Which of the following security measures would BEST secure their wireless network?
A company has only three laptops that connect to their wireless network. The company is currently
using WEP encryption on their wireless network. They have noticed unauthorized connections on
their WAP and want to secure their wireless connection to prevent this. Which of the following
security measures would BEST secure their wireless network? (Select TWO).
Which of the following can be done to eliminate this threat?
Jeff, a company executive, has noticed that a wireless network signal from the company’s WAP can
be seen in the company’s parking lot. Jeff is very worried that this is a potential security threat.
Which of the following can be done to eliminate this threat?
Which of the following is an authentication, authorization, and accounting method that provides administrative
Which of the following is an authentication, authorization, and accounting method that provides
administrative access to network devices?
Which of the following capabilities of a firewall allows Zach, an administrator, to block traffic based on key
Which of the following capabilities of a firewall allows Zach, an administrator, to block traffic based
on key words determined by the company?
Which of the following network access methods is the MOST secure?
Which of the following network access methods is the MOST secure?
Which of the following is a form of encrypting packets for safe, secure data transmission within a network?
Which of the following is a form of encrypting packets for safe, secure data transmission within a
network?
Which of the following tools did the attackers MOST likely use to accomplish this?
Lisa, an administrator, believes that the network has been attacked and MAC addresses have been
captured allowing unauthorized computers to access the network. Which of the following tools did
the attackers MOST likely use to accomplish this?
Which of the following BEST describes this scenario?
Lisa, an administrator, believes that the network has been attacked and there is no known definition
or prevention method to help avoid this attack. Which of the following BEST describes this scenario?
Which of the following is used by RADIUS to encrypt messages between the server and the client?
Which of the following is used by RADIUS to encrypt messages between the server and the client?
Which of the following solutions will detect and disable a rogue access point?
Which of the following solutions will detect and disable a rogue access point?