A company wants to secure access to its internal wireless network. The company wants to use themost secure means to access the network. Which of the following is the BEST choice for wireless security in this situation?()A、WEP encryptionB、Channel rotationC、Disable SSIDD、WPA encryption

A company wants to secure access to its internal wireless network. The company wants to use themost secure means to access the network. Which of the following is the BEST choice for wireless security in this situation?()

  • A、WEP encryption
  • B、Channel rotation
  • C、Disable SSID
  • D、WPA encryption

相关考题:

A customer is trying to determine which client to deploy. The customer wants to be able to perform Layer 2 authentication as well as connect to the Junos Pulse Secure Access Service.Which client should the customer deploy?()A. Windows native supplicantB. Odyssey Access ClientC. Junos PulseD. Network Connect

Which three types of policies must you configure to allow remote users transparent access to protected resources using IF-MAP Federation between a Junos Pulse Secure Access Service and a Junos Pulse Access Control Service?()A. Session-Export policies on the Junos Pulse Secure Access ServiceB. Session-Export policies on the Junos Pulse Access Control ServiceC. Session-Import policies on the Junos Pulse Secure Access ServiceD. Session-Import policies on the Junos Pulse Access Control ServiceE. Resource access policies on the Junos Pulse Access Control Service

A company wants to secure access to its internal wireless network. The company wants to use themost secure means to access the network. Which of the following is the BEST choice for wireless security in this situation?()A. WEP encryptionB. Channel rotationC. Disable SSIDD. WPA encryption

The Schuyler and Livingston Iron Works has been working on getting its network security under control. It has set up VPN with IPSec links to its suppliers. It has installed network vulnerability scanners to proactively identify areas of weakness, and it monitors and responds to security events as they occur. It also employs extensive access control lists, stateful firewall implementations, and dedicated firewall appliances. The company has been growing very fast lately and wants to make sure it is up to date on security measures.Which two areas of security would you advise the company to strengthen? ()A. intrusion protectionB. identityC. secure connectivityD. security management

The company wants to evaluate making all business office users administrators on their client computers. You need to design a method to ensure that this change can be made in a manner that meets business and security requirements. What should you do?()A、On all domain controllers, implement registry access auditing for all registry keys that are considered sensitive by the company’s written security policyB、On all client computers, implement logon auditing for all user account logonsC、On all client computers, configure registry access auditing for all registry keys that are considered sensitive by the company’s written security policyD、On all domain controllers, implement logon auditing for all user account logons

You work as a network technician at Company. Your boss, Ms., is interested  LWAPP (Lightweight Access Point Protocol). In particular she wants to know which type of  activities this protocol defines.  What should you tell her? ()A、 Layer 3 addressing and distributionB、 SNMP monitoring servicesC、 Access point certification and software controlD、 Packet encapsulation, fragmentation, and formattingE、 Compression and Layer 3 address mappingF、 User behaviors

The Schuyler and Livingston Iron Works has been working on getting its network security undercontrol. It has set up VPN with IPSec links to its suppliers. It has installed network vulnerabilityscanners to proactively identify areas of weakness, and it monitors and responds to securityevents as they occur. It also employs extensive access control lists, stateful firewall implementations, and dedicated firewall appliances. The company has been growing very fastlately and wants to make sure it is up to date on security measures. Which two areas of securitywould you advise the company to strengthen? ()A、 intrusion protectionB、 identityC、 secure connectivityD、 security management

In the Company wireless LAN,  what is the function of the Service Set Identifier (SSID)?()A、 The SSID must match on both the Company client and the Company access point and provides  MAC Address Authentication to authenticate the client to the access point.B、 The SSID should be configured on the Company client site only and provides data-privacy  functions and authentication to the access point.C、 The SSID must match on both the Company client and the Company access point and provides encryption keys for authentication to the access point.D、 The SSID must match on both the Company client and the Company access point. The SSID is  advertised in plain-text in the access point beacon messages.  E、 None of the other alternatives apply

Which can be done to secure the virtual terminal interfaces on a router?()A、Administratively shut down the interfaces.B、Physically secure the interfaces.C、Configure a virtual terminal password and login process.D、Enter an access list and apply it to the terminal interfaces using the access-class command.E、Create an access list and apply it to the terminal interfaces using the access-group command

Which can be done to secure the virtual terminal interfaces on a router?()A、Administratively shut down the interfaces.B、Physically secure the interfaces.C、Configure a virtual terminal password and login process.D、Enter an access list and apply it to the terminal interfaces using the access-class command.E、Create an access list and apply it to the terminal interfaces using the access-group command.

The Schuyler and Livingston Iron Works has been working on getting its network security under control. It has set up VPN with IPSec links to its suppliers. It has installed network vulnerability scanners to proactively identify areas of weakness, and it monitors and responds to security events as they occur. It also employs extensive access control lists, stateful firewall implementations, and dedicated firewall appliances. The company has been growing very fast lately and wants to make sure it is up to date on security measures.Which two areas of security would you advise the company to strengthen? ()A、intrusion protectionB、identityC、secure connectivityD、security management

Which benefit does digital subscriber line (DSL) systems for broadband access provide to the user?()A、Secure access to company extranetB、Dedicated lines for high security data transferC、Simple solution for high-quality digital video using coaxial cableD、Data and audio signals that share the same communications infrastructure

What is the primary use of a remote access VPN?()A、to secure communication between two remote PCsB、to secure communication between two remote officesC、to secure communication betweenan remote PC and the corporate intranetD、to secure communication between a corporate intranet and the public internet

A customer wants to have employees work from remote locations as well as in the office.  All communications must be secure and files must be protected from access by unauthorized people.  The employee’s applications (database inserts and reads) are only accessed with a web browser.  Which of the following capabilities is necessary?()A、SSLB、PGPC、File encryption programD、Public key encryption

Your company has deployed Network Access Protection (NAP).You configure secure wireless access to the network by using 802.1X authentication from any access point. You need to ensure that all client computers that access the network are evaluated by NAP.  What should you do?()A、Configure all access points as RADIUS clients to the Remediation Servers.B、Configure all access points as RADIUS clients to the Network Policy Server (NPS).C、Create a Network Policy that defines Remote Access Server as a network connection method.D、Create a Network Policy that specifies EAP-TLS as the only available authentication method.

Your company has deployed Network Access Protection (NAP). You configure secure wireless access to the network by using 802.1x authentication from any access point. You need to ensure that all client computers that access the network are evaluated by NAP.  what should you do()? A、Configure all access points as RADIUS clients to the Remediation ServersB、Configure all access points as RADIUS clients to the Network Policy Server (NPS)C、Create a Network Policy that defines Remote Access Server as a network connection methodD、Create a Network Policy that specifies EAP-TLS as the only availible authentication method.

单选题In the Company wireless LAN,  what is the function of the Service Set Identifier (SSID)?()A The SSID must match on both the Company client and the Company access point and provides  MAC Address Authentication to authenticate the client to the access point.B The SSID should be configured on the Company client site only and provides data-privacy  functions and authentication to the access point.C The SSID must match on both the Company client and the Company access point and provides encryption keys for authentication to the access point.D The SSID must match on both the Company client and the Company access point. The SSID is  advertised in plain-text in the access point beacon messages.  E None of the other alternatives apply

单选题You have a Junos Pulse Secure Access Service acting as an IF-MAP client, configured to federate all user roles to a Junos Pulse Access Control Service acting as an IF-MAP Federation server. A remote user using Junos Pulse logs in to the Junos Pulse Secure Access Service; the Junos Pulse Secure Access Service provisions a remote access session for that user.What happens next?()AThe Junos Pulse Secure Access Service redirects the user to the Junos Pulse Secure Access Service for authenticationBThe Junos Pulse Access Control Service provisions enforcement points to enable resource access for that user.CThe Junos Pulse Secure Access Service publishes user session and role information to the IF- MAP Federation server,DThe Junos Pulse Secure Access Service provisions enforcement points to enable resource access for that user.

单选题A company wants to secure access to its internal wireless network. The company wants to use themost secure means to access the network. Which of the following is the BEST choice for wireless security in this situation?()AWEP encryptionBChannel rotationCDisable SSIDDWPA encryption

多选题Which three types of policies must you configure to allow remote users transparent access to protected resources using IF-MAP Federation between a Junos Pulse Secure Access Service and a Junos Pulse Access Control Service?()ASession-Export policies on the Junos Pulse Secure Access ServiceBSession-Export policies on the Junos Pulse Access Control ServiceCSession-Import policies on the Junos Pulse Secure Access ServiceDSession-Import policies on the Junos Pulse Access Control ServiceEResource access policies on the Junos Pulse Access Control Service

多选题What are two use cases enabled by IF-MAP Federation?()AUsers authenticated to one Junos Pulse Access Control Service can transparently access resources protected by another Junos Pulse Access Control Service.BUsers authenticated to a Junos Pulse Access Control Service can transparently access resources protected by a Junos Pulse Secure Access Service.CRemote access users authenticated to a Junos Pulse Secure Access Service can transparently access resources protected by a Junos Pulse Access Control Service.DRemote access users authenticated to one Junos Pulse Secure Access Service can transparently access resources protected by another Junos Pulse Secure Access Service.

多选题Your IT director has decided to allow employees to use their laptops at home as well as in the office. You have deployed the Junos Pulse client to allow access to the offices 802.1X-enabled wired network. Your company also has the Junos Pulse Secure Access Service deployed. You want the Junos Pulse client to automatically launch the appropriate access method depending on each users location. Which three are supported to determine the users location?()AMAC addressBDNS serverCDHCP serverDresolve addressEendpoint address

单选题You work in a company which is named Wiikigo Corp. The company uses SQL Server 2008. You are the administrator of the company database. Now you are in charge of a SQL Server 2008 instance. Now your company CIO assigns a task to you. The company CIO wants you to configure FILESTREAM data and the two requirements below must be met: you must enable FILESTREAM for file I/O streaming access; remote client computers must be able to have streaming access to FILESTREAM data. You must make sure that FILESTREAM data is enabled. Which service should you configure? ()AYou should configure SQL Server VSS Writer BYou should configure Distributed File System CYou should configure SQL Server DYou should configure SQL Server Full Text

单选题A customer is trying to determine which client to deploy. The customer wants to be able to perform Layer 2 authentication as well as connect to the Junos Pulse Secure Access Service.Which client should the customer deploy?()AWindows native supplicantBOdyssey Access ClientCJunos PulseDNetwork Connect

单选题You work in a company which uses SQL Server 2008. You are the administrator of the company database. Now you are in charge of a SQL Server 2008 instance. For some reason, now the company wants to view the number of users who access the SQL Server instance. The company CIO assigns this task to you. You have to use Windows System Monitor to find out the concrete number. Which performance object should you capture?()ASQLServer:Buffer Manager BSQLServer:Access Methods CSQLServer:General Statistics DSQLServer:Exec Statistics