows 7 and are members of an Active Directory Domain Services domain. Employees using portable computers report that they get connected to a coffee shop wireless network from the company conference room. You need to ensure that the employees connect to the company wireless network by default from anywhere within the company premises. What should you do?()A、Configure the Network authentication (Shared mode) setting.B、Apply a Wireless Network Policy to set the network type to WPA-PSK.C、Apply a Wireless Network Policy to automatically connect to the company wireless network.D、Apply a Wireless Network Policy to set the company wireless network as the preferred network.

单选题A company’s wireless network is called FOO and it is not publicly visible. In a wirelessconfiguration wizard, in which of the following locations should the technician put FOO?()ASSIDBWPA PassphraseCWEP KeyDNetwork Path

单选题An administrator is concerned about users utilizing the company's wireless signal with their personal laptops. Which of the following is the BEST method to use to prevent unauthorized devices from using the company's wireless network?()ASecure VPNBMAC filteringCIP filteringDStatic IP addresses

单选题Which statement best describes the Cisco 2700 Location Appliance collection of location information for wireless devices?()Aall Wi-Fi devices on the WLAN send directly received signal strength indication (RSSI) information to the Cisco Wireless Location Appliance through SNMPBan AP collects RSSI information which is forwarded to wireless controllers through LWAPP. Wireless controllers forward aggregated RSSI to the location appliance through SNMPCthe APs collect received signal strength indication (RSSI) information from all Wi-Fi devices and forward the information to the Cisco Wireless Location Appliance through the LWAPPDthe Cisco WLAN controllers bypass the received signal strength indication (RSSI) information from all Wi-Fi devices to the Cisco Wireless Location Appliance through the LWAPP

单选题A user states that the wireless router keeps rebooting while the power to the other equipment stays on. Which of the following should the technician perform to prevent users from rebooting the router?()AChange the default administrator passwordBChange the IP range of the wireless networkCHide the SSIDDDisable WEP

单选题All client computers on your company network run Windows 7 and are members of an Active Directory Domain Services domain. Employees using portable computers report that they get connected to a coffee shop wireless network from the company conference room. You need to ensure that the employees connect to the company wireless network by default from anywhere within the company premises. What should you do?()AConfigure the Network authentication (Shared mode) setting.BApply a Wireless Network Policy to set the network type to WPA-PSK.CApply a Wireless Network Policy to automatically connect to the company wireless network.DApply a Wireless Network Policy to set the company wireless network as the preferred network.

单选题In which of the following scenarios would MAC filtering be MOST effective as a part of wireless security? ()AA public place where guests are free to access the wireless network.BA small office where a defined number of specific wireless devices are used.CA meeting room where various company users will access the wireless network during meetings. DAn office where some users are unable to use WPA encryption due to older wireless cards so they use MAC filtering.

单选题An administrator wants to limit access of a wireless network without requiring authorized users to enter a password or network key. Which of the following methods would MOST likely be implemented on the wireless network?()ADisable SSIDBWPACMAC filteringDRAS

单选题You need to design a Security strategy for the wireless network at all resort locations.What should you do?()AConnect the wireless access points to a dedicated subnet. Allow the subnet direct access to the Internet,but not to the company network.Require company users to establish a VPN to access company resourcesBInstall Internet Authentication Service (IAS) on a domain controller.Configure the wireless access points to require IEEE 802.1x authenticationCEstablish IPSec policies on all company servers to request encryption from all computers that connect from the wireless IP networksDConfigure all wireless access points to require the Wired Equivalent Privacy (WEP) protocol for all connections. Use a Group Policy object (GPO) to distribute the WEP keys to all computers in the domain

单选题Users are unable to stay connected to the company's wireless network. Several times throughout the day the users' signals are dropped and they are forced to reconnect to the network. A technician determines the network cabling that supplies the WAP has been run inside with several power lines. Which of the following is the MOST likely cause of the network issue?()AAshortBOpen pairsCESDDEMI

单选题An administrator is implementing a wireless network. Which of the following encryption technologies is the MOST secure method and will authenticate devices to the network?()ASSHBWEPCVPNDWPA

单选题A company needs strong wireless security enabled for minimal cost. Which of the following security measures is the BEST to use?()AWEPBPort filteringCWPADLonger SSID broadcast intervals

单选题A company wants to secure access to its internal wireless network. The company wants to use themost secure means to access the network. Which of the following is the BEST choice for wireless security in this situation?()AWEP encryptionBChannel rotationCDisable SSIDDWPA encryption

单选题An administrator is concerned about users utilizing the company's wireless signal with their personal laptops. Which of the following is the BEST method to use to prevent unauthorized devices from using the company's wireless network?()ASecure VPNBMAC filteringCIP filteringDStatic IP addresses