АвтоАвтоматизацияАрхитектураАстрономияАудитБиологияБухгалтерияВоенное делоГенетикаГеографияГеологияГосударствоДомДругоеЖурналистика и СМИИзобретательствоИностранные языкиИнформатикаИскусствоИсторияКомпьютерыКулинарияКультураЛексикологияЛитератураЛогикаМаркетингМатематикаМашиностроениеМедицинаМенеджментМеталлы и СваркаМеханикаМузыкаНаселениеОбразованиеОхрана безопасности жизниОхрана ТрудаПедагогикаПолитикаПравоПриборостроениеПрограммированиеПроизводствоПромышленностьПсихологияРадиоРегилияСвязьСоциологияСпортСтандартизацияСтроительствоТехнологииТорговляТуризмФизикаФизиологияФилософияФинансыХимияХозяйствоЦеннообразованиеЧерчениеЭкологияЭконометрикаЭкономикаЭлектроникаЮриспунденкция

All wireless devices on the same WLAN must have the same SSID

Читайте также:
  1. A Brief Introduction to Wireless Technology.
  2. Advantages and Disadvantages of Wireless Networking.
  3. Disadvantages of Wireless Networking
  4. Display Devices
  5. Installing Peripheral Devices
  6. Inventory of stylistics: Expressive means and stylistic devices. Tropes.
  7. Powerplant and propulsion devices
  8. Unit 1. Functional Translation of Stylistic Devices
  9. Unit 12. Stylistic Devices
  10. Which two statements about a service set identifier (SSID) are true:all wireless devices on the same WLAN must have the same SSID;tells a wireless device to which WLAN it belongs

consists of a 32-character string and is not case sensitive

Tells a wireless device to which WLAN it belongs

Which type of network attack involves the disabling or corruption of networks, systems, or services?

access attacks

Denial of service attacks

reconnaissance attacks

malicious code attacks

Which command will backup the configuration that is stored in NVRAM to a TFTP server?

copy tftp running-config

Copy startup-config tftp

copy running-config tftp

copy tftp startup-config

Open the PT Activity.

How long will a user be blocked if the user exceeds the maximum allowed number of unsuccessful login attempts?

Minutes

1 minute

4 minutes

2 minutes

Fill in the blank. Do not use abbreviations.

The ” show version ” command that is issued on a router is used to verify the value of the software configuration register.

What is a security feature of using NAT on a network?

denies all packets that originate from private IP addresses

Allows internal IP addresses to be concealed from external users

denies all internal hosts from communicating outside their own network

allows external IP addresses to be concealed from internal users

A network administrator has determined that various computers on the network are infected with a worm. Which sequence of steps should be followed to mitigate the worm attack?

containment, quarantine, treatment, and inoculation

treatment, quarantine, inoculation, and containment

inoculation, containment, quarantine, and treatment

Containment, inoculation, quarantine, and treatment

Which WLAN security protocol generates a new dynamic key each time a client establishes a connection with the AP?

PSK

WPA

EAP

WEP

Refer to the exhibit. Baseline documentation for a small company had ping round trip time statistics of 36/97/132 between hosts H1 and H3. Today the network administrator checked connectivity by pinging between hosts H1 and H3 that resulted in a round trip time of 1458/2390/6066. What does this indicate to the network administrator?

Something is causing interference between H1 and R1.

H3 is not connected properly to the network.

Performance between the networks is within expected parameters.

Connectivity between H1 and H3 is fine.

Something is causing a time delay between the networks.

When should an administrator establish a network baseline?

when the traffic is at peak in the network

when there is a sudden drop in traffic

at the lowest point of traffic in the network

At regular intervals over a period of time

A ping fails when performed from router R1 to directly connected router R2. The network administrator then proceeds to issue the show cdp neighbors command. Why would the network administrator issue this command if the ping failed between the two routers?

The network administrator wants to verify the IP address configured on router R2.

The network administrator suspects a virus because the ping command did not work.

The network administrator wants to determine if connectivity can be established from a non-directly connected network.


1 | 2 | 3 | 4 | 5 | 6 | 7 | 8 | 9 | 10 | 11 | 12 | 13 | 14 | 15 | 16 | 17 | 18 | 19 | 20 | 21 | 22 | 23 | 24 | 25 | 26 | 27 | 28 | 29 | 30 | 31 | 32 | 33 | 34 | 35 | 36 | 37 | 38 | 39 | 40 | 41 |

Поиск по сайту:



Все материалы представленные на сайте исключительно с целью ознакомления читателями и не преследуют коммерческих целей или нарушение авторских прав. Студалл.Орг (0.003 сек.)