单选题An administrator is concerned about users utilizing the company's wireless signal with their personal laptops. Which of the following is the BEST method to use to prevent unauthorized devices from using the company's wireless network?()A Secure VPNB MA

题目
单选题
An administrator is concerned about users utilizing the company's wireless signal with their personal laptops. Which of the following is the BEST method to use to prevent unauthorized devices from using the company's wireless network?()
A

Secure VPN

B

MAC filtering

C

IP filtering

D

Static IP addresses


相似考题
参考答案和解析
正确答案: C
解析: 暂无解析
更多“单选题An administrator is concerned about users utilizing the company's wireless signal with their personal laptops. Which of the following is the BEST method to use to prevent unauthorized devices from using the company's wireless network?()A Secure VPNB MA”相关问题
  • 第1题:

    A company wants to secure access to its internal wireless network. The company wants to use themost secure means to access the network. Which of the following is the BEST choice for wireless security in this situation?()

    • A、WEP encryption
    • B、Channel rotation
    • C、Disable SSID
    • D、WPA encryption

    正确答案:D

  • 第2题:

    An administrator is concerned about users utilizing the company's wireless signal with their personal laptops. Which of the following is the BEST method to use to prevent unauthorized devices from using the company's wireless network?()

    • A、Secure VPN
    • B、MAC filtering
    • C、IP filtering
    • D、Static IP addresses

    正确答案:B

  • 第3题:

    Users are unable to stay connected to the company's wireless network. Several times throughout the day the users' signals are dropped and they are forced to reconnect to the network. A technician determines the network cabling that supplies the WAP has been run inside with several power lines. Which of the following is the MOST likely cause of the network issue?()

    • A、Ashort
    • B、Open pairs
    • C、ESD
    • D、EMI

    正确答案:D

  • 第4题:

    A company needs strong wireless security enabled for minimal cost. Which of the following security measures is the BEST to use?()

    • A、WEP
    • B、Port filtering
    • C、WPA
    • D、Longer SSID broadcast intervals

    正确答案:C

  • 第5题:

    You share your portable computer with a co-worker. You use separate user accounts to log on. A wireless network is available to you and your co-worker.  You need to prevent your co-worker from modifying your wireless network profile.  What should you do?()

    • A、Disable the Connect even if the network is not broadcasting option.
    • B、In the Network and Sharing Center window, click the Diagnose and repair option.
    • C、Set the default wireless profile type to the Use all-users only profile (recommended) option. Recreate the wireless network.
    • D、Set the default wireless profile type to the Use all-users and per-user profiles option. Recreate the wireless network by using the Save this network for me only option.

    正确答案:D

  • 第6题:

    All client computers on your company network run Windows 7 and are members of an Active Directory Domain Services domain. Employees using portable computers report that they get connected to a coffee shop wireless network from the company conference room. You need to ensure that the employees connect to the company wireless network by default from anywhere within the company premises. What should you do?()

    • A、Configure the Network authentication (Shared mode) setting.
    • B、Apply a Wireless Network Policy to set the network type to WPA-PSK.
    • C、Apply a Wireless Network Policy to automatically connect to the company wireless network.
    • D、Apply a Wireless Network Policy to set the company wireless network as the preferred network.

    正确答案:D

  • 第7题:

    单选题
    An administrator is concerned about users utilizing the company's wireless signal with their personal laptops. Which of the following is the BEST method to use to prevent unauthorized devices from using the company's wireless network?()
    A

    Secure VPN

    B

    MAC filtering

    C

    IP filtering

    D

    Static IP addresses


    正确答案: A
    解析: 暂无解析

  • 第8题:

    单选题
    A user states that the wireless router keeps rebooting while the power to the other equipment stays on. Which of the following should the technician perform to prevent users from rebooting the router?()
    A

    Change the default administrator password

    B

    Change the IP range of the wireless network

    C

    Hide the SSID

    D

    Disable WEP


    正确答案: B
    解析: 暂无解析

  • 第9题:

    单选题
    In which of the following scenarios would MAC filtering be MOST effective as a part of wireless security? ()
    A

    A public place where guests are free to access the wireless network.

    B

    A small office where a defined number of specific wireless devices are used.

    C

    A meeting room where various company users will access the wireless network during meetings. 

    D

    An office where some users are unable to use WPA encryption due to older wireless cards so they use MAC filtering.


    正确答案: A
    解析: 暂无解析

  • 第10题:

    单选题
    You need to design a Security strategy for the wireless network at all resort locations.What should you do?()
    A

    Connect the wireless access points to a dedicated subnet. Allow the subnet direct access to the Internet,but not to the company network.Require company users to establish a VPN to access company resources

    B

    Install Internet Authentication Service (IAS) on a domain controller.Configure the wireless access points to require IEEE 802.1x authentication

    C

    Establish IPSec policies on all company servers to request encryption from all computers that connect from the wireless IP networks

    D

    Configure all wireless access points to require the Wired Equivalent Privacy (WEP) protocol for all connections. Use a Group Policy object (GPO) to distribute the WEP keys to all computers in the domain


    正确答案: C
    解析: 暂无解析

  • 第11题:

    单选题
    An administrator is implementing a wireless network. Which of the following encryption technologies is the MOST secure method and will authenticate devices to the network?()
    A

    SSH

    B

    WEP

    C

    VPN

    D

    WPA


    正确答案: D
    解析: 暂无解析

  • 第12题:

    单选题
    A company wants to secure access to its internal wireless network. The company wants to use themost secure means to access the network. Which of the following is the BEST choice for wireless security in this situation?()
    A

    WEP encryption

    B

    Channel rotation

    C

    Disable SSID

    D

    WPA encryption


    正确答案: D
    解析: 暂无解析

  • 第13题:

    In which of the following scenarios would MAC filtering be MOST effective as a part of wireless security? ()

    • A、A public place where guests are free to access the wireless network.
    • B、A small office where a defined number of specific wireless devices are used.
    • C、A meeting room where various company users will access the wireless network during meetings. 
    • D、An office where some users are unable to use WPA encryption due to older wireless cards so they use MAC filtering.

    正确答案:B

  • 第14题:

    A company’s wireless network is called FOO and it is not publicly visible. In a wirelessconfiguration wizard, in which of the following locations should the technician put FOO?()

    • A、SSID
    • B、WPA Passphrase
    • C、WEP Key
    • D、Network Path

    正确答案:A

  • 第15题:

    A user states that the wireless router keeps rebooting while the power to the other equipment stays on. Which of the following should the technician perform to prevent users from rebooting the router?()

    • A、Change the default administrator password
    • B、Change the IP range of the wireless network
    • C、Hide the SSID
    • D、Disable WEP

    正确答案:A

  • 第16题:

    An administrator is implementing a wireless network. Which of the following encryption technologies is the MOST secure method and will authenticate devices to the network?()

    • A、SSH
    • B、WEP
    • C、VPN
    • D、WPA

    正确答案:D

  • 第17题:

    You need to design a Security strategy for the wireless network at all resort locations.What should you do?()

    • A、Connect the wireless access points to a dedicated subnet. Allow the subnet direct access to the Internet,but not to the company network.Require company users to establish a VPN to access company resources
    • B、Install Internet Authentication Service (IAS) on a domain controller.Configure the wireless access points to require IEEE 802.1x authentication
    • C、Establish IPSec policies on all company servers to request encryption from all computers that connect from the wireless IP networks
    • D、Configure all wireless access points to require the Wired Equivalent Privacy (WEP) protocol for all connections. Use a Group Policy object (GPO) to distribute the WEP keys to all computers in the domain

    正确答案:A

  • 第18题:

    单选题
    A company’s wireless network is called FOO and it is not publicly visible. In a wirelessconfiguration wizard, in which of the following locations should the technician put FOO?()
    A

    SSID

    B

    WPA Passphrase

    C

    WEP Key

    D

    Network Path


    正确答案: A
    解析: 暂无解析

  • 第19题:

    单选题
    Which statement best describes the Cisco 2700 Location Appliance collection of location information for wireless devices?()
    A

    all Wi-Fi devices on the WLAN send directly received signal strength indication (RSSI) information to the Cisco Wireless Location Appliance through SNMP

    B

    an AP collects RSSI information which is forwarded to wireless controllers through LWAPP. Wireless controllers forward aggregated RSSI to the location appliance through SNMP

    C

    the APs collect received signal strength indication (RSSI) information from all Wi-Fi devices and forward the information to the Cisco Wireless Location Appliance through the LWAPP

    D

    the Cisco WLAN controllers bypass the received signal strength indication (RSSI) information from all Wi-Fi devices to the Cisco Wireless Location Appliance through the LWAPP


    正确答案: B
    解析: 暂无解析

  • 第20题:

    单选题
    All client computers on your company network run Windows 7 and are members of an Active Directory Domain Services domain. Employees using portable computers report that they get connected to a coffee shop wireless network from the company conference room. You need to ensure that the employees connect to the company wireless network by default from anywhere within the company premises. What should you do?()
    A

    Configure the Network authentication (Shared mode) setting.

    B

    Apply a Wireless Network Policy to set the network type to WPA-PSK.

    C

    Apply a Wireless Network Policy to automatically connect to the company wireless network.

    D

    Apply a Wireless Network Policy to set the company wireless network as the preferred network.


    正确答案: B
    解析: 暂无解析

  • 第21题:

    单选题
    An administrator wants to limit access of a wireless network without requiring authorized users to enter a password or network key. Which of the following methods would MOST likely be implemented on the wireless network?()
    A

    Disable SSID

    B

    WPA

    C

    MAC filtering

    D

    RAS


    正确答案: C
    解析: 暂无解析

  • 第22题:

    单选题
    Users are unable to stay connected to the company's wireless network. Several times throughout the day the users' signals are dropped and they are forced to reconnect to the network. A technician determines the network cabling that supplies the WAP has been run inside with several power lines. Which of the following is the MOST likely cause of the network issue?()
    A

    Ashort

    B

    Open pairs

    C

    ESD

    D

    EMI


    正确答案: A
    解析: 暂无解析

  • 第23题:

    单选题
    A company needs strong wireless security enabled for minimal cost. Which of the following security measures is the BEST to use?()
    A

    WEP

    B

    Port filtering

    C

    WPA

    D

    Longer SSID broadcast intervals


    正确答案: B
    解析: 暂无解析

  • 第24题:

    单选题
    An administrator is concerned about users utilizing the company's wireless signal with their personal laptops. Which of the following is the BEST method to use to prevent unauthorized devices from using the company's wireless network?()
    A

    Secure VPN

    B

    MAC filtering

    C

    IP filtering

    D

    Static IP addresses


    正确答案: C
    解析: 暂无解析