N10-004

单选题Which of the following solutions will detect and disable a rogue access point?()A Port scanB Packet snifferC IPSD IDS

题目
单选题
Which of the following solutions will detect and disable a rogue access point?()
A

Port scan

B

Packet sniffer

C

IPS

D

IDS

如果没有搜索结果,请直接 联系老师 获取答案。
如果没有搜索结果,请直接 联系老师 获取答案。
相似问题和答案

第1题:

Which of the following actions will prevent a driver from being reinstalled automatically?()

A. Run the disable command.

B. Disable the device using Device Manager.

C. Review manufacturer manual.

D. Reboot the server, logon in Safe Mode, uninstall the driver.


参考答案:B

第2题:

Which of the following best describes a hash function?()

  • A、An irreversible fast encryption method
  • B、A reversible fast encryption method
  • C、A reversible value computed from a piece of data and used to detect modifications
  • D、An irreversible value computed froma piece of data and used to detect modifications
  • E、A table inwhich values are stored for efficient retrieval.

正确答案:D

第3题:

Which of the following technologies can detect and fix single bit memory errors?()

A. RAID

B. Registered memory

C. SDRAM

D. ECC


参考答案:D

第4题:

Which of the following should be configured on a wireless router to enhance security? (Select TWO).()

  • A、Disable DHCP
  • B、Change wireless channel
  • C、Disable SSID broadcasting
  • D、Change the default username and password
  • E、Use a static IP address

正确答案:C,D

第5题:

Which of the following would be the BEST way for Mike, a technician, to disallow other clients to access a WAP, if only the same clients will always be accessing it?()

  • A、Disable SSID broadcast
  • B、Enable MAC filtering
  • C、Disable DHCP server
  • D、Enable WEP encryption

正确答案:B

第6题:

Which of the following solutions will detect and disable a rogue access point?()

A.Port scan

B.Packet sniffer

C.IPS

D.IDS


参考答案:C

第7题:

When delivering the results of a Solutions Recommendation, which two of the following components should be included in the solutions presentation?()

  • A、additional partner services
  • B、the Value Assessment
  • C、the Discovery Guide
  • D、the benefits of your solution
  • E、employee concerns

正确答案:B,C

第8题:

Which of the following mitigation techniques would an administrator apply to a device in order torestrict remote access?()

A. Disable TELNET

B. Disable IGMP snooping

C. Enable TELNET but not SSL

D. Disable ICMP/ping on device


参考答案:A

第9题:

Which of the following is the BEST way to deny unauthorized computers access to a network? ()

  • A、Disable DHCP.
  • B、Use MAC filtering.
  • C、Disable the SSID broadcast.
  • D、Use a network firewall.

正确答案:D

第10题:

Which of the following protocols is used to disable switch ports automatically to prevent switchingloops?()

  • A、RIP
  • B、0S:F
  • C、STP
  • D、EGP

正确答案:C

更多相关问题