220-702

多选题For added security, a network administrator has decided to lock down the wireless network. Which of the following are ways to accomplish this? ()(Select TWO).ADisable all 802.11 trafficBDisable the SSID from broadcastingCDisable WPADEnable Bluetooth on

题目
多选题
For added security, a network administrator has decided to lock down the wireless network. Which of the following are ways to accomplish this? ()(Select TWO).
A

Disable all 802.11 traffic

B

Disable the SSID from broadcasting

C

Disable WPA

D

Enable Bluetooth only communication

E

Change the default admin password

F

Disable WEP

如果没有搜索结果,请直接 联系老师 获取答案。
如果没有搜索结果,请直接 联系老师 获取答案。
相似问题和答案

第1题:

An administrator is implementing a wireless network. Which of the following encryption technologies is the MOST secure method and will authenticate devices to the network?()

A.SSH

B.WEP

C.VPN

D.WPA


参考答案:D

第2题:

All of the following will interfere with a 2.4GHz wireless phone EXCEPT:()

A.Bluetooth.

B.802.11a.

C.802.11b.

D.802.11g.


参考答案:B

第3题:

Mike, a technician, is replacing a wireless router on an existing small office home office (SOHO) network. The SSID, WPA and DHCP information has been correctly added. Which of the following must also be addressed?()

A. The administrative password needs to be changed.

B. The TKIP option needs to be enabled.

C. The WEP key needs to be changed.

D. Wireless access points need to be added.


参考答案:A

第4题:

What are two ways with which a small business can keep a wireless business separate and secure from a wireless guest access network? () 

  • A、 auto-channel selection
  • B、 WMM QoS
  • C、 802.11F roaming
  • D、 multiple BSSIDs
  • E、 802.1Q VLANs
  • F、 AP detection

正确答案:D,E

第5题:

All users within an office are wirelessly connected to a network, except one user that has a valid connection on a leased IP address in a different range. Which of the following is a possible cause of the user having a different IP address range?()

  • A、The wireless access point is using MAC address filtering
  • B、The user has connected to a nearby wireless access point from another office
  • C、The user has configured the wireless settings with the wrong encryption type
  • D、The wireless access point has SSID broadcast disabled

正确答案:B

第6题:

Which of the following wireless standards can be used to avoid the 2.4GHz range?() (Select TWO).

A.802.11g

B.802.1X

C.802.11b

D.802.1n

E.802.11a


参考答案:D, E

第7题:

Your network contains a wired network and a wireless network. Users report that they experience intermittent problems accessing network resources when they connect to the internal wireless network. You discover that an unsecured rogue wireless access point uses the same Service Set Identifier (SSID) as the internal wireless network. You need to ensure that the users only connect to the internal wireless network. What should you do?()

A.Configure a Windows Connect Now Group Policy.

B.Configure a Wireless Network (IEEE 802.11) Policy.

C.Delete the rogue network from the Network and Sharing Center on each computer.

D.Create a Connection Manager Administration Kit (CMAK) profile and deploy it to all users.


参考答案:B

第8题:

When troubleshooting an 802.11g network. Which of the following can interfere with the network?()

A. 2.4 GHz cordless phone

B. 900 MHz cordless phone

C. Bluetooth headset

D. Bluetooth printer


参考答案:A

第9题:

Which of the following should be configured on a wireless router to enhance security? (Select TWO).()

  • A、Disable DHCP
  • B、Change wireless channel
  • C、Disable SSID broadcasting
  • D、Change the default username and password
  • E、Use a static IP address

正确答案:C,D

第10题:

For added security, a network administrator has decided to lock down the wireless network. Which of the following are ways to accomplish this? ()(Select TWO).

  • A、Disable all 802.11 traffic
  • B、Disable the SSID from broadcasting
  • C、Disable WPA
  • D、Enable Bluetooth only communication
  • E、Change the default admin password
  • F、Disable WEP

正确答案:B,E

更多相关问题