单选题A company needs strong wireless security enabled for minimal cost. Which of the following security measures is the BEST to use?()A WEPB Port filteringC WPAD Longer SSID broadcast intervals

题目
单选题
A company needs strong wireless security enabled for minimal cost. Which of the following security measures is the BEST to use?()
A

WEP

B

Port filtering

C

WPA

D

Longer SSID broadcast intervals


相似考题
更多“单选题A company needs strong wireless security enabled for minimal cost. Which of the following security measures is the BEST to use?()A WEPB Port filteringC WPAD Longer SSID broadcast intervals”相关问题
  • 第1题:

    Which of the following protocols is the LEAST secure and should be avoided on a wireless network?()

    A.WEP

    B.PEAP

    C.WPA

    D.TKIP


    参考答案:A

  • 第2题:

    Which of the following commands on the wireless interface of a cisco 3845 integrated services router allows the ssid to broadcast?()

    • A、router (config-ssid)# guest-mode
    • B、router (config-ssid)# advertise
    • C、router (config-ssid)# enable
    • D、router (config-ssid)# broadcast

    正确答案:A

  • 第3题:

    Which of the following is the BEST way to deny unauthorized computers access to a network? ()

    • A、Disable DHCP.
    • B、Use MAC filtering.
    • C、Disable the SSID broadcast.
    • D、Use a network firewall.

    正确答案:D

  • 第4题:

    An administrator is concerned about users utilizing the company's wireless signal with their personal laptops. Which of the following is the BEST method to use to prevent unauthorized devices from using the company's wireless network?()

    • A、Secure VPN
    • B、MAC filtering
    • C、IP filtering
    • D、Static IP addresses

    正确答案:B

  • 第5题:

    Which of the following should be configured on a wireless router to enhance security? (Select TWO).()

    • A、Disable DHCP
    • B、Change wireless channel
    • C、Disable SSID broadcasting
    • D、Change the default username and password
    • E、Use a static IP address

    正确答案:C,D

  • 第6题:

    For added security, a network administrator has decided to lock down the wireless network. Which of the following are ways to accomplish this? ()(Select TWO).

    • A、Disable all 802.11 traffic
    • B、Disable the SSID from broadcasting
    • C、Disable WPA
    • D、Enable Bluetooth only communication
    • E、Change the default admin password
    • F、Disable WEP

    正确答案:B,E

  • 第7题:

    A company needs strong wireless security enabled for minimal cost. Which of the following security measures is the BEST to use?()

    • A、WEP
    • B、Port filtering
    • C、WPA
    • D、Longer SSID broadcast intervals

    正确答案:C

  • 第8题:

    A technician installed a new wireless access point on an existing small office home office (SOHO) network with a selective security option enabled. All wireless computers connect to the new network except one computer that cannot connect to the wireless network. Which of the following is the cause?()

    • A、The network uses MAC filtering
    • B、The network uses WEP
    • C、The network uses SSID broadcast
    • D、The network uses WPA

    正确答案:A

  • 第9题:

    单选题
    A technician installed a new wireless access point on an existing small office home office (SOHO) network with a selective security option enabled. All wireless computers connect to the new network except one computer that cannot connect to the wireless network. Which of the following is the cause?()
    A

    The network uses MAC filtering

    B

    The network uses WEP

    C

    The network uses SSID broadcast

    D

    The network uses WPA


    正确答案: D
    解析: 暂无解析

  • 第10题:

    多选题
    Refer to the exhibit. A junior network administrator was given the task of configuring port security on SwitchA to allow only PC_A to access the switched network through port fa0/1. If any other device is detected, the port is to drop frames from this device. The administrator configured the interface and tested it with successful pings from PC_A to RouterA, and then observes the output from these two show commands.Which two of these changes are necessary for SwitchA to meet the requirements? ()
    A

    Port security needs to be globally enabled.

    B

    Port security needs to be enabled on the interface.

    C

    Port security needs to be configured to shut down the interface in the event of a violation.

    D

    Port security needs to be configured to allow only one learned MAC address.

    E

    Port security interface counters need to be cleared before using the show command.

    F

    The port security configuration needs to be saved to NVRAM before it can become active.


    正确答案: E,B
    解析: 暂无解析

  • 第11题:

    单选题
    Which of the following wireless security techniques is the MOST secure?()
    A

    Enable Wired Equivalent Privacy

    B

    Disable SSID broadcast

    C

    Enable Wi-Fi Protected Access

    D

    Enable MAC filtering


    正确答案: D
    解析: 暂无解析

  • 第12题:

    单选题
    A company wants to secure access to its internal wireless network. The company wants to use themost secure means to access the network. Which of the following is the BEST choice for wireless security in this situation?()
    A

    WEP encryption

    B

    Channel rotation

    C

    Disable SSID

    D

    WPA encryption


    正确答案: D
    解析: 暂无解析

  • 第13题:

    Refer to the exhibit. A junior network administrator was given the task of configuring port security on SwitchA to allow only PC_A to access the switched network through port fa0/1. If any other device is detected, the port is to drop frames from this device. The administrator configured the interface and tested it with successful pings from PC_A to RouterA, and then observes the output from these two show commands.Which two of these changes are necessary for SwitchA to meet the requirements? ()

    A.Port security needs to be globally enabled.

    B.Port security needs to be enabled on the interface.

    C.Port security needs to be configured to shut down the interface in the event of a violation.

    D.Port security needs to be configured to allow only one learned MAC address.

    E.Port security interface counters need to be cleared before using the show command.

    F.The port security configuration needs to be saved to NVRAM before it can become active.


    参考答案:B, D

  • 第14题:

    A company wants to secure access to its internal wireless network. The company wants to use themost secure means to access the network. Which of the following is the BEST choice for wireless security in this situation?()

    • A、WEP encryption
    • B、Channel rotation
    • C、Disable SSID
    • D、WPA encryption

    正确答案:D

  • 第15题:

    Which of the following protocols is the LEAST secure and should be avoided on a wireless network?()

    • A、WEP
    • B、PEAP
    • C、WPA
    • D、TKIP

    正确答案:A

  • 第16题:

    Which of the following security mitigation techniques is the MOST effective against zero-day attacks?()

    • A、Update antivirus definitions
    • B、MAC filtering
    • C、Effective security policies
    • D、User awareness training

    正确答案:D

  • 第17题:

    Which of the following offers the HIGHEST wireless security?()

    • A、WEP
    • B、WPA2
    • C、WPA
    • D、HTTPS

    正确答案:B

  • 第18题:

    Which of the following does not affect security on a wireless access point?()

    • A、Encryption
    • B、DHCP
    • C、Password
    • D、SSID

    正确答案:B

  • 第19题:

    Which of the following BEST describes how server virtualization can cut down IT costs? ()

    • A、 Server virtualization increases server application performance allowing productivity to be increased.
    • B、 Server virtualization simplifies server administration and reduces the IT department staffing needs.
    • C、 Server virtualization implements higher security measures at the server OS level reducing the need for other security implementations.
    • D、 Server virtualization is a more efficient use of hardware for multiple servers reducing the resource utilization.

    正确答案:D

  • 第20题:

    Which of the following wireless security techniques is the MOST secure?()

    • A、Enable Wired Equivalent Privacy
    • B、Disable SSID broadcast
    • C、Enable Wi-Fi Protected Access
    • D、Enable MAC filtering

    正确答案:C

  • 第21题:

    单选题
    Which of the following BEST describes how server virtualization can cut down IT costs? ()
    A

     Server virtualization increases server application performance allowing productivity to be increased.

    B

     Server virtualization simplifies server administration and reduces the IT department staffing needs.

    C

     Server virtualization implements higher security measures at the server OS level reducing the need for other security implementations.

    D

     Server virtualization is a more efficient use of hardware for multiple servers reducing the resource utilization.


    正确答案: D
    解析: 暂无解析

  • 第22题:

    多选题
    Which of the following should be configured on a wireless router to enhance security? (Select TWO).()
    A

    Disable DHCP

    B

    Change wireless channel

    C

    Disable SSID broadcasting

    D

    Change the default username and password

    E

    Use a static IP address


    正确答案: B,E
    解析: 暂无解析

  • 第23题:

    单选题
    Which of the following commands on the wireless interface of a Cisco 3845 Integrated Services Router allows the SSID to broadcast?()
    A

    router(config-ssid)# guest-mode

    B

    router(config-ssid)# advertise

    C

    router(config-ssid)# enable

    D

    router(config-ssid)# broadcast


    正确答案: A
    解析: 暂无解析