Disable all 802.11 traffic
Disable the SSID from broadcasting
Disable WPA
Enable Bluetooth only communication
Change the default admin password
Disable WEP
第1题:
The Schuyler and Livingston Iron Works has been working on getting its network security under control. It has set up VPN with IPSec links to its suppliers. It has installed network vulnerability scanners to proactively identify areas of weakness, and it monitors and responds to security events as they occur. It also employs extensive access control lists, stateful firewall implementations, and dedicated firewall appliances. The company has been growing very fast lately and wants to make sure it is up to date on security measures.Which two areas of security would you advise the company to strengthen? ()
A. intrusion protection
B. identity
C. secure connectivity
D. security management
第2题:
An administrator has decided to use a Shared Ethernet Adapter (SEA) as part of a virtualized environment. Due to the expected traffic across the SEA, the administrator has decided to use an aggregation of two physical Ethernet adapters, ent0 and ent1 as the backing device in the VIO server to increase the available network bandwidth. Which of the following commands would successfully create an aggregation device within a VIO server? ()
第3题:
The network administrator has configured port security on a Ezonexam switch. Why would a network administrator configure port security on this Ezonexam device?
A.To prevent unauthorized hosts from getting access to the LAN
B.To limit the number of Layer 2 broadcasts on a particular switch port
C.To prevent unauthorized Telnet or SSH access to a switch port
D.To prevent the IP and MAC address of the switch and associated ports
E.None of the above
第4题:
The Schuyler and Livingston Iron Works has been working on getting its network security under control. It has set up VPN with IPSec links to its suppliers. It has installed network vulnerability scanners to proactively identify areas of weakness, and it monitors and responds to security events as they occur. It also employs extensive access control lists, stateful firewall implementations, and dedicated firewall appliances. The company has been growing very fast lately and wants to make sure it is up to date on security measures.Which two areas of security would you advise the company to strengthen? ()
第5题:
An administrator has added a new device to a system and wants to determine if it has been correctly added to the ODM database. Which command would the system administrator use?()
第6题:
A network administrator needs to configure port security on a switch.which two statements are true?()
第7题:
An administrator has added an additional network adapter to each cluster node. The adapters have been configured and tested, and the /etc/hosts file has been updated. However,the adapters do not appear in the pick list when the administrator tries to define the adapters to HACMP. What would be required to correct this problem?()
第8题:
A network administrator has configured source NAT, translating to an address that is on a locally connected subnet.The administrator sees the translation working, but traffic does not appear to come back.What is causing the problem?()
A. The host needs to open the telnet port.
B. The host needs a route for the translated address.
C. The administrator must use a proxy-arp policy for the translated address.
D. The administrator must use a security policy, which will allow communication between the zones.
第9题:
A network administrator needs to configure port security on a switch.which two statements are true?()
第10题:
For added security, a network administrator has decided to lock down the wireless network. Which of the following are ways to accomplish this? ()(Select TWO).