A company wants to secure access to its internal wireless ne

题目
单选题
A company wants to secure access to its internal wireless network. The company wants to use themost secure means to access the network. Which of the following is the BEST choice for wireless security in this situation?()
A

WEP encryption

B

Channel rotation

C

Disable SSID

D

WPA encryption

如果没有搜索结果或未解决您的问题,请直接 联系老师 获取答案。
相似问题和答案

第1题:

When configuring Cisco Secure ACS to support wireless EAP authentication,which device mustbeconfigured as a AAA client?()

  • A、Location Appliance
  • B、controller-based access points
  • C、wireless clients
  • D、Wireless Control System
  • E、wireless controllers

正确答案:E

第2题:

LDAP is being used throughout the Company wireless network.  Which statement about the  Lightweight Access Point Protocol (LWAPP) protocol is true?()

  • A、 The processing of 802.11 data and management protocols and access point capabilities is  distributed between a lightweight access point and a centralized WLAN controller.
  • B、 LWAPP advertises its WDS capability and participates in electing the best WDS device for the  wireless LAN.
  • C、 LWAPP aggregates radio management forward information and sends it to a wireless LAN  solution engine.
  • D、 LWAPP authenticates all access points in the subnet and establishes a secure communication  channel with each of them.
  • E、 None of the other alternatives apply

正确答案:A

第3题:

A company wants to secure access to its internal wireless network. The company wants to use themost secure means to access the network. Which of the following is the BEST choice for wireless security in this situation?()

A. WEP encryption

B. Channel rotation

C. Disable SSID

D. WPA encryption


参考答案:D

第4题:

In the Company wireless LAN,  what is the function of the Service Set Identifier (SSID)?()

  • A、 The SSID must match on both the Company client and the Company access point and provides  MAC Address Authentication to authenticate the client to the access point.
  • B、 The SSID should be configured on the Company client site only and provides data-privacy  functions and authentication to the access point.
  • C、 The SSID must match on both the Company client and the Company access point and provides encryption keys for authentication to the access point.
  • D、 The SSID must match on both the Company client and the Company access point. The SSID is  advertised in plain-text in the access point beacon messages.  
  • E、 None of the other alternatives apply

正确答案:D

第5题:

You need to set up a Company AP to act as a wireless repeater.  What are three characteristics of  this wireless repeater topology?()

  • A、 The recommended overlap of the access point on the wired LAN and the wireless repeater is  25%.
  • B、 Autonomous access points are required.
  • C、 The SSID of the root access point must be configured on the repeater access point.
  • D、 The recommended overlap of the access point on the wired LAN and the wireless repeater is  50%.
  • E、 Lightweight access points are required.
  • F、 The recommended overlap of the access point on the wired LAN and the wireless repeater is  75%.
  • G、 The SSID of the root access point must be distinct from that of the repeater access point.

正确答案:B,C,D

第6题:

LDAP is being utilized throughout the Company Wireless network.  Which issue or set of issues  does the Lightweight Access Point Protocol (LWAPP) address? ()

  • A、 Reduction of processing in wireless controllers
  • B、 Distributed approach to authentication, encryption, and policy enforcement
  • C、 Access point discovery, information exchange, and configuration
  • D、 Provides security by blocking communication between access points and wireless clients
  • E、 None of the other alternatives apply.

正确答案:C

第7题:

An administrator is concerned about users utilizing the company's wireless signal with their personal laptops. Which of the following is the BEST method to use to prevent unauthorized devices from using the company's wireless network?()

  • A、Secure VPN
  • B、MAC filtering
  • C、IP filtering
  • D、Static IP addresses

正确答案:B

第8题:

The Schuyler and Livingston Iron Works has been working on getting its network security under control. It has set up VPN with IPSec links to its suppliers. It has installed network vulnerability scanners to proactively identify areas of weakness, and it monitors and responds to security events as they occur. It also employs extensive access control lists, stateful firewall implementations, and dedicated firewall appliances. The company has been growing very fast lately and wants to make sure it is up to date on security measures.Which two areas of security would you advise the company to strengthen? ()

A. intrusion protection

B. identity

C. secure connectivity

D. security management


参考答案:B, D

第9题:

The Schuyler and Livingston Iron Works has been working on getting its network security undercontrol. It has set up VPN with IPSec links to its suppliers. It has installed network vulnerabilityscanners to proactively identify areas of weakness, and it monitors and responds to securityevents as they occur. It also employs extensive access control lists, stateful firewall implementations, and dedicated firewall appliances. The company has been growing very fastlately and wants to make sure it is up to date on security measures. Which two areas of securitywould you advise the company to strengthen? ()

  • A、 intrusion protection
  • B、 identity
  • C、 secure connectivity
  • D、 security management

正确答案:A,B

第10题:

The Schuyler and Livingston Iron Works has been working on getting its network security under control. It has set up VPN with IPSec links to its suppliers. It has installed network vulnerability scanners to proactively identify areas of weakness, and it monitors and responds to security events as they occur. It also employs extensive access control lists, stateful firewall implementations, and dedicated firewall appliances. The company has been growing very fast lately and wants to make sure it is up to date on security measures.Which two areas of security would you advise the company to strengthen? ()

  • A、intrusion protection
  • B、identity
  • C、secure connectivity
  • D、security management

正确答案:B,D

更多相关问题