A company wants to secure access to its internal wireless network. The company wants to use themost secure means to access the network. Which of the following is the BEST choice for wireless security in this situation?()A、WEP encryptionB、Channel rotationC

题目

A company wants to secure access to its internal wireless network. The company wants to use themost secure means to access the network. Which of the following is the BEST choice for wireless security in this situation?()

  • A、WEP encryption
  • B、Channel rotation
  • C、Disable SSID
  • D、WPA encryption

相似考题
参考答案和解析
正确答案:D
更多“A company wants to secure access”相关问题
  • 第1题:

    The company wants to evaluate making all business office users administrators on their client computers. You need to design a method to ensure that this change can be made in a manner that meets business and security requirements. What should you do?()

    • A、On all domain controllers, implement registry access auditing for all registry keys that are considered sensitive by the company’s written security policy
    • B、On all client computers, implement logon auditing for all user account logons
    • C、On all client computers, configure registry access auditing for all registry keys that are considered sensitive by the company’s written security policy
    • D、On all domain controllers, implement logon auditing for all user account logons

    正确答案:C

  • 第2题:

    The Schuyler and Livingston Iron Works has been working on getting its network security undercontrol. It has set up VPN with IPSec links to its suppliers. It has installed network vulnerabilityscanners to proactively identify areas of weakness, and it monitors and responds to securityevents as they occur. It also employs extensive access control lists, stateful firewall implementations, and dedicated firewall appliances. The company has been growing very fastlately and wants to make sure it is up to date on security measures. Which two areas of securitywould you advise the company to strengthen? ()

    • A、 intrusion protection
    • B、 identity
    • C、 secure connectivity
    • D、 security management

    正确答案:A,B

  • 第3题:

    Which can be done to secure the virtual terminal interfaces on a router?()

    • A、Administratively shut down the interfaces.
    • B、Physically secure the interfaces.
    • C、Configure a virtual terminal password and login process.
    • D、Enter an access list and apply it to the terminal interfaces using the access-class command.
    • E、Create an access list and apply it to the terminal interfaces using the access-group command

    正确答案:C,D

  • 第4题:

    The Schuyler and Livingston Iron Works has been working on getting its network security under control. It has set up VPN with IPSec links to its suppliers. It has installed network vulnerability scanners to proactively identify areas of weakness, and it monitors and responds to security events as they occur. It also employs extensive access control lists, stateful firewall implementations, and dedicated firewall appliances. The company has been growing very fast lately and wants to make sure it is up to date on security measures.Which two areas of security would you advise the company to strengthen? ()

    • A、intrusion protection
    • B、identity
    • C、secure connectivity
    • D、security management

    正确答案:B,D

  • 第5题:

    What is the primary use of a remote access VPN?()

    • A、to secure communication between two remote PCs
    • B、to secure communication between two remote offices
    • C、to secure communication betweenan remote PC and the corporate intranet
    • D、to secure communication between a corporate intranet and the public internet

    正确答案:C

  • 第6题:

    Your company has deployed Network Access Protection (NAP).You configure secure wireless access to the network by using 802.1X authentication from any access point. You need to ensure that all client computers that access the network are evaluated by NAP.  What should you do?()

    • A、Configure all access points as RADIUS clients to the Remediation Servers.
    • B、Configure all access points as RADIUS clients to the Network Policy Server (NPS).
    • C、Create a Network Policy that defines Remote Access Server as a network connection method.
    • D、Create a Network Policy that specifies EAP-TLS as the only available authentication method.

    正确答案:B

  • 第7题:

    单选题
    In the Company wireless LAN,  what is the function of the Service Set Identifier (SSID)?()
    A

     The SSID must match on both the Company client and the Company access point and provides  MAC Address Authentication to authenticate the client to the access point.

    B

     The SSID should be configured on the Company client site only and provides data-privacy  functions and authentication to the access point.

    C

     The SSID must match on both the Company client and the Company access point and provides encryption keys for authentication to the access point.

    D

     The SSID must match on both the Company client and the Company access point. The SSID is  advertised in plain-text in the access point beacon messages.  

    E

     None of the other alternatives apply


    正确答案: D
    解析: 暂无解析

  • 第8题:

    单选题
    A company wants to secure access to its internal wireless network. The company wants to use themost secure means to access the network. Which of the following is the BEST choice for wireless security in this situation?()
    A

    WEP encryption

    B

    Channel rotation

    C

    Disable SSID

    D

    WPA encryption


    正确答案: D
    解析: 暂无解析

  • 第9题:

    多选题
    What are two use cases enabled by IF-MAP Federation?()
    A

    Users authenticated to one Junos Pulse Access Control Service can transparently access resources protected by another Junos Pulse Access Control Service.

    B

    Users authenticated to a Junos Pulse Access Control Service can transparently access resources protected by a Junos Pulse Secure Access Service.

    C

    Remote access users authenticated to a Junos Pulse Secure Access Service can transparently access resources protected by a Junos Pulse Access Control Service.

    D

    Remote access users authenticated to one Junos Pulse Secure Access Service can transparently access resources protected by another Junos Pulse Secure Access Service.


    正确答案: D,C
    解析: 暂无解析

  • 第10题:

    单选题
    You work in a company which is named Wiikigo Corp. The company uses SQL Server 2008. You are the administrator of the company database. Now you are in charge of a SQL Server 2008 instance. Now your company CIO assigns a task to you. The company CIO wants you to configure FILESTREAM data and the two requirements below must be met: you must enable FILESTREAM for file I/O streaming access; remote client computers must be able to have streaming access to FILESTREAM data. You must make sure that FILESTREAM data is enabled. Which service should you configure? ()
    A

    You should configure SQL Server VSS Writer 

    B

    You should configure Distributed File System 

    C

    You should configure SQL Server 

    D

    You should configure SQL Server Full Text


    正确答案: B
    解析: 暂无解析

  • 第11题:

    单选题
    You work in a company which uses SQL Server 2008. You are the administrator of the company database. Now you are in charge of a SQL Server 2008 instance. For some reason, now the company wants to view the number of users who access the SQL Server instance. The company CIO assigns this task to you. You have to use Windows System Monitor to find out the concrete number. Which performance object should you capture?()
    A

    SQLServer:Buffer Manager 

    B

    SQLServer:Access Methods 

    C

    SQLServer:General Statistics 

    D

    SQLServer:Exec Statistics


    正确答案: C
    解析: 暂无解析

  • 第12题:

    You work as a network technician at Company. Your boss, Ms., is interested  LWAPP (Lightweight Access Point Protocol). In particular she wants to know which type of  activities this protocol defines.  What should you tell her? ()

    • A、 Layer 3 addressing and distribution
    • B、 SNMP monitoring services
    • C、 Access point certification and software control
    • D、 Packet encapsulation, fragmentation, and formatting
    • E、 Compression and Layer 3 address mapping
    • F、 User behaviors

    正确答案:C,D

  • 第13题:

    In the Company wireless LAN,  what is the function of the Service Set Identifier (SSID)?()

    • A、 The SSID must match on both the Company client and the Company access point and provides  MAC Address Authentication to authenticate the client to the access point.
    • B、 The SSID should be configured on the Company client site only and provides data-privacy  functions and authentication to the access point.
    • C、 The SSID must match on both the Company client and the Company access point and provides encryption keys for authentication to the access point.
    • D、 The SSID must match on both the Company client and the Company access point. The SSID is  advertised in plain-text in the access point beacon messages.  
    • E、 None of the other alternatives apply

    正确答案:D

  • 第14题:

    Which can be done to secure the virtual terminal interfaces on a router?()

    • A、Administratively shut down the interfaces.
    • B、Physically secure the interfaces.
    • C、Configure a virtual terminal password and login process.
    • D、Enter an access list and apply it to the terminal interfaces using the access-class command.
    • E、Create an access list and apply it to the terminal interfaces using the access-group command.

    正确答案:C,D

  • 第15题:

    Which benefit does digital subscriber line (DSL) systems for broadband access provide to the user?()

    • A、Secure access to company extranet
    • B、Dedicated lines for high security data transfer
    • C、Simple solution for high-quality digital video using coaxial cable
    • D、Data and audio signals that share the same communications infrastructure

    正确答案:D

  • 第16题:

    A customer wants to have employees work from remote locations as well as in the office.  All communications must be secure and files must be protected from access by unauthorized people.  The employee’s applications (database inserts and reads) are only accessed with a web browser.  Which of the following capabilities is necessary?()

    • A、SSL
    • B、PGP
    • C、File encryption program
    • D、Public key encryption

    正确答案:A

  • 第17题:

    Your company has deployed Network Access Protection (NAP). You configure secure wireless access to the network by using 802.1x authentication from any access point. You need to ensure that all client computers that access the network are evaluated by NAP.  what should you do()? 

    • A、Configure all access points as RADIUS clients to the Remediation Servers
    • B、Configure all access points as RADIUS clients to the Network Policy Server (NPS)
    • C、Create a Network Policy that defines Remote Access Server as a network connection method
    • D、Create a Network Policy that specifies EAP-TLS as the only availible authentication method.

    正确答案:B

  • 第18题:

    单选题
    You have a Junos Pulse Secure Access Service acting as an IF-MAP client, configured to federate all user roles to a Junos Pulse Access Control Service acting as an IF-MAP Federation server. A remote user using Junos Pulse logs in to the Junos Pulse Secure Access Service; the Junos Pulse Secure Access Service provisions a remote access session for that user.What happens next?()
    A

    The Junos Pulse Secure Access Service redirects the user to the Junos Pulse Secure Access Service for authentication

    B

    The Junos Pulse Access Control Service provisions enforcement points to enable resource access for that user.

    C

    The Junos Pulse Secure Access Service publishes user session and role information to the IF- MAP Federation server,

    D

    The Junos Pulse Secure Access Service provisions enforcement points to enable resource access for that user.


    正确答案: A
    解析: 暂无解析

  • 第19题:

    多选题
    Which three types of policies must you configure to allow remote users transparent access to protected resources using IF-MAP Federation between a Junos Pulse Secure Access Service and a Junos Pulse Access Control Service?()
    A

    Session-Export policies on the Junos Pulse Secure Access Service

    B

    Session-Export policies on the Junos Pulse Access Control Service

    C

    Session-Import policies on the Junos Pulse Secure Access Service

    D

    Session-Import policies on the Junos Pulse Access Control Service

    E

    Resource access policies on the Junos Pulse Access Control Service


    正确答案: B,A
    解析: 暂无解析

  • 第20题:

    多选题
    Your IT director has decided to allow employees to use their laptops at home as well as in the office. You have deployed the Junos Pulse client to allow access to the offices 802.1X-enabled wired network. Your company also has the Junos Pulse Secure Access Service deployed. You want the Junos Pulse client to automatically launch the appropriate access method depending on each users location. Which three are supported to determine the users location?()
    A

    MAC address

    B

    DNS server

    C

    DHCP server

    D

    resolve address

    E

    endpoint address


    正确答案: D,E
    解析: 暂无解析

  • 第21题:

    单选题
    A customer is trying to determine which client to deploy. The customer wants to be able to perform Layer 2 authentication as well as connect to the Junos Pulse Secure Access Service.Which client should the customer deploy?()
    A

    Windows native supplicant

    B

    Odyssey Access Client

    C

    Junos Pulse

    D

    Network Connect


    正确答案: C
    解析: 暂无解析