niusouti.com

Your network contains a wired network and a wireless network. Users report that they experience intermittent problems accessing network resources when they connect to the internal wireless network. You discover that an unsecured rogue wireless access poin

题目

Your network contains a wired network and a wireless network. Users report that they experience intermittent problems accessing network resources when they connect to the internal wireless network. You discover that an unsecured rogue wireless access point uses the same Service Set Identifier (SSID) as the internal wireless network. You need to ensure that the users only connect to the internal wireless network. What should you do?()

A.Configure a Windows Connect Now Group Policy.

B.Configure a Wireless Network (IEEE 802.11) Policy.

C.Delete the rogue network from the Network and Sharing Center on each computer.

D.Create a Connection Manager Administration Kit (CMAK) profile and deploy it to all users.


相似考题
参考答案和解析
参考答案:B
更多“Your network contains a wired network and a wireless network. Users report that they exper ”相关问题
  • 第1题:

    Your computer has a wireless network adapter installed. However, the computer fails to connect to the wireless network. You need to ensure that the computer is able to connect to the wireless network.What should you do?()

    A.A

    B.B

    C.C

    D.D


    参考答案:D

  • 第2题:

    Your computer has a wireless network adapter installed. However, the computer fails to connect to the wireless network.  You need to ensure that the computer is able to connect to the wireless network.  What should you do?()

    • A、Change the Network Category setting of the wireless connection to Public.
    • B、Enable the Internet Connection Sharing feature on the wireless network adapter.
    • C、Rename the wireless network adapter to match the Service Set Identifier (SSID) of the wireless network.
    • D、Configure the wireless network adapter to connect to the appropriate wireless network from the Connect to a network list.

    正确答案:D

  • 第3题:

    The Cisco Unified Wireless Network minimizes the TCO and maximizes woreless network uptime by optimizing which two deployment, management, and security features?()

    • A、 unified wireless and wired infrastructure for a single point of control for all WLAN traffic
    • B、 simplified management of central or remotely located access points
    • C、 extension features to wired network services, such as denial of service prevention and ACLs
    • D、 threat defense with a robust wired IDS

    正确答案:A,B

  • 第4题:

    Users are unable to stay connected to the company's wireless network. Several times throughout the day the users' signals are dropped and they are forced to reconnect to the network. A technician determines the network cabling that supplies the WAP has been run inside with several power lines. Which of the following is the MOST likely cause of the network issue?()

    • A、Ashort
    • B、Open pairs
    • C、ESD
    • D、EMI

    正确答案:D

  • 第5题:

    Your computer has a wired network adapter and a wireless network adapter. You use the wireless network adapter only when traveling.  You need to configure the network adapter profile settings to ensure that other systems are allowed to discover your computer only when you are at home.  What are two possible ways to achieve this goal?()

    • A、When you configure access to the wired network at home, set the wired network adapter location type to Private.
    • B、When you configure access to the wired network at home, set the wired network adapter location type to Public.
    • C、When you configure access to the public wireless access points, set the wireless network adapter location type to Private.
    • D、When you configure access to the public wireless access points, set the wireless network adapter location type to Public.

    正确答案:A,D

  • 第6题:

    You share your computer with a co-worker by using separate user accounts to log on. Your co-worker modifies the wireless network properties. When you use the computer, the change in properties is not reflected.  You need to ensure that you can view all the changes made to the wireless network properties.   What should you do?()

    • A、Disable the Connect even if the network is not broadcasting option.
    • B、In the Network and Sharing Center window, click the Diagnose and repair option.
    • C、Set the default wireless profile type to the Use all-users only profile (recommended) option. Recreate the wireless network.
    • D、Set the default wireless profile type to the Use all-users and per-user profiles option. Recreate the wireless network with the Save this network for me only option.

    正确答案:C

  • 第7题:

    All client computers on your company network run Windows 7 and are members of an Active Directory Domain Services domain. Employees using portable computers report that they get connected to a coffee shop wireless network from the company conference room. You need to ensure that the employees connect to the company wireless network by default from anywhere within the company premises. What should you do?()

    • A、Configure the Network authentication (Shared mode) setting.
    • B、Apply a Wireless Network Policy to set the network type to WPA-PSK.
    • C、Apply a Wireless Network Policy to automatically connect to the company wireless network.
    • D、Apply a Wireless Network Policy to set the company wireless network as the preferred network.

    正确答案:D

  • 第8题:

    You are a network administrator for your company. The company has a main office and a branch office. The branch office has a cable modem connection to the Internet and uses a virtual private network (VPN) connection to access resources on the main office network. The cable modem is connected to a Windows XP Professional computer named Pro1. You configure Internet Connection Sharing (ICS) on Pro1 to allow users in the branch office to use the VPN connection. ICS sets the network adapter to use the IP address 192.168.0.1. Several sales representatives in the branch office use wireless network adapters to share files between their client computers. They need access to the VPN connection to upload sales reports to the main office. You install a wireless network adapter in Pro1 and configure it with the appropriate settings for the wireless LAN. The sales representatives who use the wireless LAN report that they cannot access the VPN connection. However, they are able to connect to resources in the branch office. Users on the wired network do not report any connectivity problems. The sales representatives need to be able to access the VPN. What should you do?() 

    • A、Configure the wireless network connection on Pro1 so that it has an IP address of 192. 168. 0. 2.
    • B、Disable and then re-enable Internet Connection Sharing (ICS) on Pro1.
    • C、Create a network bridge between the wired and wireless connections on Pro1.  
    • D、Clear the Allow other network users to control or disable the shared Internet connection check box in the advanced properties of the VPN connection.

    正确答案:C

  • 第9题:

    多选题
    Your computer has a wired network adapter and a wireless network adapter. You use the wireless network adapter only when you are traveling.  You need to configure the network adapter profile settings to ensure that the computer discovers other network devices only when you are at home.  Which two actions should you perform?()
    A

    When you configure access to the wired network at home, set the wired network adapter location type to Public.

    B

    When you configure access to the wired network at home, set the wired network adapter location type to Private.

    C

    When you configure access to the public wireless access points, set the wireless network adapter location type to Public.

    D

    When you configure access to the public wireless access points, set the wireless network adapter location type to Private.


    正确答案: D,B
    解析: 暂无解析

  • 第10题:

    单选题
    Your computer connects to both an ad hoc wireless network and a wired network. You need to allow other wireless clients to access the wired network.  What should you do? ()
    A

    Set the security type to the No authentication (Open) option.

    B

    Configure the wired and wireless network adapters as a network bridge.

    C

    Modify the wireless network profile type to the Use all-user profiles only (recommended) option.

    D

    On each wireless client, set the Service Set Identifier (SSID) for a new wireless network to the name of your wired network adapter.


    正确答案: C
    解析: 暂无解析

  • 第11题:

    单选题
    A user signs into the Junos Pulse Access Control Service on a wired network. The user then migrates to a wireless network, receives a new IP address, and notices that the session is disconnected.In the admin GUI, what must be configured for the user to stay connected when migrating from a wired to a wireless network?()
    A

    Persistent session

    B

    Dynamic evaluation

    C

    Roaming session

    D

    Browser request follow-through


    正确答案: B
    解析: 暂无解析

  • 第12题:

    多选题
    Your wireless network is not listed in the Connect to a network window of your computer. You need to connect to your wireless network.  Which two actions should you perform?()
    A

    Right-click and click the Diagnose option in the Connect to a network window.

    B

    Set the security type value to No authentication in the wireless network properties dialog box.

    C

    Click the Manually connect to a wireless network option in the Set up a connection or network window.

    D

    In the Wireless Network properties dialog box, click the Connect even if the network is not broadcasting option.

    E

    Configure the correct IP address, subnet mask, and default gateway for the target network in the wireless network connection properties dialog box.


    正确答案: A,D
    解析: 暂无解析

  • 第13题:

    You connect your computer to a wireless network. You discover that this new connection fails to show in the Connect to a network window.You need to view this connection in the Connect to a network window.What should you do?()

    A.A

    B.B

    C.C

    D.D


    参考答案:D

  • 第14题:

    Which two statement best describes the Cisco Unified Wireless Network? ()

    • A、 The Cisco Unified Wireless Network provides the framework to segregate wired and wireless networks to deliver the best security for companies that are deploying WLANs
    • B、 The Cisco Unified Wireless Network provides the framework to integrate and extend wired and wireless networks to deliver the lowest-possible total cost of ownership for companies that are deploying WLANs
    • C、 The Cisco Unified Wireless Network extends wireless awareness into important elements of the network infrastructure, providing the same level of security for WLANs that organizations have come to expect from their VPNs
    • D、 The Cisco Unified Wireless Network extends wireless awareness into important elements of the network infrastructure, providing the same level of security, sociability, reliability, ease of deployment, and management for WLANs that organizations have come to expect from their wired LANs

    正确答案:B,D

  • 第15题:

    The Cisco Unified Wireless Network minimizes the TCO and maximizes wireless network uptimeby optimizing which two deployment, management, and security features?()

    • A、 unified wireless and wired infrastructure for a single point of control for all WLAN traffic
    • B、 simplified management of central or remotely located access points
    • C、 extension features to wired network services, such as denial of service prevention and ACLs
    • D、 threat defense with a robust wired IDS

    正确答案:A,B

  • 第16题:

    You share your portable computer with a co-worker. You use separate user accounts to log on. A wireless network is available to you and your co-worker.  You need to prevent your co-worker from modifying your wireless network profile.  What should you do?()

    • A、Disable the Connect even if the network is not broadcasting option.
    • B、In the Network and Sharing Center window, click the Diagnose and repair option.
    • C、Set the default wireless profile type to the Use all-users only profile (recommended) option. Recreate the wireless network.
    • D、Set the default wireless profile type to the Use all-users and per-user profiles option. Recreate the wireless network by using the Save this network for me only option.

    正确答案:D

  • 第17题:

    You need to design an authentication solution for the wireless network. Your solution must meet the security requirements. What should you do?()

    • A、Create wireless VPNs using L2TP/IPSec between the client computers to the wireless access point
    • B、Configure IEEE 802.1x authentication with smart cards
    • C、Configure the wireless network to use Wired Equivalent Privacy (WEP)
    • D、Install and configure an Internet Authentication Service (IAS) server

    正确答案:C

  • 第18题:

    Your network contains an internal network and a perimeter network. The internal network contains a single Active Directory site.  The perimeter network contains two Exchange Server 2010 Edge Transport servers. You plan to deploy an Exchange Server 2010 organization on the internal network.  You need to plan the deployment of Hub Transport server roles to meet the following requirements:.If a single Hub Transport server fails, e-mail messages from the Internet must be delivered to the Mailboxservers. .If a single Hub Transport server fails, users must be able to send e-mail messages to other users thathave mailboxes on the same Mailbox server.  What should you include in the plan?()

    • A、Deploy one Edge Transport server on the internal network, and then configure EdgeSync  synchronization.
    • B、Deploy one Hub Transport server on the internal network, and then configure EdgeSync  synchronization.
    • C、Deploy one Hub Transport server on the internal network and one Hub Transport server on the   perimeter network.
    • D、Deploy two Hub Transport servers on the internal network.

    正确答案:D

  • 第19题:

    Your computer uses both wired and wireless network connections. The networks are not connected to each other.  You disallow incoming connections in Microsoft Windows Firewall. You create a shared folder. Users on the wireless network cannot access the shared folder.  You need to allow access to the shared folder from the wireless network. You also need to maintain the security of the wired network.  What should you do?()

    • A、Turn off the Windows Firewall feature.
    • B、Disable the Block all incoming connections option.
    • C、Turn off the Spyware and other malware protection option.
    • D、Enable the File and Printer Sharing exception in the firewall settings of the wireless network adapter.

    正确答案:D

  • 第20题:

    单选题
    You share your portable computer with a co-worker. You use separate user accounts to log on. A wireless network is available to you and your co-worker.  You need to prevent your co-worker from modifying your wireless network profile.  What should you do?()
    A

    Disable the Connect even if the network is not broadcasting option.

    B

    In the Network and Sharing Center window, click the Diagnose and repair option.

    C

    Set the default wireless profile type to the Use all-users only profile (recommended) option. Recreate the wireless network.

    D

    Set the default wireless profile type to the Use all-users and per-user profiles option. Recreate the wireless network by using the Save this network for me only option.


    正确答案: D
    解析: 暂无解析

  • 第21题:

    单选题
    ertkiller .com has purchased laptop computers that will be used to connect to a wireless network. You create a laptop organizational unit and create a Group Policy Object (GPO) and configure user profiles by utilizing the names of approved wireless networks. You link the GPO to the laptop organizational unit. The new laptop users complain to you that they cannot connect to a wireless network.  What should you do to enforce the group policy wireless settings to the laptop computers()
    A

    Execute gpupdate/target:computer command at the command prompt on laptop computers

    B

    Execute Add a network command and leave the SSID (service set identifier) blank

    C

    Execute gpupdate/boot command at the command prompt on laptops computers

    D

    Connect each laptop computer to a wired network and log off the laptop computer and then login again.

    E

    None of the above


    正确答案: B
    解析: 暂无解析

  • 第22题:

    单选题
    You are using Windows 2000 Professional on your desktop computer. You are working on the company’s financial report and you want other users on the network to able to modify your documents for the report. You want users to share the financial report folder on the network. Because the network contains confidential information you want to prevent users from the enabling off line access for the network share that contains the financial report. What should you do?()
    A

    Use Windows Explorer to receive the offline files

    B

    Using the Windows Explorer, disable the cache for the reports on the network share

    C

    Use the Windows NT explorer to grant the special access for the reports on the network  share

    D

    Use the synchronization manager to configure synchronization not to occur when users are  connected to the LAN connection. 


    正确答案: A
    解析: 暂无解析

  • 第23题:

    单选题
    Your network contains a wired network and a wireless network. Users report that they experience intermittent problems accessing network resources when they connect to the internal wireless network. You discover that an unsecured rogue wireless access point uses the same Service Set Identifier (SSID) as the internal wireless network. You need to ensure that the users only connect to the internal wireless network. What should you do?()
    A

    Configure a Windows Connect Now Group Policy.

    B

    Configure a Wireless Network (IEEE 802.11) Policy.

    C

    Delete the rogue network from the Network and Sharing Center on each computer.

    D

    Create a Connection Manager Administration Kit (CMAK) profile and deploy it to all users.


    正确答案: B
    解析: 暂无解析

  • 第24题:

    单选题
    You install a new hardware router that provides wireless network connectivity between your computer and the Internet. You connect to the router by using a wireless network adapter. Your computer is able to access the Internet but is unable to discover other computers in the local wireless network.  You need to configure the wireless connection to allow your computer to discover other computers.  What should you do?()
    A

    Configure the network category of your wireless network connection to Private.

    B

    Configure the network category of your wireless network connection to Public.

    C

    Configure the TCP/IP packet filtering on the wireless network connection.

    D

    Configure the wireless network connection with the appropriate authentication to the router.


    正确答案: A
    解析: 暂无解析