多选题For added security, a network administrator has decided to lock down the wireless network. Which of the following are ways to accomplish this? ()(Select TWO).ADisable all 802.11 trafficBDisable the SSID from broadcastingCDisable WPADEnable Bluetooth only communicationEChange the default admin passwordFDisable WEP

多选题
For added security, a network administrator has decided to lock down the wireless network. Which of the following are ways to accomplish this? ()(Select TWO).
A

Disable all 802.11 traffic

B

Disable the SSID from broadcasting

C

Disable WPA

D

Enable Bluetooth only communication

E

Change the default admin password

F

Disable WEP


参考解析

解析: 暂无解析

相关考题:

Mike, a technician, is replacing a wireless router on an existing small office home office (SOHO) network. The SSID, WPA and DHCP information has been correctly added. Which of the following must also be addressed?()A. The administrative password needs to be changed.B. The TKIP option needs to be enabled.C. The WEP key needs to be changed.D. Wireless access points need to be added.

When troubleshooting an 802.11g network. Which of the following can interfere with the network?() A. 2.4 GHz cordless phoneB. 900 MHz cordless phoneC. Bluetooth headsetD. Bluetooth printer

An administrator is implementing a wireless network. Which of the following encryption technologies is the MOST secure method and will authenticate devices to the network?() A.SSHB.WEPC.VPND.WPA

Which of the following wireless standards can be used to avoid the 2.4GHz range?() (Select TWO). A.802.11gB.802.1XC.802.11bD.802.1nE.802.11a

All of the following will interfere with a 2.4GHz wireless phone EXCEPT:() A.Bluetooth.B.802.11a.C.802.11b.D.802.11g.

Your network contains a wired network and a wireless network. Users report that they experience intermittent problems accessing network resources when they connect to the internal wireless network. You discover that an unsecured rogue wireless access point uses the same Service Set Identifier (SSID) as the internal wireless network. You need to ensure that the users only connect to the internal wireless network. What should you do?()A.Configure a Windows Connect Now Group Policy.B.Configure a Wireless Network (IEEE 802.11) Policy.C.Delete the rogue network from the Network and Sharing Center on each computer.D.Create a Connection Manager Administration Kit (CMAK) profile and deploy it to all users.

All users within an office are wirelessly connected to a network, except one user that has a valid connection on a leased IP address in a different range. Which of the following is a possible cause of the user having a different IP address range?()A、The wireless access point is using MAC address filteringB、The user has connected to a nearby wireless access point from another officeC、The user has configured the wireless settings with the wrong encryption typeD、The wireless access point has SSID broadcast disabled

Which of the following should be configured on a wireless router to enhance security? (Select TWO).()A、Disable DHCPB、Change wireless channelC、Disable SSID broadcastingD、Change the default username and passwordE、Use a static IP address

What are two ways with which a small business can keep a wireless business separate and secure from a wireless guest access network? () A、 auto-channel selectionB、 WMM QoSC、 802.11F roamingD、 multiple BSSIDsE、 802.1Q VLANsF、 AP detection

For added security, a network administrator has decided to lock down the wireless network. Which of the following are ways to accomplish this? ()(Select TWO).A、Disable all 802.11 trafficB、Disable the SSID from broadcastingC、Disable WPAD、Enable Bluetooth only communicationE、Change the default admin passwordF、Disable WEP

Mike, a technician, is replacing a wireless router on an existing small office home office (SOHO) network. The SSID, WPA and DHCP information has been correctly added. Which of the following must also be addressed?()A、The administrative password needs to be changed.B、The TKIP option needs to be enabled.C、The WEP key needs to be changed.D、Wireless access points need to be added.

A technician is working on a SOHO wireless network and notices that the wireless adaptor in the laptop shows excellent connection at 11Mbps. The technician has a wireless N adaptor. Which of the following would BEST describe this connection speed?()A、The laptop is too far away from the WAP.B、The WAP is using 802.11a frequencies.C、The laptop is only set to allow 802.11n connections.D、The technician is on an 802.11b network.

When troubleshooting an 802.11g network. Which of the following can interfere with the network?()A、2.4 GHz cordless phoneB、900 MHz cordless phoneC、Bluetooth headsetD、Bluetooth printer

An administrator is implementing a wireless network. Which of the following encryption technologies is the MOST secure method and will authenticate devices to the network?()A、SSHB、WEPC、VPND、WPA

A technician installed a new wireless access point on an existing small office home office (SOHO) network with a selective security option enabled. All wireless computers connect to the new network except one computer that cannot connect to the wireless network. Which of the following is the cause?()A、The network uses MAC filteringB、The network uses WEPC、The network uses SSID broadcastD、The network uses WPA

A system administrator has been asked to lock a specific login account. Which of the following commands is used to accomplish this?()A、pwdckB、usrckC、chuserD、rmuser

A new application has been added to a system which needs to automatically be started at system startup. The system administrator has decided to accomplish this by using the /etc/inittab file. Which command would be used to accomplish this in a supported manner?()A、viB、mkitabC、telinitD、startsrc

You have a computer that runs Windows XP Professional. The computer has an 802. 11g wireless network card. You have a wireless access point that is secured by using WiFi Protected Access (WPA). The service set identifier (SSID) of the wireless access point does not broadcast. You need to establish a wireless connection to the wireless access point. What should you do?() A、From the Device Manager, open the wireless network adapter properties and click Advanced. B、From the Device Manager, right-click the wireless network adapter and click Scan for hardware changes. C、From the Wireless Network Connection Properties, select View Wireless Networks. D、From the Wireless Network Connection Properties, click Change Advanced Settings. From the Wireless Networks tab, select Add a preferred network.

多选题For added security, a network administrator has decided to lock down the wireless network. Which of the following are ways to accomplish this? ()(Select TWO).ADisable all 802.11 trafficBDisable the SSID from broadcastingCDisable WPADEnable Bluetooth only communicationEChange the default admin passwordFDisable WEP

多选题What are two ways in which the Cisco Security Monitoring, Analysis, and Response System provides superior network protection? ()Areports financial losses from attacksBprovidessecutiy command and controlCprovides VPN connectivity to clientsDexpedites reporting of incidentsEmanage rogue wireless signals

单选题A technician installed a new wireless access point on an existing small office home office (SOHO) network with a selective security option enabled. All wireless computers connect to the new network except one computer that cannot connect to the wireless network. Which of the following is the cause?()AThe network uses MAC filteringBThe network uses WEPCThe network uses SSID broadcastDThe network uses WPA

多选题What are two ways with which a small business can keep a wireless business separate and secure from a wireless guest access network? ()Aauto-channel selectionBWMM QoSC802.11F roamingDmultiple BSSIDsE802.1Q VLANsFAP detection

单选题A technician is working on a SOHO wireless network and notices that the wireless adaptor in the laptop shows excellent connection at 11Mbps. The technician has a wireless N adaptor. Which of the following would BEST describe this connection speed?()AThe laptop is too far away from the WAP.BThe WAP is using 802.11a frequencies.CThe laptop is only set to allow 802.11n connections.DThe technician is on an 802.11b network.

单选题An administrator wants to limit access of a wireless network without requiring authorized users to enter a password or network key. Which of the following methods would MOST likely be implemented on the wireless network?()ADisable SSIDBWPACMAC filteringDRAS

单选题All users within an office are wirelessly connected to a network, except one user that has a valid connection on a leased IP address in a different range. Which of the following is a possible cause of the user having a different IP address range?()AThe wireless access point is using MAC address filteringBThe user has connected to a nearby wireless access point from another officeCThe user has configured the wireless settings with the wrong encryption typeDThe wireless access point has SSID broadcast disabled

多选题Which of the following should be configured on a wireless router to enhance security? (Select TWO).()ADisable DHCPBChange wireless channelCDisable SSID broadcastingDChange the default username and passwordEUse a static IP address

多选题Which of the following wireless standards can be used to avoid the 2.4GHz range?() (Select TWO).A802.11gB802.1XC802.11bD802.1nE802.11a

单选题Mike, a technician, is replacing a wireless router on an existing small office home office (SOHO) network. The SSID, WPA and DHCP information has been correctly added. Which of the following must also be addressed?()AThe administrative password needs to be changed.BThe TKIP option needs to be enabled.CThe WEP key needs to be changed.DWireless access points need to be added.