Ensure that all wireless networking equipment fully supports the IEE 802.11a, IEEE 802.11b, and IEEE 802.11g wireless networking protocols
Assign a random service set identifier (SSID) to each wireless access point. Disable broadcasting of SSIDs on all wireless access points
Create a firewall to block traffic to any IP address that did not originate from the company’s DHCP servers. Ensure that all wireless access points connect behind this new firewall
Configure a server to use Internet Authentication Service (IAS). Configure the wireless networking equipment to use the IEEE 802.1x protocol and the IAS server
第1题:
You need to design a method to standardize and deploy a baseline security configuration for servers. You solution must meet business requirements. What should you do?()
第2题:
You need to design a method for junior IT administrators to perform more IT support tasks. Your solution must meet business and security requirements. What should you do?()
第3题:
Your computer has a wireless network adapter installed. However, the computer fails to connect to the wireless network. You need to ensure that the computer is able to connect to the wireless network.What should you do?()
A.A
B.B
C.C
D.D
第4题:
You need to design a security patch management strategy. Your solution must meet business and security requirements, and it must accommodate the company’s resource restrictions. What should you do?()
第5题:
You need to design an authentication solution for the wireless network. Your solution must meet the security requirements. What should you do?()
第6题:
Your company has Active Directory Certificate Services (AD CS) and Network Access Protection (NAP) deployed on the network. You need to ensure that NAP policies are enforced on portable computers taht use a wireless connection to access the network. What should you do?()
第7题:
You need to design a method to protect traffic on the wireless network. Your solution must meet the requirements of the chief security officer. What should you do?()
第8题:
You are designing the wireless networks for the three warehouses. Your design must support the inventory and shipping management solution, and it must meet security requirements. What should you do?()
第9题:
You are designing an authentication strategy for the accounting department. Your solution must meet business requirements. What should you do?()
第10题:
You need to design a method to ensure that research intellectual property remains confidential. You solution must meet security requirements. What should you do?()