A company has implemented a wireless network for its employees. Since implementing the newnetwork, individuals have been receiving duplicate IP addresses causing network issues. Which of the following would resolve this issue? ()A、 Add another wireless access point.B、 Add another DHCP server.C、 Disable the wireless DHCP server.D、 Change the default gateway of the wireless router.
A company has implemented a wireless network for its employees. Since implementing the newnetwork, individuals have been receiving duplicate IP addresses causing network issues. Which of the following would resolve this issue? ()
- A、 Add another wireless access point.
- B、 Add another DHCP server.
- C、 Disable the wireless DHCP server.
- D、 Change the default gateway of the wireless router.
相关考题:
A company wants to secure access to its internal wireless network. The company wants to use themost secure means to access the network. Which of the following is the BEST choice for wireless security in this situation?()A. WEP encryptionB. Channel rotationC. Disable SSIDD. WPA encryption
An administrator wants to limit access of a wireless network without requiring authorized users toenter a password or network key.Which of the following methods would MOST likely be implemented on the wireless network?()A. Disable SSIDB. WPAC. MAC filteringD. RAS
An administrator is implementing a wireless network. Which of the following encryption technologies is the MOST secure method and will authenticate devices to the network?() A.SSHB.WEPC.VPND.WPA
Users are unable to stay connected to the company‘s wireless network. Several times throughoutthe day the users‘ signals are dropped and they are forced to reconnect to the network.A technician determines the network cabling that supplies the WAP has been run inside with severalpower lines.Which of the following is the MOST likely cause of the network issue?()A.AshortB.Open pairsC.ESDD.EMI
Router R1 exists in an Enterprise that uses EIGRP as its routing protocol. The show ip route command output on router R1 lists the following phrase: Gateway of last resort is 1.1.1.1 to network 2.0.0.0.Whic h of the following is most likely to have caused this output to occur on R1?()A. R1 has been configured with an ip default- network 2.0.0.0 command.B. R1 has been configured with an ip route 0.0.0.0 0.0.0.0 1.1.1.1 command.C. R1 has been configured with an ip route 2.0.0.0 255.0.0.0 1.1.1.1 command.D. Another router has been configured with an ip default - network 2.0.0.0 command.E. Another router has been configured with an ip route 2.0.0.0 255.0.0.0 1.1.1.1 command.
Your customer has deployed a Cisco Wireless Location Appliance within its warehouseenvironment. However, employees there have been experiencing problems when tracking objects using activeRFID tags.The RFID tag data is not being collected. On which device would you verify that RFIDs have been enabled?()A、access pointB、location managerC、wireless controllerD、Cisco WCS
A new building has been added to the enterprise campus network, providing client access for desktop PCs, laptops, and IP phones for employees and guests. During verification, only a few laptops using wireless are reported to have problems, while other desktops, IP phones, and most other wireless laptops are fully operational. Additional information received about the problem indicates that, while the problematic wireless laptops cannot reach internal corporate websites, they can reach the Internet. Where should troubleshooting about this connectivity issue be focused?()A、client network configurationB、VLAN mappingC、routing protocolsD、first-hop redundancy protocol
After a technician replaces a laptop display, the technician now notices that the wireless no longer works. Which of the following would be the MOST likely cause?()A、The wireless switch was damaged during the display installation.B、The network card has failed.C、The new display is interfering with the wireless signal.D、The antenna connector was not reconnected.
A company wants to secure access to its internal wireless network. The company wants to use themost secure means to access the network. Which of the following is the BEST choice for wireless security in this situation?()A、WEP encryptionB、Channel rotationC、Disable SSIDD、WPA encryption
In which of the following scenarios would MAC filtering be MOST effective as a part of wireless security? ()A、A public place where guests are free to access the wireless network.B、A small office where a defined number of specific wireless devices are used.C、A meeting room where various company users will access the wireless network during meetings. D、An office where some users are unable to use WPA encryption due to older wireless cards so they use MAC filtering.
An administrator is concerned about users utilizing the company's wireless signal with their personal laptops. Which of the following is the BEST method to use to prevent unauthorized devices from using the company's wireless network?()A、Secure VPNB、MAC filteringC、IP filteringD、Static IP addresses
An administrator wants to limit access of a wireless network without requiring authorized users to enter a password or network key. Which of the following methods would MOST likely be implemented on the wireless network?()A、Disable SSIDB、WPAC、MAC filteringD、RAS
All users within an office are wirelessly connected to a network, except one user that has a valid connection on a leased IP address in a different range. Which of the following is a possible cause of the user having a different IP address range?()A、The wireless access point is using MAC address filteringB、The user has connected to a nearby wireless access point from another officeC、The user has configured the wireless settings with the wrong encryption typeD、The wireless access point has SSID broadcast disabled
Users are unable to stay connected to the company's wireless network. Several times throughout the day the users' signals are dropped and they are forced to reconnect to the network. A technician determines the network cabling that supplies the WAP has been run inside with several power lines. Which of the following is the MOST likely cause of the network issue?()A、AshortB、Open pairsC、ESDD、EMI
Several remote sales employees, who have come into the office this week, report that they are unable to get on the Internet, but no other users have reported similar issues. The help desk hasescalated the issue and the case notes state that the users have IP addresses that begin with 169. Which of the following should the system administrator check FIRST?()A、DHCP serverB、Network switchesC、DNS serverD、Core router
A network technician is troubleshooting a network issue that has just been reported. Which of thefollowing troubleshooting steps should the technician take FIRST to help resolve this issue?()A、Record the solution in the appropriate logs for future use.B、Ask the user who reported the issue what past documentation they have.C、Ask the user who reported the issue to explain the symptoms in detail.D、Record what steps should be taken to resolve the issue.
Which of the following would need to be implemented on a wireless router to allow network accessbased on a passphrase that the administrator would supply?()A、WPA-PSK encryptionB、SSID broadcastC、Port forwardingD、MAC filtering
A company has implemented a wireless network for its employees. Since implementing the new network, individuals have been receiving duplicate IP addresses causing network issues. Which of the following would resolve this issue?()A、Add another wireless access point.B、Add another DHCP server.C、Disable the wireless DHCP server.D、Change the default gateway of the wireless router
An administrator is implementing a wireless network. Which of the following encryption technologies is the MOST secure method and will authenticate devices to the network?()A、SSHB、WEPC、VPND、WPA
You have a computer that runs Windows XP Professional. The computer has an 802. 11g wireless network card. You have a wireless access point that is secured by using WiFi Protected Access (WPA). The service set identifier (SSID) of the wireless access point does not broadcast. You need to establish a wireless connection to the wireless access point. What should you do?() A、From the Device Manager, open the wireless network adapter properties and click Advanced. B、From the Device Manager, right-click the wireless network adapter and click Scan for hardware changes. C、From the Wireless Network Connection Properties, select View Wireless Networks. D、From the Wireless Network Connection Properties, click Change Advanced Settings. From the Wireless Networks tab, select Add a preferred network.
All client computers on your company network run Windows 7 and are members of an Active Directory Domain Services domain. Employees using portable computers report that they get connected to a coffee shop wireless network from the company conference room. You need to ensure that the employees connect to the company wireless network by default from anywhere within the company premises. What should you do?()A、Configure the Network authentication (Shared mode) setting.B、Apply a Wireless Network Policy to set the network type to WPA-PSK.C、Apply a Wireless Network Policy to automatically connect to the company wireless network.D、Apply a Wireless Network Policy to set the company wireless network as the preferred network.
单选题A company has implemented a wireless network for its employees. Since implementing the newnetwork, individuals have been receiving duplicate IP addresses causing network issues. Which of the following would resolve this issue? ()A Add another wireless access point.B Add another DHCP server.C Disable the wireless DHCP server.D Change the default gateway of the wireless router.
单选题An administrator is concerned about users utilizing the company's wireless signal with their personal laptops. Which of the following is the BEST method to use to prevent unauthorized devices from using the company's wireless network?()ASecure VPNBMAC filteringCIP filteringDStatic IP addresses
单选题In which of the following scenarios would MAC filtering be MOST effective as a part of wireless security? ()AA public place where guests are free to access the wireless network.BA small office where a defined number of specific wireless devices are used.CA meeting room where various company users will access the wireless network during meetings. DAn office where some users are unable to use WPA encryption due to older wireless cards so they use MAC filtering.
单选题All users within an office are wirelessly connected to a network, except one user that has a valid connection on a leased IP address in a different range. Which of the following is a possible cause of the user having a different IP address range?()AThe wireless access point is using MAC address filteringBThe user has connected to a nearby wireless access point from another officeCThe user has configured the wireless settings with the wrong encryption typeDThe wireless access point has SSID broadcast disabled
单选题A company has implemented a wireless network for its employees. Since implementing the new network, individuals have been receiving duplicate IP addresses causing network issues. Which of the following would resolve this issue?()AAdd another wireless access point.BAdd another DHCP server.CDisable the wireless DHCP server.DChange the default gateway of the wireless router
单选题An administrator receives reports from users in an office that their 802.11g wireless connectivity has been problematic since the installation of the new wireless phone system. At which of the following frequencies are both systems operating at to cause this issue?()A2.4GHzB900MHzC1.1GHzD5GHz