CompTIA A+ Core 2 Question D-99

Which of the following can a technician implement to ensure that only company owned mobile devices can connect to the wireless network?

A. Deploy a script to auto-configure employees mobile devices wireless settings.
B. Configure MAC address filtering on the access points.
C. Implement a wireless policy and train all users.
D. Enable WPA2-Personal with a strong password.

Correct Answer: B

CompTIA A+ Core 2 Question D-93

Which of the following should a technician implement to prevent external contractors from physically plugging devices into the company’s network jacks unless such jacks are designated for guest use?

A. Disable DHCP and assign a static IP address to each network device physically connected to the network.
B. Enable MAC address filtering across all network jacks and record the MAC address of guest devices.
C. Disable all switch ports when they are not utilized and enable them on an as needed basis.
D. Place guest network jacks in public areas and all other jacks in secure areas as needed.

Correct Answer: C

Explanation:
The best way is to disable all switch ports when they are not utilized. Switch them on when you need them. This way, you can prevent external contractors from physically plugging devices in to company’s network jacks.

CompTIA A+ Core 2 Question C-62

The technician is dispatched to a users home to secure a wireless network. The SOHO user has only one system to connect wirelessly, yet wishes to protect their Wi-Fi from unauthorized use. Which of the following will BEST meet the users requirements?

A. Configure the router to allow access by MAC address.
B. Configure the use of DHCP.
C. Configure the use of static IP addresses.
D. Configure the network to utilize a proxy.

CompTIA A+ Core 2 Question B-45

A technician wants to ensure that only authorized administrators can make configuration changes to the company’s wireless router. Which of the following MUST the technician change to prevent unauthorized users from modifying the access point configuration?

A. MAC address filters
B. Manufacturer password
C. Default SSID
D. Configure encryption