单选题Which of the following protocols is the LEAST secure and should be avoided on a wireless network?()AWEPBPEAPCWPADTKIP
单选题
Which of the following protocols is the LEAST secure and should be avoided on a wireless network?()
A
WEP
B
PEAP
C
WPA
D
TKIP
参考解析
解析:
暂无解析
相关考题:
Which of the following standards or encryption types is the MOST secure for wireless networking?() A.WEPB.AESC.TKIPD.DES
A company needs strong wireless security enabled for minimal cost. Which of the following security measures is the BEST to use?() A. WEPB. Port filteringC. WPAD. Longer SSID broadcast intervals
Which of the following should be used to restrict access to a wireless network?() A. Port forwardingB. Enable SSID broadcastC. Wireless encryptionD. Enable DMZ
A company wants to secure access to its internal wireless network. The company wants to use themost secure means to access the network. Which of the following is the BEST choice for wireless security in this situation?()A. WEP encryptionB. Channel rotationC. Disable SSIDD. WPA encryption
An administrator is implementing a wireless network. Which of the following encryption technologies is the MOST secure method and will authenticate devices to the network?() A.SSHB.WEPC.VPND.WPA
Which of the following protocols is the LEAST secure and should be avoided on a wireless network?() A.WEPB.PEAPC.WPAD.TKIP
Which of the following protocols should be used to monitor network performance?() A.SNTPB.SMTPC.HTTPD.SNMP
A network technician is installing a small wireless network. A requirement is that individual users must authenticate using usernames and passwords.Which of the following technologies would support users authenticating with encrypted usernames and passwords?()A.WPA TLSB.WPA PEAPC.64-bit WEPD.128-bit WEP
Which of the following should be used to restrict access to a wireless network?()A、Port forwardingB、Enable SSID broadcastC、Wireless encryptionD、Enable DMZ
A company wants to secure access to its internal wireless network. The company wants to use themost secure means to access the network. Which of the following is the BEST choice for wireless security in this situation?()A、WEP encryptionB、Channel rotationC、Disable SSIDD、WPA encryption
Which of the following standards or encryption types is the MOST secure for wireless networking?()A、WEPB、AESC、TKIPD、DES
Which of the following protocols is the LEAST secure and should be avoided on a wireless network?()A、WEPB、PEAPC、WPAD、TKIP
For added security, a network administrator has decided to lock down the wireless network. Which of the following are ways to accomplish this? ()(Select TWO).A、Disable all 802.11 trafficB、Disable the SSID from broadcastingC、Disable WPAD、Enable Bluetooth only communicationE、Change the default admin passwordF、Disable WEP
A network technician is installing a small wireless network. A requirement is that individual users must authenticate using usernames and passwords. Which of the following technologies would support users authenticating with encrypted usernames and passwords?()A、WPA TLSB、WPA PEAPC、64-bit WEPD、128-bit WEP
A company needs strong wireless security enabled for minimal cost. Which of the following security measures is the BEST to use?()A、WEPB、Port filteringC、WPAD、Longer SSID broadcast intervals
Which of the following protocols should be used to monitor network performance?()A、SNTPB、SMTPC、HTTPD、SNMP
An administrator is implementing a wireless network. Which of the following encryption technologies is the MOST secure method and will authenticate devices to the network?()A、SSHB、WEPC、VPND、WPA
Which of the following commands should be used to report statistics on network protocols used by the system?()A、 lsattrB、 pstatC、 netstatD、 ifconfig
单选题Which of the following protocols should be used to monitor network performance?()ASNTPBSMTPCHTTPDSNMP
单选题Which of the following protocols is the LEAST secure and should be avoided on a wireless network?()AWEPBPEAPCWPADTKIP
单选题Which of the following should be used to restrict access to a wireless network?()APort forwardingBEnable SSID broadcastCWireless encryptionDEnable DMZ
单选题A new department is formed and a new section of the building is being built out for them. All 50 new employees will need access to the wireless network. Which of the following should be completed to allow these new employees access to the wireless network?()AFrequency settings should be changedBAdditional WAPs should be installedCChannels should be changedDVLANs should be added
单选题An administrator is implementing a wireless network. Which of the following encryption technologies is the MOST secure method and will authenticate devices to the network?()ASSHBWEPCVPNDWPA
单选题A company wants to secure access to its internal wireless network. The company wants to use themost secure means to access the network. Which of the following is the BEST choice for wireless security in this situation?()AWEP encryptionBChannel rotationCDisable SSIDDWPA encryption
单选题A network technician is installing a small wireless network. A requirement is that individual users must authenticate using usernames and passwords. Which of the following technologies would support users authenticating with encrypted usernames and passwords?()AWPA TLSBWPA PEAPC64-bit WEPD128-bit WEP
单选题Which of the following commands should be used to report statistics on network protocols used by the system?()A lsattrB pstatC netstatD ifconfig