Authentication Proxy
802.1X
Context-Based Access Control
Intrusion Detection System
Stateful firewall
第1题:
The most important features in the growth of American economy in the early 20th cenruty were()
Athe use of steam and electricity as chief energy,the development of lare corporation and the development of railway
Bthe development of large corporation,urbanization and the employment in production of new technology
Cthe appearance of airplane,the use of electricity on a large scale and urbanization
Dthe rapid development of industry,railway and large cities
第2题:
Which two features or capabilities are valid options for both an Autonomous WLAN solution and a Lightweight WLAN solution? ()
第3题:
A large corporation is concerned about the amount of time it takes to back up their main file server. They are also concerned that their IT technician frequently forgets to change the backup tapes, thereby leaving the company open to data loss. Which backup system would solve both problems?()
第4题:
Which two statements best describe the wireless security standard that is defined by WPA (Choose two.)()。
第5题:
Which two statements about a wireless repeater topology are true?()
第6题:
You share your portable computer with a co-worker. You use separate user accounts to log on. A wireless network is available to you and your co-worker. You need to prevent your co-worker from modifying your wireless network profile. What should you do?()
第7题:
RAID
tape library
optical storage
disk to disk to tape
第8题:
Run the following script: Get-PublicFolderItemStatistics -Identity "/ExpenseReport/2009"
Click on the Statistics tab in the properties of the public folder with the Public Folder Management Console
Use the MSExchangeIS Public object in System Monitor
Use the MSExchangeIS object in System Monitor
第9题:
may
needn't
could
mustn't
第10题:
A public place where guests are free to access the wireless network.
A small office where a defined number of specific wireless devices are used.
A meeting room where various company users will access the wireless network during meetings.
An office where some users are unable to use WPA encryption due to older wireless cards so they use MAC filtering.
第11题:
A wireless repeater is an access point that is not connected to the wired LAN.
The repeater feature is only available in lightweight access point topologies.
The SSID of the root access point must be configured on the repeater access point.
This topology requires a 10 - 15 percent overlap between a wired access point and the wireless repeater.
This topology requires a 15 - 25 percent overlap between a wired access point and the wireless repeater.
To avoid interference, the repeater access point must use a different channel from what the root access point uses.
第12题:
Used to relay DHCP messages
Used to communicate with LAPs
Used to bring up LWAPP tunnels
Used to extend into the wireless client VLAN
第13题:
The most important features in the growth of American economy in the early 20th cenruty were()
第14题:
In which of the following scenarios would MAC filtering be MOST effective as a part of wireless security? ()
第15题:
An administrator is concerned about users utilizing the company's wireless signal with their personal laptops. Which of the following is the BEST method to use to prevent unauthorized devices from using the company's wireless network?()
第16题:
Which statement is correct about the use of the virtual interface on a WLC ?()
第17题:
An administrator is planning for a six node cluster but is concerned about the administration needed tomanage user accounts throughout the cluster. What PowerHA feature could the administrator use to reducethe administration overhead?()
第18题:
You share your computer with a co-worker by using separate user accounts to log on. Your co-worker modifies the wireless network properties. When you use the computer, the change in properties is not reflected. You need to ensure that you can view all the changes made to the wireless network properties. What should you do?()
第19题:
academic standards
the role of specialist teachers
the training of the individual teachers
the personal development of pupils
第20题:
Helena’s concern was more about the possibility of losing her business
it was the possibility of losing her business that gave Helena more concern
Helena was more concerned towards her business and the possibility of losing it
the possibility of losing her business gave Helena more concern
Helena was more concerned about the possibility of losing her business
第21题:
Configure the wireless network to use WPA2, PEAP and MSCHAP v2.
Configure the wireless network to use WPA2, 802.1X authentication and EAP-TLS.
Configure the wireless network to use WEP, 802.1X authentication, PEAP, and MSCHAP v2.
Configure the wireless network to use WEP,PEAP, and MSCHAP v2 and also require strong user passwords.
第22题:
Authentication Proxy
802.1X
Context-Based Access Control
Intrusion Detection System
Stateful firewall
第23题:
Configure the wireless access points in Denver and Dallas to filter unauthorized Media Access Control (MAC) addresses
Configure the wireless network connection properties for all computers in Denver and in Dallas to use the same network name that the wireless access points use
Create a GPO and link it to the Denver OU and to the Dallas OU. Create a wireless network policy and configure it to use Windows to configure wireless network settings for the Denver and the Dallas networks
Create a GPO and link it to the Denver OU and to the Dallas OU. Create a wireless network policy and enable data encryption and dynamic key assignments for the Denver and Dallas networks
第24题:
the use of steam and electricity as chief energy,the development of lare corporation and the development of railway
the development of large corporation,urbanization and the employment in production of new technology
the appearance of airplane,the use of electricity on a large scale and urbanization
the rapid development of industry,railway and large cities