更多“单选题Which of the following technologies is the MOST secure form of wireless encryption?()A SSLB WPAC WEPD TLS”相关问题
  • 第1题:

    A network technician is installing a small wireless network. A requirement is that individual users must authenticate using usernames and passwords.Which of the following technologies would support users authenticating with encrypted usernames and passwords?()

    A.WPA TLS

    B.WPA PEAP

    C.64-bit WEP

    D.128-bit WEP


    参考答案:B

  • 第2题:

    A company wants to secure access to its internal wireless network. The company wants to use themost secure means to access the network. Which of the following is the BEST choice for wireless security in this situation?()

    • A、WEP encryption
    • B、Channel rotation
    • C、Disable SSID
    • D、WPA encryption

    正确答案:D

  • 第3题:

    An administrator wants to limit access of a wireless network without requiring authorized users to enter a password or network key. Which of the following methods would MOST likely be implemented on the wireless network?()

    • A、Disable SSID
    • B、WPA
    • C、MAC filtering
    • D、RAS

    正确答案:A

  • 第4题:

    Which of the following technologies is the MOST secure form of wireless encryption?()

    • A、SSL
    • B、WPA
    • C、WEP
    • D、TLS

    正确答案:B

  • 第5题:

    A network technician is installing a small wireless network. A requirement is that individual users must authenticate using usernames and passwords. Which of the following technologies would support users authenticating with encrypted usernames and passwords?()

    • A、WPA TLS
    • B、WPA PEAP
    • C、64-bit WEP
    • D、128-bit WEP

    正确答案:B

  • 第6题:

    An administrator is implementing a wireless network. Which of the following encryption technologies is the MOST secure method and will authenticate devices to the network?()

    • A、SSH
    • B、WEP
    • C、VPN
    • D、WPA

    正确答案:D

  • 第7题:

    A customer wants to have employees work from remote locations as well as in the office.  All communications must be secure and files must be protected from access by unauthorized people.  The employee’s applications (database inserts and reads) are only accessed with a web browser.  Which of the following capabilities is necessary?()

    • A、SSL
    • B、PGP
    • C、File encryption program
    • D、Public key encryption

    正确答案:A

  • 第8题:

    单选题
    Which of the following technologies is the MOST secure form of wireless encryption?()
    A

    SSL

    B

    WPA

    C

    WEP

    D

    TLS


    正确答案: A
    解析: 暂无解析

  • 第9题:

    单选题
    Which of the following methods of user authentication is the MOST secure?()
    A

    CHAP

    B

    Kerberos

    C

    TACACS

    D

    EAP


    正确答案: B
    解析: 暂无解析

  • 第10题:

    单选题
    A company finished upgrading the wireless encryption to WPA2 Enterprise. The administrator receives a call from a user who is unable to connect to the company wireless. Which of the following is MOST likely causing the connection problem?()
    A

    The laptop is missing the software supplicant

    B

    The access point SSID is hidden.

    C

    The laptop only supports TKIP and AES encryption,

    D

    The access point is on the wrong channel.


    正确答案: B
    解析: 暂无解析

  • 第11题:

    单选题
    Which of the following standards or encryption types is the MOST secure for wireless networking?()
    A

    WEP

    B

    AES

    C

    TKIP

    D

    DES


    正确答案: B
    解析: 暂无解析

  • 第12题:

    单选题
    A network technician is installing a small wireless network. A requirement is that individual users must authenticate using usernames and passwords. Which of the following technologies would support users authenticating with encrypted usernames and passwords?()
    A

    WPA TLS

    B

    WPA PEAP

    C

    64-bit WEP

    D

    128-bit WEP


    正确答案: A
    解析: 暂无解析

  • 第13题:

    Which two of the following eap types requires a certificate to be installed on the cisco secure acs?()

    • A、eap-peap 
    • B、eap-fast 
    • C、eap-cisco wireless (leap) 
    • D、eap-tls 
    • E、eap-md5

    正确答案:A,D

  • 第14题:

    Which of the following standards or encryption types is the MOST secure for wireless networking?()

    • A、WEP
    • B、AES
    • C、TKIP
    • D、DES

    正确答案:B

  • 第15题:

    Which of the following is the MOST likely cause of a low wireless signal after an internal wireless adapter on a laptop was replaced?()

    • A、The wireless card must be calibrated to the laptop.
    • B、The correct preshared encryption key must be installed to boost the signal.
    • C、The MAC address of the new wireless card will have to be added to the WAP to get the full signal.
    • D、The antenna wires for the wireless card were not attached.

    正确答案:D

  • 第16题:

    When installing a wireless network in a large area, which of the following is the FIRST thing thatshould be considered when trying to get the MOST coverage?()

    • A、SSID naming
    • B、Device placement
    • C、Encryption methods
    • D、Channel selection

    正确答案:B

  • 第17题:

    A company finished upgrading the wireless encryption to WPA2 Enterprise. The administrator receives a call from a user who is unable to connect to the company wireless. Which of the following is MOST likely causing the connection problem?()

    • A、The laptop is missing the software supplicant
    • B、The access point SSID is hidden.
    • C、The laptop only supports TKIP and AES encryption,
    • D、The access point is on the wrong channel.

    正确答案:A

  • 第18题:

    Which of the following wireless security techniques is the MOST secure?()

    • A、Enable Wired Equivalent Privacy
    • B、Disable SSID broadcast
    • C、Enable Wi-Fi Protected Access
    • D、Enable MAC filtering

    正确答案:C

  • 第19题:

    单选题
    A company finished upgrading the wireless encryption to WPA2 Enterprise. The administrator receives a call from a user who is unable to connect to the company wireless. Which of the following is MOST likely causing the connection problem?()
    A

    The laptop is missing the software supplicant

    B

    The access point SSID is hidden.

    C

    The laptop only supports TKIP and AES encryption,

    D

    The access point is on the wrong channel.


    正确答案: A
    解析: 暂无解析

  • 第20题:

    单选题
    Which of the following protocols is the LEAST secure and should be avoided on a wireless network?()
    A

    WEP

    B

    PEAP

    C

    WPA

    D

    TKIP


    正确答案: A
    解析: 暂无解析

  • 第21题:

    单选题
    Which of the following wireless security techniques is the MOST secure?()
    A

    Enable Wired Equivalent Privacy

    B

    Disable SSID broadcast

    C

    Enable Wi-Fi Protected Access

    D

    Enable MAC filtering


    正确答案: D
    解析: 暂无解析

  • 第22题:

    单选题
    An administrator is implementing a wireless network. Which of the following encryption technologies is the MOST secure method and will authenticate devices to the network?()
    A

    SSH

    B

    WEP

    C

    VPN

    D

    WPA


    正确答案: D
    解析: 暂无解析

  • 第23题:

    单选题
    A company wants to secure access to its internal wireless network. The company wants to use themost secure means to access the network. Which of the following is the BEST choice for wireless security in this situation?()
    A

    WEP encryption

    B

    Channel rotation

    C

    Disable SSID

    D

    WPA encryption


    正确答案: D
    解析: 暂无解析

  • 第24题:

    单选题
    Which of the following is the MOST likely cause of a low wireless signal after an internal wireless adapter on a laptop was replaced?()
    A

    The wireless card must be calibrated to the laptop.

    B

    The correct preshared encryption key must be installed to boost the signal.

    C

    The MAC address of the new wireless card will have to be added to the WAP to get the full signal.

    D

    The antenna wires for the wireless card were not attached.


    正确答案: D
    解析: 暂无解析