A company needs strong wireless security enabled for minimal cost. Which of the following security measures is the BEST to use?()
第1题:
A company wants to secure access to its internal wireless network. The company wants to use themost secure means to access the network. Which of the following is the BEST choice for wireless security in this situation?()
A. WEP encryption
B. Channel rotation
C. Disable SSID
D. WPA encryption
第2题:
A.WEP
B.PEAP
C.WPA
D.TKIP
第3题:
A. WEP
B. WPA2
C. WPA
D. HTTPS
第4题:
A company wants to secure access to its internal wireless network. The company wants to use themost secure means to access the network. Which of the following is the BEST choice for wireless security in this situation?()
第5题:
Which of the following should be used to restrict access to a wireless network?()
第6题:
A.Encryption
B.DHCP
C.Password
D.SSID
第7题:
Refer to the exhibit. A junior network administrator was given the task of configuring port security on SwitchA to allow only PC_A to access the switched network through port fa0/1. If any other device is detected, the port is to drop frames from this device. The administrator configured the interface and tested it with successful pings from PC_A to RouterA, and then observes the output from these two show commands.Which two of these changes are necessary for SwitchA to meet the requirements? ()
A.Port security needs to be globally enabled.
B.Port security needs to be enabled on the interface.
C.Port security needs to be configured to shut down the interface in the event of a violation.
D.Port security needs to be configured to allow only one learned MAC address.
E.Port security interface counters need to be cleared before using the show command.
F.The port security configuration needs to be saved to NVRAM before it can become active.
第8题:
A. WEP
B. Port filtering
C. WPA
D. Longer SSID broadcast intervals
第9题:
Which of the following commands on the wireless interface of a cisco 3845 integrated services router allows the ssid to broadcast?()
第10题:
Which of the following is the BEST way to deny unauthorized computers access to a network? ()