单选题A corporation is not concerned about wireless use by Teleworkers. Authentication for any application first requires access via a web browser to a protected site. Given these requirements, choose the appropriate security feature to use to enforce the se

题目
单选题
A corporation is not concerned about wireless use by Teleworkers. Authentication for any application first requires access via a web browser to a protected site. Given these requirements, choose the appropriate security feature to use to enforce the security policy.()
A

Authentication Proxy

B

802.1X 

C

Context-Based Access Control

D

Intrusion Detection System

E

Stateful firewall


相似考题
更多“A corporation is not concerned about wireless use by Telewor”相关问题
  • 第1题:

    The most important features in the growth of American economy in the early 20th cenruty were()

    Athe use of steam and electricity as chief energy,the development of lare corporation and the development of railway

    Bthe development of large corporation,urbanization and the employment in production of new technology

    Cthe appearance of airplane,the use of electricity on a large scale and urbanization

    Dthe rapid development of industry,railway and large cities


    B

  • 第2题:

    Which two features or capabilities are valid options for both an Autonomous WLAN solution and a  Lightweight WLAN solution? ()

    • A、 PoE capability
    • B、 Use of Cisco Secure Access Control Server (ACS) for security
    • C、 Cisco IOS software for configuration
    • D、 Cisco Wireless Control System (WCS) for management
    • E、 Use of a Cisco Wireless Location Appliance location for tracking

    正确答案:A,B

  • 第3题:

    A large corporation is concerned about the amount of time it takes to back up their main file server. They are also concerned that their IT technician frequently forgets to change the backup tapes, thereby leaving the company open to data loss. Which backup system would solve both problems?()

    • A、 RAID
    • B、 tape library
    • C、 optical storage
    • D、 disk to disk to tape

    正确答案:B

  • 第4题:

    Which two statements best describe the wireless security standard that is defined by WPA (Choose two.)()。

    • A、It specifies use of a static encryption key that must be changed frequently to enhance security
    • B、It requires use of an open authentication method
    • C、It specifies the use of dynamic encryption keys that change each time a client establishes a connection
    • D、It requires that all access points and wireless devices use the same encryption key
    • E、It includes authentication by PSK

    正确答案:C,E

  • 第5题:

    Which two statements about a wireless repeater topology are true?()

    • A、A wireless repeater is an access point that is not connected to the wired LAN.
    • B、The repeater feature is only available in lightweight access point topologies.
    • C、The SSID of the root access point must be configured on the repeater access point.
    • D、This topology requires a 10 - 15 percent overlap between a wired access point and the wireless repeater.
    • E、This topology requires a 15 - 25 percent overlap between a wired access point and the wireless repeater.
    • F、To avoid interference, the repeater access point must use a different channel from what the root access point uses.

    正确答案:A,C

  • 第6题:

    You share your portable computer with a co-worker. You use separate user accounts to log on. A wireless network is available to you and your co-worker.  You need to prevent your co-worker from modifying your wireless network profile.  What should you do?()

    • A、Disable the Connect even if the network is not broadcasting option.
    • B、In the Network and Sharing Center window, click the Diagnose and repair option.
    • C、Set the default wireless profile type to the Use all-users only profile (recommended) option. Recreate the wireless network.
    • D、Set the default wireless profile type to the Use all-users and per-user profiles option. Recreate the wireless network by using the Save this network for me only option.

    正确答案:D

  • 第7题:

    单选题
    A large corporation is concerned about the amount of time it takes to back up their main file server. They are also concerned that their IT technician frequently forgets to change the backup tapes, thereby leaving the company open to data loss. Which backup system would solve both problems?()
    A

     RAID

    B

     tape library

    C

     optical storage

    D

     disk to disk to tape


    正确答案: A
    解析: 暂无解析

  • 第8题:

    单选题
    You are the Exchange administrator of the Xxx Corporation’s Exchange 2010 organization.You are  concerned about the total size of items that are stored in a public folder namedExpenseReport.Click the Exhibit (s) button to view the public folder configuration. Which of the following techniques should you use to determine the size of items and the attachments in the public folder?()
    A

    Run the following script: Get-PublicFolderItemStatistics -Identity "/ExpenseReport/2009"

    B

    Click on the Statistics tab in the properties of the public folder with the Public Folder Management Console

    C

    Use the MSExchangeIS Public object in System Monitor

    D

    Use the MSExchangeIS object in System Monitor


    正确答案: A
    解析: 暂无解析

  • 第9题:

    单选题
    If you are curious about the history of our school or concerned about the future, you________ miss the excellent opportunity.
    A

    may

    B

    needn't

    C

    could

    D

    mustn't


    正确答案: A
    解析:

  • 第10题:

    单选题
    In which of the following scenarios would MAC filtering be MOST effective as a part of wireless security? ()
    A

    A public place where guests are free to access the wireless network.

    B

    A small office where a defined number of specific wireless devices are used.

    C

    A meeting room where various company users will access the wireless network during meetings. 

    D

    An office where some users are unable to use WPA encryption due to older wireless cards so they use MAC filtering.


    正确答案: A
    解析: 暂无解析

  • 第11题:

    多选题
    Which two statements about a wireless repeater topology are true?()
    A

    A wireless repeater is an access point that is not connected to the wired LAN.

    B

    The repeater feature is only available in lightweight access point topologies.

    C

    The SSID of the root access point must be configured on the repeater access point.

    D

    This topology requires a 10 - 15 percent overlap between a wired access point and the wireless repeater.

    E

    This topology requires a 15 - 25 percent overlap between a wired access point and the wireless repeater.

    F

    To avoid interference, the repeater access point must use a different channel from what the root access point uses.


    正确答案: E,D
    解析: 暂无解析

  • 第12题:

    单选题
    Which statement is correct about the use of the virtual interface on a WLC ?()
    A

     Used to relay DHCP messages

    B

     Used to communicate with LAPs

    C

     Used to bring up LWAPP tunnels

    D

     Used to extend into the wireless client VLAN


    正确答案: A
    解析: 暂无解析

  • 第13题:

    The most important features in the growth of American economy in the early 20th cenruty were()

    • A、the use of steam and electricity as chief energy,the development of lare corporation and the development of railway
    • B、the development of large corporation,urbanization and the employment in production of new technology
    • C、the appearance of airplane,the use of electricity on a large scale and urbanization
    • D、the rapid development of industry,railway and large cities

    正确答案:B

  • 第14题:

    In which of the following scenarios would MAC filtering be MOST effective as a part of wireless security? ()

    • A、A public place where guests are free to access the wireless network.
    • B、A small office where a defined number of specific wireless devices are used.
    • C、A meeting room where various company users will access the wireless network during meetings. 
    • D、An office where some users are unable to use WPA encryption due to older wireless cards so they use MAC filtering.

    正确答案:B

  • 第15题:

    An administrator is concerned about users utilizing the company's wireless signal with their personal laptops. Which of the following is the BEST method to use to prevent unauthorized devices from using the company's wireless network?()

    • A、Secure VPN
    • B、MAC filtering
    • C、IP filtering
    • D、Static IP addresses

    正确答案:B

  • 第16题:

    Which statement is correct about the use of the virtual interface on a WLC ?()

    • A、 Used to relay DHCP messages
    • B、 Used to communicate with LAPs
    • C、 Used to bring up LWAPP tunnels
    • D、 Used to extend into the wireless client VLAN

    正确答案:A

  • 第17题:

    An administrator is planning for a six node cluster but is concerned about the administration needed tomanage user accounts throughout the cluster. What PowerHA feature could the administrator use to reducethe administration overhead?()

    • A、LDAP Authentication Module
    • B、Smart Assist for Active Directory
    • C、C-SPOC for user and password management
    • D、File Collections designating one node as the primary authentication node

    正确答案:C

  • 第18题:

    You share your computer with a co-worker by using separate user accounts to log on. Your co-worker modifies the wireless network properties. When you use the computer, the change in properties is not reflected.  You need to ensure that you can view all the changes made to the wireless network properties.   What should you do?()

    • A、Disable the Connect even if the network is not broadcasting option.
    • B、In the Network and Sharing Center window, click the Diagnose and repair option.
    • C、Set the default wireless profile type to the Use all-users only profile (recommended) option. Recreate the wireless network.
    • D、Set the default wireless profile type to the Use all-users and per-user profiles option. Recreate the wireless network with the Save this network for me only option.

    正确答案:C

  • 第19题:

    单选题
    In this passage about secondary schools, the author is mainly concerned about ______.
    A

    academic standards

    B

    the role of specialist teachers

    C

    the training of the individual teachers

    D

    the personal development of pupils


    正确答案: A
    解析:
    细节理解题。答案来自第二段最后一句话。表明作者认为在中学阶段,孩子们应该首先被赋予理解与解决问题的能力。

  • 第20题:

    单选题
    Although worried about the dangers on going into debt, Helena’s concern was more about the possibility of losing her business.
    A

    Helena’s concern was more about the possibility of losing her business

    B

    it was the possibility of losing her business that gave Helena more concern

    C

    Helena was more concerned towards her business and the possibility of losing it

    D

    the possibility of losing her business gave Helena more concern

    E

    Helena was more concerned about the possibility of losing her business


    正确答案: D
    解析:
    句子以修饰性短语“worried”分词开始,分词的主语必须是主句的主语,但是该主句的主语是“Helena’s concern”,所以A项不合适。分词的逻辑主语只能是Helena,C.和E.符合,选项C不正确,“concerned towards”这个短语不符合语言习惯。故选E。

  • 第21题:

    单选题
    Your company has active directory certificate services (AD CS) and network access protection (NAP) deployed on the network. You need to configure the wireless network to accept smart cards. What should you do?()
    A

    Configure the wireless network to use WPA2, PEAP and MSCHAP v2.

    B

    Configure the wireless network to use WPA2, 802.1X authentication and EAP-TLS.

    C

    Configure the wireless network to use WEP, 802.1X authentication, PEAP, and MSCHAP v2.

    D

    Configure the wireless network to use WEP,PEAP, and MSCHAP v2 and also require strong user passwords.


    正确答案: B
    解析: 暂无解析

  • 第22题:

    单选题
    A corporation is not concerned about wireless use by Teleworkers. Authentication for any application first requires access via a web browser to a protected site. Given these requirements, choose the appropriate security feature to use to enforce the security policy.()
    A

    Authentication Proxy

    B

    802.1X 

    C

    Context-Based Access Control

    D

    Intrusion Detection System

    E

    Stateful firewall


    正确答案: E
    解析: 暂无解析

  • 第23题:

    单选题
    You need to design a method to protect traffic on the wireless network. Your solution must meet the requirements of the chief security officer. What should you do?()
    A

    Configure the wireless access points in Denver and Dallas to filter unauthorized Media Access Control (MAC) addresses

    B

    Configure the wireless network connection properties for all computers in Denver and in Dallas to use the same network name that the wireless access points use

    C

    Create a GPO and link it to the Denver OU and to the Dallas OU. Create a wireless network policy and configure it to use Windows to configure wireless network settings for the Denver and the Dallas networks

    D

    Create a GPO and link it to the Denver OU and to the Dallas OU. Create a wireless network policy and enable data encryption and dynamic key assignments for the Denver and Dallas networks


    正确答案: D
    解析: 暂无解析

  • 第24题:

    单选题
    The most important features in the growth of American economy in the early 20th cenruty were()
    A

    the use of steam and electricity as chief energy,the development of lare corporation and the development of railway

    B

    the development of large corporation,urbanization and the employment in production of new technology

    C

    the appearance of airplane,the use of electricity on a large scale and urbanization

    D

    the rapid development of industry,railway and large cities


    正确答案: A
    解析: 暂无解析