For added security, a network ad

题目

For added security, a network administrator has decided to lock down the wireless network. Which of the following are ways to accomplish this? ()(Select TWO).

  • A、Disable all 802.11 traffic
  • B、Disable the SSID from broadcasting
  • C、Disable WPA
  • D、Enable Bluetooth only communication
  • E、Change the default admin password
  • F、Disable WEP
如果没有搜索结果或未解决您的问题,请直接 联系老师 获取答案。
相似问题和答案

第1题:

Network security consists of policies and practices to prevent and monitor( )access,misuse,modification, or denial of a computer network and network-accessible resources.Network security involves the authorization of access to data in a network,which is controlled by the network( ). Users choose or are assigned an ID and password or other authenticating information that allows them to access to information and programs within their authority.Network security secures the network,as well as protecting and overseeing operations being done. The most common and simple way of protecting a network resource is by assigning it a(请作答此空)name and a corresponding password. Network security starts with authentication.Once authenticated a ( ) enforces policies such as what services are allowed to be accessed by the network users. Though effective to prevent unauthorized access, this component may fail to check potentially harmful content such as computer( )or Trojans being transmitted over the network

A.complex
B.unique
C.catchy
D.long

答案:B
解析:
网络安全概念。

第2题:

What are the benefit of using Netflow?()

  • A、Network, Application & User Monitoring
  • B、Network Planning
  • C、Security Analysis
  • D、Accounting/Billing

正确答案:A,C

第3题:

Which of the following would be used to test out the security of a specific network by allowing it toreceive security attacks?()

A. Honeynet

B. Honeypot

C. Vulnerability scanner

D. Network based IDS


参考答案:A

第4题:

Which two are needed components when designing and implementing a security solution?()

  • A、detailed VLAN information
  • B、an incident response plan
  • C、results of testing the new network configuration
  • D、an existing hierarchical network topology
  • E、a security policy for your organization

正确答案:B,E

第5题:

A network vulnerability scanner is part of which critical element of network and system security?()

  • A、host security
  • B、perimeter security
  • C、security monitoring
  • D、policy management

正确答案:C

第6题:

What are three characteristics that buyers of Cisco Small Business routers typically look for?()

  • A、 basic security options
  • B、 simple network configuration
  • C、 advanced network configuration
  • D、 integrated solutions
  • E、 advanced security options
  • F、 point products

正确答案:B,E,F

第7题:

How does the Cisco Security Agent proactively stop both known and unknown attacks?()

  • A、 It reverse engineers and documents the attack
  • B、 It looks subjectively at network traffic for abnormal flows of behavior
  • C、 It creates a signature and updates the network security policies
  • D、 It actively monitors all vulnerable areas of the network

正确答案:B

第8题:

A network vulnerability scanner is part of which critical element of network and system security?()

A. host security

B. perimeter security

C. security monitoring

D. policy management


参考答案:C

第9题:

You are tasked with designing a security solution for your network.  What information should be gathered prior to designing the solution?()

  • A、IP addressing design plans so that the network can be appropriately segmented to mitigate potential network threats
  • B、a list of the customer requirements
  • C、detailed security device specifications
  • D、results from pilot network testing

正确答案:B

第10题:

Which of the following would be used to test out the security of a specific network by allowing it toreceive security attacks?()

  • A、Honeynet
  • B、Honeypot
  • C、Vulnerability scanner
  • D、Network based IDS

正确答案:A

更多相关问题