Which of the following identifies traffic based upon its physical network address?
A. Phishing
B. Hashing
C. MAC filtering
D. Geotracking
CompTIA exam questions
Which of the following identifies traffic based upon its physical network address?
A. Phishing
B. Hashing
C. MAC filtering
D. Geotracking
In a SOHO wireless network, which of the following prevents unauthorized users from accessing confidential data?
A. Reduce broadcast power
B. Change SSID name
C. Set encryption
D. Enable MAC filtering
The benefit of MAC filtering in wireless networking is that the network:
A. is encrypted.
B. is not visible.
C. uses static IP addresses.
D. is more secure.
A small business owner is setting up their wireless network in their office, which is in a building shared with several other businesses. The owner does not want to disable the SSID broadcasting due to visiting customers needing to use the network, but does not want other businesses to notice the network, let alone access it. Which of the following would BEST accomplish this?
A. Configure the access point encryption from unsecured access to WEP.
B. Adjust the radio power so that coverage is restricted to the business.
C. Change the SSID to reflect the business name instead of a public access point.
D. Enable MAC filtering and restrict access to other company’s devices.
A SOHO would like to limit usage of their wireless network to two computers. Which of the following would be the EASIEST way for a technician to accomplish this?
A. Assign static IP addresses
B. Change the signal strength
C. Disable unused ports on the router
D. Enable MAC filtering
A technician enabled remote management on the small office WAP to manage this device from another location. Users are reporting that the WAP has changed its SSID without anyones knowledge. Which of the following would prevent this from occurring?
A. Change to user MAC filtering
B. Change default usernames and passwords
C. Disable the SSID from broadcasting
D. Enable static IP addresses
A technician has installed the hardware for a SOHO wired network. Which of the following is the FIRST step to securing the network?
A. Enable MAC filtering
B. Change default usernames and passwords
C. Disable unused ports
D. Assign static IP addresses
A SOHO location is being remodeled and the users are concerned about unauthorized traffic on their network during the remodel. The WLAN needs to be able to allow various types of devices to securely connect 24 hours a day while requiring the least amount of overhead to manage. Which of the following security implementations would MOST likely be implemented?
A. Setting encryption
B. Resetting all user-names and passwords
C. Assign static IP addresses
D. Enable MAC filtering
A technician is implementing a SOHO wireless network for Company A that shares a floor with Company B. Which of the following would BEST secure the wireless network so that only Company A employees are allowed access?
A. Turning down the radio power level
B. Enabling MAC filtering
C. Setting a high encryption level
D. Disabling the SSID broadcast
A user gets a warning from their ISP about illegally downloading copyrighted movies. The user insists that they did not download any movies and calls a technician to implement stronger small office home office (SOHO) security. Which of the following will allow only known workstations to connect to the SOHO router?
A. WPA password
B. Static IPs
C. MAC filtering
D. WEP password