单项选择题
An administrator wants to limit access of a wireless network without requiring authorized users to
enter a password or network key.
Which of the following methods would MOST likely be implemented on the wireless network?()
A. Disable SSID
B. WPA
C. MAC filtering
D. RAS
相关考题
-
单项选择题
Which of the following mitigation techniques would an administrator apply to a device in order torestrict remote access?()
A. Disable TELNET
B. Disable IGMP snooping
C. Enable TELNET but not SSL
D. Disable ICMP/ping on device -
单项选择题
Web users are reporting issues downloading various types of media. Which of the following shouldthe administrator do FIRST?()
A. Find out what has recently changed on the network
B. Create an action plan and solution identifying potential effects.
C. Continue to gather information and see what other problems may exist.
D. Determine the most probable cause. -
单项选择题
When debugging a routing problem, the time-to-live (TTL) value can be used to determine:()
A. Number of routes available.
B. Number of router hops.
C. Time that an advertised route is valid.
D. Time to make a round trip.
