A. Set the SSID value in the client software to public.
B. Configure open authentication on the AP and the client.
C. Set the SSID value on the client to the SSID configured on the AP.
D. Configured MAC address filtering to permit the client to connect to the AP.
您可能感兴趣的试卷
你可能感兴趣的试题
A. AES
B. PSK
C. SSID
D. TKIP
E. WEP
A. application
B. presentation
C. session
D. transport
E. internet
F. data link
A. Layer 2
B. Layer 3
C. Layer 4
D. Layer 5
E. Layer 6
F. Layer 7
A. Authentication needs to be changed to PAP for both routers.
B. Serial IP addresses of routers are not on the same subnet.
C. Username/password is incorrectly configured.
D. Router names are incorrectly configured.
A. The denied MAC addresses have already been learned or confgured on another secure interface in the same VLAN.
B. The denied MAC address are statically configured on the port.
C. The minimum MAC threshold has been reached.
D. The absolute aging times for the denied MAC addresses have expired.
A. to map all the devices on a network.
B. to display the current TCP/IP configuration values.
C. to see how a device MAC address is mapped to its IP address.
D. to see the path a packet will take when traveling to a specified destination.
E. to display the MTU values for each router in a specified network path from source to a destination.
A. denial of service
B. brute force
C. reconnaissance
D. Trojan horse
A. 15 seconds
B. 30 seconds
C. 180 seconds
D. 240 seconds
A. The PC has connectivity with a local host.
B. The PC has connectivity with a Layer 3 device.
C. The PC has a default gateway correctly configured
D. The PC has connectivity up to Layer 5 of the OSI model
E. The PC has the TCP/IP protocol stack correctly installed.
A. by encrypting all passwords passing through the router
B. by encrypting passwords in the plain text configuration file
C. by requiring entry of encrypted passwords for access to the device
D. by configuring an MD5 encrypted key to be used by routing protocols to validate routing exchanges
E. by automatically suggesting encrypted passwords for use in configuring the router
最新试题
Which IPsec security protocol should be used when confidentiality is required?()
Which name describes an IPV6 host-enable tunneling technique that uses IPV4 UDP,does not require dedicated gateway tunnels,and can pass through existing IPV4 NAT gateways?()
What is the purpose of the cisco Vlan Trunking protocol?()
Which statement is true, as relates to classful or classless routing?()
Three access ports have been installed and configured to a small office.What term defines the wireless topology?()
Which device might be installed at a branch office to enable and manage an IPsec site-to-site VPN?()
Which protocol reduces administrative overhead in a switched network by allowing the configuration of a new VLAN to be distributed to all the switches in a domain?()
Which Cisco IOS diagnostics command can disrupt the operation of a router under high-load conditions?()
What is the subnetwork address for a host with the IP address 201.100.5.68/28?()
Which command is used to display the collection of OSPF link states?()