单选题Which of the following wireless security techniques is the MOST secure?()AEnable Wired Equivalent PrivacyBDisable SSID broadcastCEnable Wi-Fi Protected AccessDEnable MAC filtering

单选题
Which of the following wireless security techniques is the MOST secure?()
A

Enable Wired Equivalent Privacy

B

Disable SSID broadcast

C

Enable Wi-Fi Protected Access

D

Enable MAC filtering


参考解析

解析: 暂无解析

相关考题:

Which of the following offers the HIGHEST wireless security?() A. WEPB. WPA2C. WPAD. HTTPS

A company needs strong wireless security enabled for minimal cost. Which of the following security measures is the BEST to use?() A. WEPB. Port filteringC. WPAD. Longer SSID broadcast intervals

A company wants to secure access to its internal wireless network. The company wants to use themost secure means to access the network. Which of the following is the BEST choice for wireless security in this situation?()A. WEP encryptionB. Channel rotationC. Disable SSIDD. WPA encryption

Which of the following improves wireless performance by allowing only one wireless transmissionon the network at a time?() A. CSMA/CAB. CSMA/CDC. Wireless encryptionD. Wireless bonding

Which of the following security mitigation techniques is the MOST effective against zero-day attacks?() A.Update antivirus definitionsB.MAC filteringC.Effective security policiesD.User awareness training

Which of the following is NOT true of security attacks?[A] Employees will keep up with security polices and awareness if they are highly-trained.[B] The rate of security attacks appears faster than the growth of the Internet.[C] One's computer system will never be secure.[D] Vulnerabilities can go through phones, wireless devices, and network appliances

Which of the following should be used to restrict access to a wireless network?()A、Port forwardingB、Enable SSID broadcastC、Wireless encryptionD、Enable DMZ

Which of the following wireless service components occur in the implement phase?()A、project kickoff,staging,systems acceptance testing,ongoing support handoff meetingB、wlan change management,security administration,technology assessment,operations planC、security assessment,operations assessment,supplier managementD、operations readiness assessment,systems requirements validation,planning project kickoff,service assurance

In which of the following scenarios would MAC filtering be MOST effective as a part of wireless security? ()A、A public place where guests are free to access the wireless network.B、A small office where a defined number of specific wireless devices are used.C、A meeting room where various company users will access the wireless network during meetings. D、An office where some users are unable to use WPA encryption due to older wireless cards so they use MAC filtering.

Which of the following should be configured on a wireless router to enhance security? (Select TWO).()A、Disable DHCPB、Change wireless channelC、Disable SSID broadcastingD、Change the default username and passwordE、Use a static IP address

In which areas do SMBs tend to require better products than found in retail stores?()A、voice, intranet, and securityB、wireless, intranet, and wide-area networkingC、wireless, security, and voiceD、security, voice, and wide-area networking

Which is NOT part of a typical wireless site survey?()A、Implementation suggestionsB、Access point locationsC、Security requirementsD、Access point mounting methods

Which of the following offers the HIGHEST wireless security?()A、WEPB、WPA2C、WPAD、HTTPS

Which of the following improves wireless performance by allowing only one wireless transmissionon the network at a time?()A、CSMA/CAB、CSMA/CDC、Wireless encryptionD、Wireless bonding

For added security, a network administrator has decided to lock down the wireless network. Which of the following are ways to accomplish this? ()(Select TWO).A、Disable all 802.11 trafficB、Disable the SSID from broadcastingC、Disable WPAD、Enable Bluetooth only communicationE、Change the default admin passwordF、Disable WEP

Which of the following does not affect security on a wireless access point?()A、EncryptionB、DHCPC、PasswordD、SSID

Which of the following features can be identically configured on a wireless access point and in the wireless network OS settings?()A、The firewall settingsB、The DHCP addressC、The workgroup nameD、The SSID

A company needs strong wireless security enabled for minimal cost. Which of the following security measures is the BEST to use?()A、WEPB、Port filteringC、WPAD、Longer SSID broadcast intervals

A technician installed a new wireless access point on an existing small office home office (SOHO) network with a selective security option enabled. All wireless computers connect to the new network except one computer that cannot connect to the wireless network. Which of the following is the cause?()A、The network uses MAC filteringB、The network uses WEPC、The network uses SSID broadcastD、The network uses WPA

Which of the following wireless security techniques is the MOST secure?()A、Enable Wired Equivalent PrivacyB、Disable SSID broadcastC、Enable Wi-Fi Protected AccessD、Enable MAC filtering

An administrator needs to configure a server to restrict mail traffic to an application server for security reasons.  Which of the following techniques can be used to manage this?()A、 PATB、 ACLsC、 Subnet maskingD、 Port blocking

单选题An administrator needs to configure a server to restrict mail traffic to an application server for security reasons.  Which of the following techniques can be used to manage this?()A PATB ACLsC Subnet maskingD Port blocking

单选题A company wants to secure access to its internal wireless network. The company wants to use themost secure means to access the network. Which of the following is the BEST choice for wireless security in this situation?()AWEP encryptionBChannel rotationCDisable SSIDDWPA encryption

单选题Which of the following security mitigation techniques is the MOST effective against zero-day attacks?()AUpdate antivirus definitionsBMAC filteringCEffective security policiesDUser awareness training

单选题A technician installed a new wireless access point on an existing small office home office (SOHO) network with a selective security option enabled. All wireless computers connect to the new network except one computer that cannot connect to the wireless network. Which of the following is the cause?()AThe network uses MAC filteringBThe network uses WEPCThe network uses SSID broadcastDThe network uses WPA

单选题In which of the following scenarios would MAC filtering be MOST effective as a part of wireless security? ()AA public place where guests are free to access the wireless network.BA small office where a defined number of specific wireless devices are used.CA meeting room where various company users will access the wireless network during meetings. DAn office where some users are unable to use WPA encryption due to older wireless cards so they use MAC filtering.

多选题Which of the following should be configured on a wireless router to enhance security? (Select TWO).()ADisable DHCPBChange wireless channelCDisable SSID broadcastingDChange the default username and passwordEUse a static IP address

多选题For added security, a network administrator has decided to lock down the wireless network. Which of the following are ways to accomplish this? ()(Select TWO).ADisable all 802.11 trafficBDisable the SSID from broadcastingCDisable WPADEnable Bluetooth only communicationEChange the default admin passwordFDisable WEP