Which two statements best describe the wireless security standard that is defined by WPA (Choose two.)()。
第1题:
A.It specifies use of a static encryption key that must be changed frequently to enhance security
B.It requires use of an open authentication method
C.It specifies the use of dynamic encryption keys that change each time a client establishes a connection
D.It requires that all access points and wireless devices use the same encryption key
E.It includes authentication by PSK
第2题:
Which two statements are true about the Wi-Fi Protected Access (WPA) and Wi-Fi Protected Access version 2 (WPA2) security solutions?()
第3题:
A company wants to secure access to its internal wireless network. The company wants to use themost secure means to access the network. Which of the following is the BEST choice for wireless security in this situation?()
第4题:
Which two statements are true regarding firewall user authentication?() (Choose two.)
第5题:
Which two statements accurately describe an IBGP peering session?() (Choose two.)
第6题:
Which two statements best describe the wireless security standard that is defined by WPA? (Choose two.)()
第7题:
Which two of these statements best describe fast secure roaming? (Choose two.)()
第8题:
Which two statements are true about encrypting RMAN backup?() (Choose two.)
第9题:
both WPA and WPA2 require authentication support via IEEE 802.1 x and Pre-Shared Key (PSK)
both WPA and WPA2 address all known Wired Equivalent Privacy (WEP) vulnerabilities in the IEEE 802.11i security implementation
WPA is supported on client devices only. WPA2 is supported on both access point (AP) and client devices
WPA provides only a standard for authentication. WPA2 provides a standard for authentication and encryption
WPA requires encryption support via Temporal Key Integrity Protocol (TKIP) WPA2 provides encryption support via (symmetric block cipher)AES-CCMP
第10题:
available only in autonomous APs
available in autonomous and lightweight APs
a feature of WDS in autonomous APs
a feature of WDS in lightweight APs
requires at least one AP and one Wireless LAN Services Module
第11题:
SSID broadcast prevention
man-in-the-middle attack protection
cost reduction through software upgrades in all existing hardware
dynamic key generation
RF jamming prevention
第12题:
It specifies use of a static encryption key that must be changed frequently to enhance security
It requires use of an open authentication method
It specifies the use of dynamic encryption keys that change each time a client establishes a connection
It requires that all access points and wireless devices use the same encryption key
It includes authentication by PSK
第13题:
Which two of these statements best describe the benefits of WPAv2? (Choose two.)()
第14题:
Which two statements about the Wired Equivalent Privacy (WEP) encryption mechanism are true? ()
第15题:
In which of the following scenarios would MAC filtering be MOST effective as a part of wireless security? ()
第16题:
Which of the following should be configured on a wireless router to enhance security? (Select TWO).()
第17题:
Which two wireless security statements are true?()
第18题:
Which two statements best describe enhanced wireless security encryption?()
第19题:
Which two statements regarding symmetric key encryption are true?() (Choose two.)
第20题:
TKIP protects RC4 encryption keys
CKIP and TKIP protect AES encryption keys
TKIP encryption is more processor intensive than AES encryption is
WPA requires TKIP encryption, whereas WPA2 supports AES encryption
WPA requires AES encryption, whereas WPA2 supports TKIP encryption
第21题:
A TACACS+ server is required to implement 802.1x.
MIC protects against man-in-the-middle and replay attacks.
The 802.1x standard provides encryption services for wireless clients.
The AES (symmetric block cipher) is specified in the IEEE 802.11i specification.
The IEEE 802.11i specification uses RC4 as its encryption mechanism.
WPA requires TKIP and AES as encryption methods.
第22题:
It specifies use of a static encryption key that must be changed frequently to enhance security.
It requires use of an open authentication method.
It specifies the use of dynamic encryption keys that change each time a client establishes a connection.
It requires that all access points and wireless devices use the same encryption key.
It includes authentication by PSK
第23题:
The same key is used for encryption and decryption.
It is commonly used to create digital certificate signatures.
It uses two keys: one for encryption and a different key for decryption.
An attacker can decrypt data if the attacker captures the key used for encryption.