CompTIA认证考试

Which of the following is used to deny or allow access to a wireless router network?()A、SSIDB、SNMPC、IMAPD、MAC filtering

题目

Which of the following is used to deny or allow access to a wireless router network?()

  • A、SSID
  • B、SNMP
  • C、IMAP
  • D、MAC filtering
如果没有搜索结果,请直接 联系老师 获取答案。
如果没有搜索结果,请直接 联系老师 获取答案。
相似问题和答案

第1题:

Which of the following should be used to restrict access to a wireless network?()

A. Port forwarding

B. Enable SSID broadcast

C. Wireless encryption

D. Enable DMZ


参考答案:C

第2题:

Which of the following access list statements would deny traffic from a specifichost?()

A. Router(config)# access-list 1 deny 172.31.212.74 any

B. Router(config)# access-list 1 deny 10.6.111.48 host

C. Router(config)# access-list 1 deny 172.16.4.13 0.0.0.0

D. Router(config)# access-list 1 deny 192.168.14.132 255.255.255.0

E. Router(config)# access-list 1 deny 192.168.166.127 255.255.255.255


参考答案:C

第3题:

Which of the following is used to deny or allow access to a wireless router network?()

A. SSID

B. SNMP

C. IMAP

D. MAC filtering


参考答案:D

第4题:

In which of the following scenarios would MAC filtering be MOST effective as a part of wireless security? ()

  • A、A public place where guests are free to access the wireless network.
  • B、A small office where a defined number of specific wireless devices are used.
  • C、A meeting room where various company users will access the wireless network during meetings. 
  • D、An office where some users are unable to use WPA encryption due to older wireless cards so they use MAC filtering.

正确答案:B

第5题:

Which of the following access list statements would deny traffic from a specifichost?()

  • A、Router(config)# access-list 1 deny 172.31.212.74 any
  • B、Router(config)# access-list 1 deny 10.6.111.48 host
  • C、Router(config)# access-list 1 deny 172.16.4.13 0.0.0.0
  • D、Router(config)# access-list 1 deny 192.168.14.132 255.255.255.0
  • E、Router(config)# access-list 1 deny 192.168.166.127 255.255.255.255

正确答案:C

第6题:

An administrator wants to limit access of a wireless network without requiring authorized users toenter a password or network key.Which of the following methods would MOST likely be implemented on the wireless network?()

A. Disable SSID

B. WPA

C. MAC filtering

D. RAS


参考答案:A

第7题:

Which of the following should be used to restrict access to a wireless network?()

  • A、Port forwarding
  • B、Enable SSID broadcast
  • C、Wireless encryption
  • D、Enable DMZ

正确答案:C

第8题:

Which of the following features on a wireless router maps the private IP address to a public IPaddress?()

A. SSID

B. NAT

C. MAC filtering

D. DHCP


参考答案:B

第9题:

Which of the following functions on the wireless LAN controller is used to determine whether ornot a rogue access point is connected to the same Layer 2 network?()

  • A、rogue detector
  • B、rogue containment
  • C、RLDP
  • D、RIDP

正确答案:C

第10题:

A user would like to ensure that only their family and their laptops can access a newly installed wireless router. Which of the following BEST accomplishes this?()

  • A、MAC filtering
  • B、Disable DHCP
  • C、Static IP addresses
  • D、Port forwarding

正确答案:A

更多相关问题