A company’s wireless network is called FOO and it is not publicly visible. In a wirelessconfiguration wizard, in which of the following locations should the technician put FOO?()A、SSIDB、WPA PassphraseC、WEP KeyD、Network Path

题目

A company’s wireless network is called FOO and it is not publicly visible. In a wirelessconfiguration wizard, in which of the following locations should the technician put FOO?()

  • A、SSID
  • B、WPA Passphrase
  • C、WEP Key
  • D、Network Path
参考答案和解析
正确答案:A
如果没有搜索结果或未解决您的问题,请直接 联系老师 获取答案。
相似问题和答案

第1题:

A company wants to secure access to its internal wireless network. The company wants to use themost secure means to access the network. Which of the following is the BEST choice for wireless security in this situation?()

A. WEP encryption

B. Channel rotation

C. Disable SSID

D. WPA encryption


参考答案:D

第2题:

An administrator is implementing a wireless network. Which of the following encryption technologies is the MOST secure method and will authenticate devices to the network?()

A.SSH

B.WEP

C.VPN

D.WPA


参考答案:D

第3题:

Mike, a technician, is replacing a wireless router on an existing small office home office (SOHO) network. The SSID, WPA and DHCP information has been correctly added. Which of the following must also be addressed?()

A. The administrative password needs to be changed.

B. The TKIP option needs to be enabled.

C. The WEP key needs to be changed.

D. Wireless access points need to be added.


参考答案:A

第4题:

In which of the following scenarios would MAC filtering be MOST effective as a part of wireless security? ()

  • A、A public place where guests are free to access the wireless network.
  • B、A small office where a defined number of specific wireless devices are used.
  • C、A meeting room where various company users will access the wireless network during meetings. 
  • D、An office where some users are unable to use WPA encryption due to older wireless cards so they use MAC filtering.

正确答案:B

第5题:

A network technician is installing a small wireless network. A requirement is that individual users must authenticate using usernames and passwords.Which of the following technologies would support users authenticating with encrypted usernames and passwords?()

A.WPA TLS

B.WPA PEAP

C.64-bit WEP

D.128-bit WEP


参考答案:B

第6题:

An administrator wants to limit access of a wireless network without requiring authorized users toenter a password or network key.Which of the following methods would MOST likely be implemented on the wireless network?()

A. Disable SSID

B. WPA

C. MAC filtering

D. RAS


参考答案:A

第7题:

Users are unable to stay connected to the company‘s wireless network. Several times throughoutthe day the users‘ signals are dropped and they are forced to reconnect to the network.A technician determines the network cabling that supplies the WAP has been run inside with severalpower lines.Which of the following is the MOST likely cause of the network issue?()

A.Ashort

B.Open pairs

C.ESD

D.EMI


参考答案:D

第8题:

Which of the following is used to deny or allow access to a wireless router network?()

A. SSID

B. SNMP

C. IMAP

D. MAC filtering


参考答案:D

第9题:

A company wants to secure access to its internal wireless network. The company wants to use themost secure means to access the network. Which of the following is the BEST choice for wireless security in this situation?()

  • A、WEP encryption
  • B、Channel rotation
  • C、Disable SSID
  • D、WPA encryption

正确答案:D

第10题:

An administrator is concerned about users utilizing the company's wireless signal with their personal laptops. Which of the following is the BEST method to use to prevent unauthorized devices from using the company's wireless network?()

  • A、Secure VPN
  • B、MAC filtering
  • C、IP filtering
  • D、Static IP addresses

正确答案:B

更多相关问题