You work as a Network Administrator for Tech Perfect Inc. The company has a TCP/IP-based network. Rick, your assistant, is configuring some laptops for wireless access. For security, WEP needs to be configured for wireless communication. By mistake, Rick configures different WEP keys in a laptop than that is configured on the Wireless Access Point (WAP). Which of the following statements is true in such situation?
A. The WAP will allow the connection with the guest account's privileges.
B. The laptop will not be able to access the wireless network.
C. The laptop will be able to access the wireless network but the security will be compromised
D. The laptop will be able to access the wireless network but other wireless devices will be unable to communicate with it.
正解:B
質問 2:
Which of the following security protocols can be used to support MS-CHAPv2 for wireless client authentication?
Each correct answer represents a complete solution. Choose two.
A. PEAP
B. IPSec
C. PPTP
D. HTTP
正解:A,C
質問 3:
You work as a Network Administrator for Tech-E-book Inc. You are configuring the ISA Server
2006 firewall to provide your company with a secure wireless intranet. You want to accept inbound mail delivery though an SMTP server. What basic rules of ISA Server do you need to configure to accomplish the task.
A. Mailbox rules
B. Publishing rules
C. Access rules
D. Network rules
正解:B
質問 4:
Fill in the blank with the appropriate act name.
The___ act gives consumers the right to ask emailers to stop spamming them.
正解:
CAN-SPAM
質問 5:
You want to scan your network quickly to detect live hosts by using ICMP ECHO Requests. What type of scanning will you perform to accomplish the task?
A. Idle scan
B. XMAS scan
C. Ping sweep scan
D. TCP SYN scan
正解:C
Ishii -
ても読みやすく、
解りやすく解説しています。とにかくやる気が起こるGPENテキストです。