更多“单选题Which of the following is the BEST way to deny unauthorized computers access to a network? ()A Disable DHCP.B Use MAC filtering.C Disable the SSID broadcast.D Use a network firewall.”相关问题
  • 第1题:

    Which of the following would be the BEST way for Mike, a technician, to disallow other clients to access a WAP, if only the same clients will always be accessing it?()

    • A、Disable SSID broadcast
    • B、Enable MAC filtering
    • C、Disable DHCP server
    • D、Enable WEP encryption

    正确答案:B

  • 第2题:

    An administrator is concerned about users utilizing the company's wireless signal with their personal laptops. Which of the following is the BEST method to use to prevent unauthorized devices from using the company's wireless network?()

    • A、Secure VPN
    • B、MAC filtering
    • C、IP filtering
    • D、Static IP addresses

    正确答案:B

  • 第3题:

    Which of the following should be configured on a wireless router to enhance security? (Select TWO).()

    • A、Disable DHCP
    • B、Change wireless channel
    • C、Disable SSID broadcasting
    • D、Change the default username and password
    • E、Use a static IP address

    正确答案:C,D

  • 第4题:

    Which of the following would be the BEST way to restrict access to the WAP from certain clients?()

    • A、Disable DHCP server
    • B、Enable WEP encryption
    • C、Disable SSID broadcast
    • D、Enable MAC filtering

    正确答案:D

  • 第5题:

    Which of the following is used to deny or allow access to a wireless router network?()

    • A、SSID
    • B、SNMP
    • C、IMAP
    • D、MAC filtering

    正确答案:D

  • 第6题:

    Your company has Active Directory Certificate Services (AD CS) and Network Access Protection (NAP)  deployed on the network. You need to ensure that NAP policies are enforced on portable computers taht  use a wireless connection to access the network. What should you do?()

    • A、 Configure all access points to use 802.1X authentication
    • B、 Configure all protable computers to use MS-CHAP v2 authentication
    • C、 Use the Group Policy Management Console to access the wireless group policy settings, and enable the Prevent connections to ad-hoc networks option.
    • D、 Use the Group Policy Management Console to access the wireless group policy settings, and disable the Prevent connections to infrastructure networks option.

    正确答案:A

  • 第7题:

    You use a Windows 2000 Professional computer.You are responsible for maintaining Company’s client contact list. You want other users on the networkto be able to read the client contact list. You use Windows Explorer to share the client contact list folderon the network.You want users touse the most current available information when contacting clients. You want toprevent users from enabling offline access for the network share that contains the client contact list.What should you do?()

    • A、Use Synchronization Manager to configure synchronization not to occur when users are connected to the LAN connection.
    • B、Use Windows Explorer to grant users Special access for the reports on the network share.
    • C、Use Windows Explorer to disable caching for the reports on the network share.
    • D、Use Windows Explorer to disable Offline files.

    正确答案:C

  • 第8题:

    Your company has active directory certificate services (AD CS) and network access protection (NAP) deployed on the network. You need to ensure that NAP policies are enforced on portable computers that use a wireless connection to access the network. What should you do?()

    • A、Configure all access points to use 802.1x authentication.
    • B、Configure all protable computers to use MS-CHAP v2 authentication.
    • C、Use the group policy management console to access the wireless group policy settings, and enable the prevent connections to ad-hoc network option.
    • D、Use the group policy management console to access the wireless group policy settings, and disable the prevent connections to infrastructure networks option.

    正确答案:A

  • 第9题:

    单选题
    Which of the following would be the BEST way to restrict access to the WAP from certain clients?()
    A

    Disable DHCP server

    B

    Enable WEP encryption

    C

    Disable SSID broadcast

    D

    Enable MAC filtering


    正确答案: B
    解析: 暂无解析

  • 第10题:

    单选题
    A technician installed a new wireless access point on an existing small office home office (SOHO) network with a selective security option enabled. All wireless computers connect to the new network except one computer that cannot connect to the wireless network. Which of the following is the cause?()
    A

    The network uses MAC filtering

    B

    The network uses WEP

    C

    The network uses SSID broadcast

    D

    The network uses WPA


    正确答案: D
    解析: 暂无解析

  • 第11题:

    单选题
    Your company has Active Directory Certificate Services (AD CS) and Network Access Protection (NAP) deployed on the network.You need to ensure that NAP policies are enforced on portable computers that use a wireless connection to access the network.  What should you do?()
    A

    Configure all access points to use 802.1X authentication.

    B

    Configure all portable computers to use MS-CHAP v2 authentication.

    C

    Use the Group Policy Management Console to access the wireless Group Policy settings, and enable the Prevent connections to ad-hoc networks option.

    D

    Use the Group Policy Management Console to access the wireless Group Policy settings, and disable the Prevent connections to infrastructure networks option.


    正确答案: B
    解析: 暂无解析

  • 第12题:

    单选题
    A company wants to secure access to its internal wireless network. The company wants to use themost secure means to access the network. Which of the following is the BEST choice for wireless security in this situation?()
    A

    WEP encryption

    B

    Channel rotation

    C

    Disable SSID

    D

    WPA encryption


    正确答案: D
    解析: 暂无解析

  • 第13题:

    Which of the following is the BEST way to deny unauthorized computers access to a network? ()

    • A、Disable DHCP.
    • B、Use MAC filtering.
    • C、Disable the SSID broadcast.
    • D、Use a network firewall.

    正确答案:D

  • 第14题:

    An administrator wants to limit access of a wireless network without requiring authorized users to enter a password or network key. Which of the following methods would MOST likely be implemented on the wireless network?()

    • A、Disable SSID
    • B、WPA
    • C、MAC filtering
    • D、RAS

    正确答案:A

  • 第15题:

    As a network technician, do you know what is a recommended practice for secure configurationmanagement?()

    • A、Disable post scan
    • B、Use SSH or SSL
    • C、Enable trust levels
    • D、Deny echo replies on all edge routers

    正确答案:B

  • 第16题:

    For added security, a network administrator has decided to lock down the wireless network. Which of the following are ways to accomplish this? ()(Select TWO).

    • A、Disable all 802.11 traffic
    • B、Disable the SSID from broadcasting
    • C、Disable WPA
    • D、Enable Bluetooth only communication
    • E、Change the default admin password
    • F、Disable WEP

    正确答案:B,E

  • 第17题:

    A technician installed a new wireless access point on an existing small office home office (SOHO) network with a selective security option enabled. All wireless computers connect to the new network except one computer that cannot connect to the wireless network. Which of the following is the cause?()

    • A、The network uses MAC filtering
    • B、The network uses WEP
    • C、The network uses SSID broadcast
    • D、The network uses WPA

    正确答案:A

  • 第18题:

    You are the network administrator for The network consists of an internal network and a perimeter network. The internal network is protected by a firewall. The perimeter network is exposed to the Internet. You are deploying 10 Windows Server 2003 computers as Web servers. The servers will be located in the perimeter network. The servers will host only publicly available Web pages. You want to reduce the possibility that users can gain unauthorized access to the servers. You are concerned that a user will probe the Web servers and find ports or services to attack. What should you do?()

    • A、Disable File and Printer Sharing on the servers.
    • B、Disable the IIS Admin service on the servers.
    • C、Enable Server Message Block (SMB) signing on the servers.
    • D、Assign the Secure Server (Require Security) IPSec policy to the servers.

    正确答案:A

  • 第19题:

    Your company has Active Directory Certificate Services (AD CS) and Network Access Protection (NAP) deployed on the network.You need to ensure that NAP policies are enforced on portable computers that use a wireless connection to access the network.  What should you do?()

    • A、Configure all access points to use 802.1X authentication.
    • B、Configure all portable computers to use MS-CHAP v2 authentication.
    • C、Use the Group Policy Management Console to access the wireless Group Policy settings, and enable the Prevent connections to ad-hoc networks option.
    • D、Use the Group Policy Management Console to access the wireless Group Policy settings, and disable the Prevent connections to infrastructure networks option.

    正确答案:A

  • 第20题:

    单选题
    Your company has Active Directory Certificate Services (AD CS) and Network Access Protection (NAP)  deployed on the network. You need to ensure that NAP policies are enforced on portable computers taht  use a wireless connection to access the network. What should you do?()
    A

     Configure all access points to use 802.1X authentication

    B

     Configure all protable computers to use MS-CHAP v2 authentication

    C

     Use the Group Policy Management Console to access the wireless group policy settings, and enable the Prevent connections to ad-hoc networks option.

    D

     Use the Group Policy Management Console to access the wireless group policy settings, and disable the Prevent connections to infrastructure networks option.


    正确答案: B
    解析: 暂无解析

  • 第21题:

    单选题
    Two new PCs will have a DVD-RW drive for support use. The PCs will be used for Point of Salestransactions and everything will be password protected or disabled. Which of the following is the BEST way to disable the DVD-RW drives?()
    A

    The Registry

    B

    Device Manager

    C

    Disk Management

    D

    The BIOS


    正确答案: A
    解析: 暂无解析

  • 第22题:

    单选题
    You need to design a method to protect traffic on the wireless network. Your solution must meet the requirements of the chief security officer. What should you do?()
    A

    Configure the wireless access points in Denver and Dallas to filter unauthorized Media Access Control (MAC) addresses

    B

    Configure the wireless network connection properties for all computers in Denver and in Dallas to use the same network name that the wireless access points use

    C

    Create a GPO and link it to the Denver OU and to the Dallas OU. Create a wireless network policy and configure it to use Windows to configure wireless network settings for the Denver and the Dallas networks

    D

    Create a GPO and link it to the Denver OU and to the Dallas OU. Create a wireless network policy and enable data encryption and dynamic key assignments for the Denver and Dallas networks


    正确答案: D
    解析: 暂无解析

  • 第23题:

    单选题
    Your company has active directory certificate services (AD CS) and network access protection (NAP) deployed on the network. You need to ensure that NAP policies are enforced on portable computers that use a wireless connection to access the network. What should you do?()
    A

    Configure all access points to use 802.1x authentication.

    B

    Configure all protable computers to use MS-CHAP v2 authentication.

    C

    Use the group policy management console to access the wireless group policy settings, and enable the prevent connections to ad-hoc network option.

    D

    Use the group policy management console to access the wireless group policy settings, and disable the prevent connections to infrastructure networks option.


    正确答案: A
    解析: 暂无解析