Which of the following should be used to restrict access to

题目
单选题
Which of the following should be used to restrict access to a wireless network?()
A

Port forwarding

B

Enable SSID broadcast

C

Wireless encryption

D

Enable DMZ

如果没有搜索结果或未解决您的问题,请直接 联系老师 获取答案。
相似问题和答案

第1题:

Which two statements are true regarding the USING clause in table joins?()

  • A、It can be used to join a maximum of three tables 
  • B、It can be used to restrict the number of columns used in a NATURAL join 
  • C、It can be used to access data from tables through equijoins as well as nonequijoins 
  • D、It can be used to join tables that have columns with the same name and compatible data types

正确答案:B,D

第2题:

Which of the following could be used to restrict access to the local web server to only certain IP addresses?()

  • A、 Create an ACL.
  • B、 Create an application exception.
  • C、 Configure IPSec.
  • D、 Block port 80.

正确答案:A

第3题:

Which of the following should be used to restrict access to a wireless network?()

A. Port forwarding

B. Enable SSID broadcast

C. Wireless encryption

D. Enable DMZ


参考答案:C

第4题:

Which of the following should be used to check a serial port for functionality?()

  • A、Loopback plug
  • B、Toner probe
  • C、Multimeter
  • D、Cable tester

正确答案:A

第5题:

A network technician is installing a series of three access points to cover the entire wing of a building. Each access point has a wired connection and 802.11g is being used for the wireless transmission. Which of the following channels should be used for the access points?()

  • A、Channels 1-6-11
  • B、Channels 1-3-5
  • C、Channels 7-11-1
  • D、Channels 2-4-6

正确答案:A

第6题:

Which of the following technologies can be used to remotely gain access to a server console?()

  • A、PS/2 KVM
  • B、LDAP
  • C、VNC
  • D、Remote desktop
  • E、VPN

正确答案:C,D

第7题:

Which of the following would be the BEST way to restrict access to the WAP from certain clients?()

  • A、Disable DHCP server
  • B、Enable WEP encryption
  • C、Disable SSID broadcast
  • D、Enable MAC filtering

正确答案:D

第8题:

Which of the following protocols should be used to monitor network performance?()

A.SNTP

B.SMTP

C.HTTP

D.SNMP


参考答案:D

第9题:

Which of the following is used to deny or allow access to a wireless router network?()

  • A、SSID
  • B、SNMP
  • C、IMAP
  • D、MAC filtering

正确答案:D

第10题:

An administrator needs to configure a server to restrict mail traffic to an application server for security reasons.  Which of the following techniques can be used to manage this?()

  • A、 PAT
  • B、 ACLs
  • C、 Subnet masking
  • D、 Port blocking

正确答案:B

更多相关问题