Which of the following mitigation techniques would an administrator apply to a device in order torestrict remote access?()
第1题:
An administrator wants to limit access of a wireless network without requiring authorized users toenter a password or network key.Which of the following methods would MOST likely be implemented on the wireless network?()
A. Disable SSID
B. WPA
C. MAC filtering
D. RAS
第2题:
A. Run the disable command.
B. Disable the device using Device Manager.
C. Review manufacturer manual.
D. Reboot the server, logon in Safe Mode, uninstall the driver.
第3题:
You have configured the Odyssey Access Client with a profile which has the "Disable Server Verification" setting cleared.What will be the result if the device certificate on the MAG Series device has expired and the user attempts to authenticate?()
A. The user will be instructed to call the network administrator.
B. The user will fail authentication.
C. The user will be prompted to install a new device certificate on the MAG Series device.
D. The user will successfully authenticate and have full network access.
第4题:
Which of the following solutions will detect and disable a rogue access point?()
第5题:
A user would like to ensure that only their family and their laptops can access a newly installed wireless router. Which of the following BEST accomplishes this?()
第6题:
A. Disable TELNET
B. Disable IGMP snooping
C. Enable TELNET but not SSL
D. Disable ICMP/ping on device
第7题:
Which of the following would be the BEST way for Mike, a technician, to disallow other clients to access a WAP, if only the same clients will always be accessing it?()
第8题:
A. Enable TPM
B. Enable BIOS password
C. Disable TPM
D. Boot sequence
第9题:
Which of the following is the BEST way to deny unauthorized computers access to a network? ()
第10题:
You are the administrator of your company’s network. You install Windows 2000 Professional on 10 computers in the graphics department. The 10 computers have built in USB controllers. You physically install a USB tablet pointing device on each computer. You install the 32-bit manufacturer tablets software on each computer. A tablet icon appears in the central panel to configure the device but the device does not work. You want the USB tablets to work on 10 computers. What should you do?()