多項(xiàng)選擇題Which two practices help secure the configuration utilities on wireless access points from unauthorized access? (Choose two.)()

A.assigning a private IP address to the AP
B.changing the default SSID value
C.configuring a new administrator password
D.changing the mixed mode setting to single mode
E.configuring traffic filtering


您可能感興趣的試卷

你可能感興趣的試題

1.單項(xiàng)選擇題What will an Ethernet switch do if it receives a unicast frame with a destination MAC that is listed in the switch table?()

A.The switch will not forward unicast frames.
B.The switch will forward the frame to a specific port.
C.The switch will return a copy of the frame out the source port.
D.The switch will remove the destination MAC from the switch table.
E.The switch will forward the frame to all ports except the port on which it was received.

2.多項(xiàng)選擇題Which of the following are key characteristics of PPP? (Choose three.)()

A.can be used over analog circuits
B.maps Layer 2 to Layer 3 address
C.encapsulates several routed protocols
D.supports IP only
E.provides error correction

3.多項(xiàng)選擇題What TCP/IP stack configuration features can DHCP provide, in addition to assigning an IP address? (Choose three.)()

A.default gateway
B.DNS servers
C.FTP server
D.helper address
E.subnet mask
F.TFTP server

4.多項(xiàng)選擇題What are two characteristics of Telnet? (Choose two.)()

A.It sends data in clear text format.
B.It is no longer supported on Cisco network devices.
C.It is more secure than SSH
D.It requires an enterprise license in order to be implemented.
E.It requires that the destination device be configured to support Telnet connections.

5.單項(xiàng)選擇題Which of the following is true regarding the use of switches and hubs for network connectivity?()

A.Switches take less time to process frames than hubs take.
B.Switches do not forward broadcasts.
C.Hubs can filter frames.
D.Using hubs can increase the amount of bandwidth available to hosts.
E.Switches increase the number of collision domains in the network.

6.多項(xiàng)選擇題Which statements are true about EIGRP successor routes? (Choose two.)()

A.A successor route is used by EIGRP to forward traffic to a destination.
B.Successor routes are saved in the topology table to be used if the primary route fails.
C.Successor routes are flagged as "active" in the routing table.
D.A successor route may be backed up by a feasible successor route.
E.Successor routes are stored in the neighbor table following the discovery process.

7.多項(xiàng)選擇題The network security policy requires that only one host be permitted to attach dynamically to each switch interface. If that policy is violated, the interface should shut down. Which two commands must the network administrator configure on the 2950 Catalyst switch to meet this policy? (Choose two.)()

A.Switch1(config-if)# switchport port-security maximum 1
B.Switch1(config)# mac-address-table secure
C.Switch1(config)# access-list 10 permit ip host
D.Switch1(config-if)# switchport port-security violation shutdown
E.Switch1(config-if)# ip access-group 10

8.多項(xiàng)選擇題Why does the data communication industry use the layered OSI reference model? (Choose two.)()

A.It divides the network communication process into smaller and simpler components, thus aiding component development, design, and troubleshooting.
B.It enables equipment from different vendors to use the same electronic components, thus saving research and development funds.
C.It supports the evolution of multiple competing standards, and thus provides business opportunities for equipment manufacturers.
D.It encourages industry standardization by defining what functions occur at each layer of the model.
E.It provides a means by which changes in functionality in one layer require changes in other layers.

10.多項(xiàng)選擇題Which two passwords must be supplied in order to connect by Telnet to a properly secured Cisco switch and make changes to the device configuration? (Choose two.)()

A.console password
B.vty password
C.aux password
D.tty password
E.enable secret password
F.username password

最新試題

On which options are standard access list based?()

題型:單項(xiàng)選擇題

Which command is used to display the collection of OSPF link states?()

題型:單項(xiàng)選擇題

At which layer of the OSI model is RSTP used to prevent loops?()

題型:單項(xiàng)選擇題

Which Cisco IOS diagnostics command can disrupt the operation of a router under high-load conditions?()

題型:單項(xiàng)選擇題

Which protocol reduces administrative overhead in a switched network by allowing the configuration of a new VLAN to be distributed to all the switches in a domain?()

題型:單項(xiàng)選擇題

A network administrator needs to configure a serial link between the main office and a remote location.The router at the remote office is a non-cisco router. How should the network administrator configure the serial interface of the main office router to make the connection?()

題型:單項(xiàng)選擇題

A router receives information about network 192.168.10.0/24 from multiple sources.What will the router consider the most reliable information about the path to that network?()

題型:單項(xiàng)選擇題

Which command encrypts all plaintext passwords?()

題型:單項(xiàng)選擇題

An administrator must assign static IP addresses to the servers in a network.For network 192.168.20.24/29, the router is assigned the first usable host address while the sales server is given the last usable host address. Which of the following should be entered into the IP propertied box for the sales server?()

題型:單項(xiàng)選擇題

What is the default administrative distance of OSPF?()

題型:單項(xiàng)選擇題