Disable DHCP.
Use MAC filtering.
Disable the SSID broadcast.
Use a network firewall.
第1题:
Which of the following would be the BEST way for Mike, a technician, to disallow other clients to access a WAP, if only the same clients will always be accessing it?()
第2题:
An administrator is concerned about users utilizing the company's wireless signal with their personal laptops. Which of the following is the BEST method to use to prevent unauthorized devices from using the company's wireless network?()
第3题:
Which of the following should be configured on a wireless router to enhance security? (Select TWO).()
第4题:
Which of the following would be the BEST way to restrict access to the WAP from certain clients?()
第5题:
Which of the following is used to deny or allow access to a wireless router network?()
第6题:
Your company has Active Directory Certificate Services (AD CS) and Network Access Protection (NAP) deployed on the network. You need to ensure that NAP policies are enforced on portable computers taht use a wireless connection to access the network. What should you do?()
第7题:
You use a Windows 2000 Professional computer.You are responsible for maintaining Company’s client contact list. You want other users on the networkto be able to read the client contact list. You use Windows Explorer to share the client contact list folderon the network.You want users touse the most current available information when contacting clients. You want toprevent users from enabling offline access for the network share that contains the client contact list.What should you do?()
第8题:
Your company has active directory certificate services (AD CS) and network access protection (NAP) deployed on the network. You need to ensure that NAP policies are enforced on portable computers that use a wireless connection to access the network. What should you do?()
第9题:
Disable DHCP server
Enable WEP encryption
Disable SSID broadcast
Enable MAC filtering
第10题:
The network uses MAC filtering
The network uses WEP
The network uses SSID broadcast
The network uses WPA
第11题:
Configure all access points to use 802.1X authentication.
Configure all portable computers to use MS-CHAP v2 authentication.
Use the Group Policy Management Console to access the wireless Group Policy settings, and enable the Prevent connections to ad-hoc networks option.
Use the Group Policy Management Console to access the wireless Group Policy settings, and disable the Prevent connections to infrastructure networks option.
第12题:
WEP encryption
Channel rotation
Disable SSID
WPA encryption
第13题:
Which of the following is the BEST way to deny unauthorized computers access to a network? ()
第14题:
An administrator wants to limit access of a wireless network without requiring authorized users to enter a password or network key. Which of the following methods would MOST likely be implemented on the wireless network?()
第15题:
As a network technician, do you know what is a recommended practice for secure configurationmanagement?()
第16题:
For added security, a network administrator has decided to lock down the wireless network. Which of the following are ways to accomplish this? ()(Select TWO).
第17题:
A technician installed a new wireless access point on an existing small office home office (SOHO) network with a selective security option enabled. All wireless computers connect to the new network except one computer that cannot connect to the wireless network. Which of the following is the cause?()
第18题:
You are the network administrator for The network consists of an internal network and a perimeter network. The internal network is protected by a firewall. The perimeter network is exposed to the Internet. You are deploying 10 Windows Server 2003 computers as Web servers. The servers will be located in the perimeter network. The servers will host only publicly available Web pages. You want to reduce the possibility that users can gain unauthorized access to the servers. You are concerned that a user will probe the Web servers and find ports or services to attack. What should you do?()
第19题:
Your company has Active Directory Certificate Services (AD CS) and Network Access Protection (NAP) deployed on the network.You need to ensure that NAP policies are enforced on portable computers that use a wireless connection to access the network. What should you do?()
第20题:
Configure all access points to use 802.1X authentication
Configure all protable computers to use MS-CHAP v2 authentication
Use the Group Policy Management Console to access the wireless group policy settings, and enable the Prevent connections to ad-hoc networks option.
Use the Group Policy Management Console to access the wireless group policy settings, and disable the Prevent connections to infrastructure networks option.
第21题:
The Registry
Device Manager
Disk Management
The BIOS
第22题:
Configure the wireless access points in Denver and Dallas to filter unauthorized Media Access Control (MAC) addresses
Configure the wireless network connection properties for all computers in Denver and in Dallas to use the same network name that the wireless access points use
Create a GPO and link it to the Denver OU and to the Dallas OU. Create a wireless network policy and configure it to use Windows to configure wireless network settings for the Denver and the Dallas networks
Create a GPO and link it to the Denver OU and to the Dallas OU. Create a wireless network policy and enable data encryption and dynamic key assignments for the Denver and Dallas networks
第23题:
Configure all access points to use 802.1x authentication.
Configure all protable computers to use MS-CHAP v2 authentication.
Use the group policy management console to access the wireless group policy settings, and enable the prevent connections to ad-hoc network option.
Use the group policy management console to access the wireless group policy settings, and disable the prevent connections to infrastructure networks option.