单选题An administrator is implementing a wireless network. Which of the following encryption technologies is the MOST secure method and will authenticate devices to the network?()A SSHB WEPC VPND WPA

题目
单选题
An administrator is implementing a wireless network. Which of the following encryption technologies is the MOST secure method and will authenticate devices to the network?()
A

SSH

B

WEP

C

VPN

D

WPA

参考答案和解析
正确答案: D
解析: 暂无解析
如果没有搜索结果或未解决您的问题,请直接 联系老师 获取答案。
相似问题和答案

第1题:

An administrator is implementing a wireless network. Which of the following encryption technologies is the MOST secure method and will authenticate devices to the network?()

A.SSH

B.WEP

C.VPN

D.WPA


参考答案:D

第2题:

A company wants to secure access to its internal wireless network. The company wants to use themost secure means to access the network. Which of the following is the BEST choice for wireless security in this situation?()

  • A、WEP encryption
  • B、Channel rotation
  • C、Disable SSID
  • D、WPA encryption

正确答案:D

第3题:

Which of the following standards or encryption types is the MOST secure for wireless networking?()

A.WEP

B.AES

C.TKIP

D.DES


参考答案:B

第4题:

An administrator wants to limit access of a wireless network without requiring authorized users to enter a password or network key. Which of the following methods would MOST likely be implemented on the wireless network?()

  • A、Disable SSID
  • B、WPA
  • C、MAC filtering
  • D、RAS

正确答案:A

第5题:

Which of the following standards or encryption types is the MOST secure for wireless networking?()

  • A、WEP
  • B、AES
  • C、TKIP
  • D、DES

正确答案:B

第6题:

A network technician is installing a small wireless network. A requirement is that individual users must authenticate using usernames and passwords.Which of the following technologies would support users authenticating with encrypted usernames and passwords?()

A.WPA TLS

B.WPA PEAP

C.64-bit WEP

D.128-bit WEP


参考答案:B

第7题:

In which of the following scenarios would MAC filtering be MOST effective as a part of wireless security? ()

  • A、A public place where guests are free to access the wireless network.
  • B、A small office where a defined number of specific wireless devices are used.
  • C、A meeting room where various company users will access the wireless network during meetings. 
  • D、An office where some users are unable to use WPA encryption due to older wireless cards so they use MAC filtering.

正确答案:B

第8题:

A company wants to secure access to its internal wireless network. The company wants to use themost secure means to access the network. Which of the following is the BEST choice for wireless security in this situation?()

A. WEP encryption

B. Channel rotation

C. Disable SSID

D. WPA encryption


参考答案:D

第9题:

An administrator is concerned about users utilizing the company's wireless signal with their personal laptops. Which of the following is the BEST method to use to prevent unauthorized devices from using the company's wireless network?()

  • A、Secure VPN
  • B、MAC filtering
  • C、IP filtering
  • D、Static IP addresses

正确答案:B

第10题:

Which two statements best describe the wireless security standard that is defined by WPA? (Choose two.)()

  • A、It specifies use of a static encryption key that must be changed frequently to enhance security.
  • B、It requires use of an open authentication method.
  • C、It specifies the use of dynamic encryption keys that change each time a client establishes a connection.
  • D、It requires that all access points and wireless devices use the same encryption key.
  • E、It includes authentication by PSK

正确答案:C,E

更多相关问题