更多“单选题Which of the following uses pair authentication to provide a wireless connection between twodevices?()A 802.11nB BluetoothC InfraredD Cellular”相关问题
  • 第1题:

    A SONET network typically uses which of the following transmission media?()

    • A、Single-mode fiber
    • B、Multimode fiber
    • C、Copper
    • D、Wireless

    正确答案:A

  • 第2题:

    Which of the following wireless standards has the highest maximum data rate?()

    • A、802.11n
    • B、802.11b
    • C、802.11a
    • D、802.11g

    正确答案:A

  • 第3题:

    The SCTP layer in the C7 signalling protocol stack is responsible for which of the following:()

    • A、Establishing a signaling channel between two signaling entities in an ATM network
    • B、Provide reliable connection for signaling between two IP signaling nodes
    • C、Provide routing for IP signaling messages in an IP signaling network

    正确答案:B

  • 第4题:

    Which two wireless devices acts as a communication connection between the client and WLAN()

    • A、 bridge
    • B、 access point
    • C、 wireless adaptor
    • D、 Layer 3 switch
    • E、 antenna

    正确答案:B,C

  • 第5题:

    An ISP has provided a DSL Internet connection with a static IP address. A technician is setting up a small office home office (SOHO) wireless router and needs to provide Internet access to five PCs on the network. Which of the following should be enabled?()

    • A、NAT
    • B、WPS
    • C、MAC filtering
    • D、Port forwarding

    正确答案:A

  • 第6题:

    You install a new hardware router that provides wireless network connectivity between your computer and the Internet. You connect to the router by using a wireless network adapter. Your computer is able to access the Internet but is unable to discover other computers in the local wireless network.  You need to configure the wireless connection to allow your computer to discover other computers.  What should you do?()

    • A、Configure the network category of your wireless network connection to Private.
    • B、Configure the network category of your wireless network connection to Public.
    • C、Configure the TCP/IP packet filtering on the wireless network connection.
    • D、Configure the wireless network connection with the appropriate authentication to the router.

    正确答案:A

  • 第7题:

    多选题
    Which of the following connection types use a phone line as a carrier to provide access to theInternet?()
    A

    Cellular

    B

    Satellite

    C

    ISDN

    D

    WiMAX

    E

    DSL


    正确答案: B,D
    解析: 暂无解析

  • 第8题:

    单选题
    Which of the following wireless standards uses the 5GHz frequency?()
    A

    802.11g

    B

    802.2

    C

    802.11a

    D

    802.3


    正确答案: A
    解析: 暂无解析

  • 第9题:

    单选题
    Which of the following logical network topologies is used to provide a secure connection acrossthe Internet?()
    A

    VLAN

    B

    Peer to Peer

    C

    VTP

    D

    VPN


    正确答案: D
    解析: 暂无解析

  • 第10题:

    单选题
    Which of the following LAN technologies is considered fast Ethernet and uses two pairs of cabling,one pair for sending and the other pair for receiving?()
    A

    100Base-T4

    B

    100Base-TX

    C

    100Base-X

    D

    100Base-FX


    正确答案: C
    解析: 暂无解析

  • 第11题:

    单选题
    Client association using EAP-Cisco Wireless (LEAP) is failing, but EAP-PEAP is functioning on an autonomous access point. Which of the following needs to be enabled on the access point so EAP-Cisco Wireless (LEAP) is enabled?()
    A

    open authentication plus MAC

    B

    open authentication plus EAP

    C

    shared key

    D

    network EAP


    正确答案: A
    解析: 暂无解析

  • 第12题:

    多选题
    Which two wireless devices acts as a communication connection between the client and WLAN()
    A

    bridge

    B

    access point

    C

    wireless adaptor

    D

    Layer 3 switch

    E

    antenna


    正确答案: B,D
    解析: 暂无解析

  • 第13题:

    Which of the following logical network topologies is used to provide a secure connection acrossthe Internet?()

    • A、VLAN
    • B、Peer to Peer
    • C、VTP
    • D、VPN

    正确答案:D

  • 第14题:

    Which of the following describes a secure connection over the Internet between two sites?()

    • A、FTP
    • B、VLAN
    • C、VPN
    • D、HTTP

    正确答案:C

  • 第15题:

    You are charged with implementing a secure wireless installation which will provide Internet access to client devices but will not allow communications between wireless clients. In addition toimplementing PSPF or peer-to-peer blocking on the wireless side. Which of the following actionsshould you perform on the wired infrastructure?()

    • A、Implement a Cisco Secure IPS sensor.
    • B、Implement 802.1X on the switch ports.
    • C、Take no action, you have achieved your goal.
    • D、Implement a protected port on the access switches.

    正确答案:D

  • 第16题:

    A user reports sporadic connectivity with their wireless connection. A technician determines the wireless speed reported by the laptop to be 1Mbps. Which of the following is the MOST likely cause of this issue?()

    • A、The client does not support 802.11n
    • B、Incorrect frequency on the client is being used
    • C、Incorrect encryption on the AP
    • D、The client distance from the AP

    正确答案:D

  • 第17题:

    A technician installed a new wireless access point on an existing small office home office (SOHO) network with a selective security option enabled. All wireless computers connect to the new network except one computer that cannot connect to the wireless network. Which of the following is the cause?()

    • A、The network uses MAC filtering
    • B、The network uses WEP
    • C、The network uses SSID broadcast
    • D、The network uses WPA

    正确答案:A

  • 第18题:

    单选题
    You are charges with implementing a secure wireless installation which will provide Internet accessto client devices but will not allow communications between wireless clients. In addition to implementing PSPF or peer-to-peer blocking on the wireless side,which of the following actionsshould you perform on the wired infrastructure?()
    A

    Take no action, you have achieved your goal.

    B

    Implement a Cisco Secure IPS sensor.

    C

    Implement a protected port on the access switches.

    D

    Implement 802.1X on the switch ports.


    正确答案: C
    解析: 暂无解析

  • 第19题:

    单选题
    A technician installed a new wireless access point on an existing small office home office (SOHO) network with a selective security option enabled. All wireless computers connect to the new network except one computer that cannot connect to the wireless network. Which of the following is the cause?()
    A

    The network uses MAC filtering

    B

    The network uses WEP

    C

    The network uses SSID broadcast

    D

    The network uses WPA


    正确答案: D
    解析: 暂无解析

  • 第20题:

    单选题
    An ISP has provided a DSL Internet connection with a static IP address. A technician is setting up a small office home office (SOHO) wireless router and needs to provide Internet access to five PCs on the network. Which of the following should be enabled?()
    A

    NAT

    B

    WPS

    C

    MAC filtering

    D

    Port forwarding


    正确答案: A
    解析: 暂无解析

  • 第21题:

    单选题
    You install a new hardware router that provides wireless network connectivity between your computer and the Internet. You connect to the router by using a wireless network adapter. Your computer is able to access the Internet but is unable to discover other computers in the local wireless network.  You need to configure the wireless connection to allow your computer to discover other computers.  What should you do?()
    A

    Configure the network category of your wireless network connection to Private.

    B

    Configure the network category of your wireless network connection to Public.

    C

    Configure the TCP/IP packet filtering on the wireless network connection.

    D

    Configure the wireless network connection with the appropriate authentication to the router.


    正确答案: A
    解析: 暂无解析

  • 第22题:

    单选题
    Which of the following describes a secure connection over the Internet between two sites?()
    A

    FTP

    B

    VLAN

    C

    VPN

    D

    HTTP


    正确答案: D
    解析: 暂无解析

  • 第23题:

    单选题
    Which of the following authentication protocols uses certificates to negotiate access to the network?()
    A

    PAP

    B

    CHAP

    C

    EAP-TLS

    D

    Kerberos


    正确答案: C
    解析: 暂无解析