Wireless networks are subject to more security issues than standard wired networks. Which wireless security protocol can prevent unauthorized devices from connecting to the wireless network?
A. RSA
B. WPA2
C. DES
D. AES
正解:B
質問 2:
Which type of attack involves the installation of malicious code on personal computers or servers that redirects Internet traffic from a legitimate Web site to an identical-looking but malicious imposter Web site?
A. Phishing
B. Spoofing
C. Replay
D. Pharming
正解:D
質問 3:
You want to restrict host access to a wireless access point. What is the best way to do this?
A. Change the Direct Sequence Spread Spectrum (DSSS) signal at both the access point and each hosts NI
B. Log in to the access point and configure features, such as changing the SSID.
C. Enable MAC address filtering at each host.
D. Install software on the host you want to limit, then use a Web browser to log in to the host and configure it with the necessary settings to use the access point.
正解:B
質問 4:
Configuring a wireless network involves several steps. Which of the following is a task that should be performed to configure and connect to a wireless network?
A. Configure the wireless AP's SSID, encryption level and shared key.
B. Connect your computer to the same network hub as the wireless AP.
C. Connect your computer to the same network switch as the wireless AP.
D. Configure a certificate authority and configure the trust settings.
正解:A
質問 5:
When a PC computer device wants to communicate with the processor, which system resource does it use?
A. IRQ
B. I/O
C. PIO
D. DMA
正解:A
質問 6:
Which of the following is a drawback to using Wired Equivalent Privacy (WEP)?
A. Symmetric-key encryption is susceptible to cracking.
B. The number of devices that can communicate using WEP is limited.
C. Encryption and decryption speeds are slower compared to other protocols.
D. Wireless network overhead is excessive.
正解:A
Toyama -
みごとに1D0-61C合格いたしました。Pass4Testさんほんとうにすごい。解説と演習問題を掲載しているので本番でも動じない実力を養うことができます。