CMS专题

单选题Which of the following network modifications should be implemented to extend the wirelessnetwork range and allow out-of-range users to share the Internet connection?()A Create a new VLAN for the out-of-range users.B Add a wireless access point for the

题目
单选题
Which of the following network modifications should be implemented to extend the wirelessnetwork range and allow out-of-range users to share the Internet connection?()
A

Create a new VLAN for the out-of-range users.

B

Add a wireless access point for the out-of-range users.

C

Upgrade the out-of-range users’ SSID searching software.

D

Enable network sharing on the users’ computers that are within range.

如果没有搜索结果,请直接 联系老师 获取答案。
如果没有搜索结果,请直接 联系老师 获取答案。
相似问题和答案

第1题:

Which of the following protocols is the LEAST secure and should be avoided on a wireless network?()

A.WEP

B.PEAP

C.WPA

D.TKIP


参考答案:A

第2题:

An administrator is setting up a network and would like to prevent users from having the ability toplug their PC into the network to receive an IP address.Which of the following addressing schemes should the technician use?()

A.NAT

B.Dynamic

C.Subnetting

D.Static


参考答案:D

第3题:

A network technician is concerned about the environmental effects of power consumption and heat from network resources Limited space is also a concern. Which of the following technologies should be implemented?()

A. Circuit switching

B. Network address translation

C. Power over Ethernet

D. Virtual servers


参考答案:D

第4题:

A network technician is concerned about the environmental effects of power consumption and heat from network resources Limited space is also a concern. Which of the following technologies should be implemented?()

  • A、Circuit switching
  • B、Network address translation
  • C、Power over Ethernet
  • D、Virtual servers

正确答案:D

第5题:

An engineer is preparing an implementation plan in which the configuration needs to influence BGP‘s choice of best path.Which of the following is least likely to be used by the configuration in this imple mentation plan?()

A. Weight

B. Origin code

C. AS_Path

D. Local_Pref


参考答案:B

第6题:

Which of the following documents should always be kept up-to-date after any major changes aremade to a network backbone?()

A. Network diagram

B. Performance baseline

C. Network security procedure

D. Company policy


参考答案:A

第7题:

Which of the following should an administrator do after running a command from the console onthe perimeter router?()

A. Update the configuration logs

B. Update the network wiring schematics

C. Update the network configuration procedures

D. Compare the configuration with the baseline


参考答案:A

第8题:

Which of the following should be used to restrict access to a wireless network?()

A. Port forwarding

B. Enable SSID broadcast

C. Wireless encryption

D. Enable DMZ


参考答案:C

第9题:

Which of the following statements is true about the 80/20 rule (Select all that apply)?()

  • A、20 percent of the traffic on a network segment should be local.
  • B、no more than 20 percent of the network traffic should be able to move across a backbone.
  • C、no more than 80 percent of the network traffic should be able to move across a backbone.
  • D、80 percent of the traffic on a network segment should be local.

正确答案:B,D

第10题:

A new department is formed and a new section of the building is being built out for them. All 50 new employees will need access to the wireless network. Which of the following should be completed to allow these new employees access to the wireless network?()

  • A、Frequency settings should be changed
  • B、Additional WAPs should be installed
  • C、Channels should be changed
  • D、VLANs should be added

正确答案:B

更多相关问题