多选题Which two practices help secure the configuration utilities on wireless access points from unauthorized access? (Choose two.)()Aassigning a private IP address to the APBchanging the default SSID valueCconfiguring a new administrator passwordDchanging the mixed mode setting to single modeEconfiguring traffic filtering

多选题
Which two practices help secure the configuration utilities on wireless access points from unauthorized access? (Choose two.)()
A

assigning a private IP address to the AP

B

changing the default SSID value

C

configuring a new administrator password

D

changing the mixed mode setting to single mode

E

configuring traffic filtering


参考解析

解析: 暂无解析

相关考题:

49Since our chief business with them is to enable them to share in a common life we cannot help considering whether or no we are forming the powers which will secure this ability.

A customer wants to create a custom Junos Pulse configuration. Which two are required?() A. Connection setB. Configuration setC. Custom installerD. Component set

Which of the following describes a secure connection over the Internet between two sites?() A. FTPB. VLANC. VPND. HTTP

The enable secret command is used to secure access to which CLI mode?() A.user EXEC modeB.global configuration modeC.privileged EXEC modeD.auxiliary setup mode

What are two characteristics of the SDM Security Audit wizard?()A、displays a screen with Fix-it check boxes to let you choose which potential security-related configuration changes to implementB、has two modes of operationinteractive and non-interactiveC、automatically enables Cisco IOS firewall and Cisco IOS IPS to secure the routerD、uses interactive dialogs and prompts to implement role-based CLIE、requires users to first identify which router interfaces connect to the inside network and which connectto the outside network

Which two practices help secure the configuration utilities on wireless access points from unauthorized access? (Choose two.)()A、assigning a private IP address to the APB、changing the default SSID valueC、configuring a new administrator passwordD、changing the mixed mode setting to single modeE、configuring traffic filtering

Which two functions does Cisco Configuration Assistant provide?()A、wireless connectivityB、call routing configurationC、device discoveryD、call forwardingE、command line configuration

Which of the following is the correct configuration for a RAID 5 array?()A、A two disk set with one data stripB、A three disk set with two data strips and a parity stripC、A two disk set with two data stripsD、A four disk set with two sets of data strips

Which two configuration elements are required for a policy-based VPN?()A、IKE gatewayB、secure tunnel interfaceC、security policy to permit the IKE trafficD、security policy referencing the IPsec VPN tunnel

What are two benefits of the Cisco 1800 Series Integrated Services Routers?()A、 fixed configuration for secure broadband, metro Ethernet, and wireless connectivityB、 configuration for security policy monitoringC、 dynamic management through self-healing processesD、 connectivity options and investment protection through support for existing Cisco 1700 SeriesWICs

Which two statements are true about the configuration of voice VLANs?()A、Static secure MAC addresses can be configured in conjunction with voice VLANs.B、PortFast is automatically enabled when voice VLANs are configured.C、PortFast must be manually configured when voice VLANs are configured.D、Voice VLANs are typically configured on uplink ports.E、Voice VLANs are typically configured on access ports.

Which two statements about the Cisco AutoSecure feature are true?()A、All passwords entered during the AutoSecure configuration must be a minimum of 8 characters in length.B、Cisco123 would be a valid password for both the enable password and the enable secret commands.C、The auto secure command can be used to secure the router login as well as the NTP and SSH protocols.D、For an interactive full session of AutoSecure, the auto secure login command should be used.E、If the SSH server was configured, the 1024 bit RSA keys are generated after the auto secure commandis enabled.

Which firewall best practices can help mitigate worm and other automated attacks?()A、Segment security zonesB、Restrict access to firewallsC、Use logs and alertsD、Set connection limits

Which of the following should be changed to secure access to a WAPs configuration management interface?()A、SSIDB、WPA2C、DHCPD、Password

How would an end user add both a Junos Pulse Access Control Service URL and a Junos Pulse Secure Access Service URL to the same Junos Pulse client?()A、By adding two separate connections in the connections dialog boxB、By adding two separate intranet Controllers under the configuration hierarchyC、By adding one intranet Controller and one SA under the configuration hierarchyD、By adding two URLs under a connection in the connections dialog box

Which two configuration elements are required for a route-based VPN?()A、secure tunnel interfaceB、security policy to permit the IKE trafficC、a route for the tunneled transit trafficD、tunnel policy for transit traffic referencing the IPsec VPN

多选题Which two secure remote access methods are available on the WX platforms?() (Choose two.)ASSLBSSHCTelnetDHTTP

多选题Which two functions does Cisco Configuration Assistant provide?()Awireless connectivityBcall routing configurationCdevice discoveryDcall forwardingEcommand line configuration

单选题The enable secret command is used to secure access to which CLI mode?()Auser EXEC modeBglobal configuration modeCprivileged EXEC modeDauxiliary setup mode

多选题Which two statements about the Cisco AutoSecure feature are true?()AAll passwords entered during the AutoSecure configuration must be a minimum of 8 characters in length.BCisco123 would be a valid password for both the enable password and the enable secret commands.CThe auto secure command can be used to secure the router login as well as the NTP and SSH protocols.DFor an interactive full session of AutoSecure, the auto secure login command should be used.EIf the SSH server was configured, the 1024 bit RSA keys are generated after the auto secure commandis enabled.

多选题Which two statements are true when using the configure exclusive CLI command?()AMultiple users can enter configuration mode and have their own private configuration.BWhen a user commits, only the user's changes are committed.CA message indicates which other users are in configuration mode and what portion of the configuration they are editing.DOnly a single user can edit the configuration.

单选题How would an end user add both a Junos Pulse Access Control Service URL and a Junos Pulse Secure Access Service URL to the same Junos Pulse client?()ABy adding two separate connections in the connections dialog boxBBy adding two separate intranet Controllers under the configuration hierarchyCBy adding one intranet Controller and one SA under the configuration hierarchyDBy adding two URLs under a connection in the connections dialog box

单选题Which of the following describes a secure connection over the Internet between two sites?()AFTPBVLANCVPNDHTTP

单选题Quality planning tools are often used to help plan effective quality management activities . ()is one of such tools, which involves company actual or planned project practices to those or other projects to generate ideas for improvement and to provide a basis by which to measure performance.ABenchmarkingBQuality metricCQuality checklistDBrainstornung

单选题Quality planning tools are often used to help plan effective quality management activities.( ) is one of such tools,which involves company actual or planned project practices to those or other projects to generate ideas for improvementand to provide a basis by which to measure performance.ABenchmarkingBQuality metricCQuality checklistDBrainstorming

多选题Which two actions protect a resource file from direct HTTP access within a web application?()APlacing it in the /secure directoryBPlacing it in the /WEB-INF directoryCPlacing it in the /META-INF/secure directoryDCreating a  element within the deployment descriptor

多选题What are two characteristics of the SDM Security Audit wizard?()Adisplays a screen with Fix-it check boxes to let you choose which potential security-related configuration changes to implementBhas two modes of operationinteractive and non-interactiveCautomatically enables Cisco IOS firewall and Cisco IOS IPS to secure the routerDuses interactive dialogs and prompts to implement role-based CLIErequires users to first identify which router interfaces connect to the inside network and which connectto the outside network