Which two statements best describe the wireless security standard that is defined by WPA (Choose two.)()。A、It specifies use of a static encryption key that must be changed frequently to enhance securityB、It requires use of an open authentication methodC、I

题目

Which two statements best describe the wireless security standard that is defined by WPA (Choose two.)()。

  • A、It specifies use of a static encryption key that must be changed frequently to enhance security
  • B、It requires use of an open authentication method
  • C、It specifies the use of dynamic encryption keys that change each time a client establishes a connection
  • D、It requires that all access points and wireless devices use the same encryption key
  • E、It includes authentication by PSK

相似考题
更多“Which two statements best describe the wireless security standard that is defined by WPA (Choose two.)()。A、It specifies use of a static encryption key that must be changed frequently to enhance securityB、It requires use of an open authentication methodC、I”相关问题
  • 第1题:

    Which two statements best describe the wireless security standard that is defined by WPA (Choose two.)()。

    A.It specifies use of a static encryption key that must be changed frequently to enhance security

    B.It requires use of an open authentication method

    C.It specifies the use of dynamic encryption keys that change each time a client establishes a connection

    D.It requires that all access points and wireless devices use the same encryption key

    E.It includes authentication by PSK


    参考答案:C, E

  • 第2题:

    Which two statements are true about the Wi-Fi Protected Access (WPA) and Wi-Fi Protected Access version 2 (WPA2) security solutions?()

    • A、both WPA and WPA2 require authentication support via IEEE 802.1 x and Pre-Shared Key (PSK)
    • B、both WPA and WPA2 address all known Wired Equivalent Privacy (WEP) vulnerabilities in the IEEE 802.11i security implementation
    • C、WPA is supported on client devices only. WPA2 is supported on both access point (AP) and client devices
    • D、WPA provides only a standard for authentication. WPA2 provides a standard for authentication and encryption
    • E、WPA requires encryption support via Temporal Key Integrity Protocol (TKIP) WPA2 provides encryption support via (symmetric block cipher)AES-CCMP

    正确答案:A,E

  • 第3题:

    A company wants to secure access to its internal wireless network. The company wants to use themost secure means to access the network. Which of the following is the BEST choice for wireless security in this situation?()

    • A、WEP encryption
    • B、Channel rotation
    • C、Disable SSID
    • D、WPA encryption

    正确答案:D

  • 第4题:

    Which two statements are true regarding firewall user authentication?() (Choose two.)

    • A、When configured for pass-through firewall user authentication, the user must first open a connection to the Junos security remote network resource.
    • B、When configured for Web firewall user authentication only, the user must first open a connection to the Junos security remote network resource.
    • C、If a Junos security device is configured for pass-through firewall user authentication, new sessions are automatically intercepted .
    • D、If a Junos security device is configured for Web firewall user authentication, new sessions are automatically intercepted.

    正确答案:B,C

  • 第5题:

    Which two statements accurately describe an IBGP peering session?() (Choose two.)

    • A、Peers are statically defined.
    • B、Peers exist within the same AS.
    • C、Peers must be directly connected to each other.
    • D、Peers advertise routes learned from other IBGP neighbors.

    正确答案:A,B

  • 第6题:

    Which two statements best describe the wireless security standard that is defined by WPA? (Choose two.)()

    • A、It specifies use of a static encryption key that must be changed frequently to enhance security.
    • B、It requires use of an open authentication method.
    • C、It specifies the use of dynamic encryption keys that change each time a client establishes a connection.
    • D、It requires that all access points and wireless devices use the same encryption key.
    • E、It includes authentication by PSK

    正确答案:C,E

  • 第7题:

    Which two of these statements best describe fast secure roaming? (Choose two.)()  

    • A、 available only in autonomous APs
    • B、 available in autonomous and lightweight APs
    • C、 a feature of WDS in autonomous APs
    • D、 a feature of WDS in lightweight APs
    • E、 requires at least one AP and one Wireless LAN Services Module

    正确答案:B,C

  • 第8题:

    Which two statements are true about encrypting RMAN backup?() (Choose two.)

    • A、The transparent encryption of backups uses the encryption wallet
    • B、The database uses the same encryption key for every encrypted backup
    • C、The password encryption of backups only uses the password while creating and restoring backup
    • D、If transparent encryption is configured, you cannot use the SET ENCRYPTION BY PASSWORD command to make password-protected backups.

    正确答案:A,C

  • 第9题:

    多选题
    Which two statements are true about the Wi-Fi Protected Access (WPA) and Wi-Fi Protected Access version 2 (WPA2) security solutions?()
    A

    both WPA and WPA2 require authentication support via IEEE 802.1 x and Pre-Shared Key (PSK)

    B

    both WPA and WPA2 address all known Wired Equivalent Privacy (WEP) vulnerabilities in the IEEE 802.11i security implementation

    C

    WPA is supported on client devices only. WPA2 is supported on both access point (AP) and client devices

    D

    WPA provides only a standard for authentication. WPA2 provides a standard for authentication and encryption

    E

    WPA requires encryption support via Temporal Key Integrity Protocol (TKIP) WPA2 provides encryption support via (symmetric block cipher)AES-CCMP


    正确答案: E,A
    解析: 暂无解析

  • 第10题:

    多选题
    Which two of these statements best describe fast secure roaming? (Choose two.)()
    A

    available only in autonomous APs

    B

    available in autonomous and lightweight APs

    C

    a feature of WDS in autonomous APs

    D

    a feature of WDS in lightweight APs

    E

    requires at least one AP and one Wireless LAN Services Module


    正确答案: D,E
    解析: 暂无解析

  • 第11题:

    多选题
    Which two of these statements best describe the benefits of WPAv2? (Choose two.)()
    A

    SSID broadcast prevention

    B

    man-in-the-middle attack protection

    C

    cost reduction through software upgrades in all existing hardware

    D

    dynamic key generation

    E

    RF jamming prevention


    正确答案: B,C
    解析: 暂无解析

  • 第12题:

    多选题
    Which two statements best describe the wireless security standard that is defined by WPA (Choose two.)()。
    A

    It specifies use of a static encryption key that must be changed frequently to enhance security

    B

    It requires use of an open authentication method

    C

    It specifies the use of dynamic encryption keys that change each time a client establishes a connection

    D

    It requires that all access points and wireless devices use the same encryption key

    E

    It includes authentication by PSK


    正确答案: B,E
    解析: 暂无解析

  • 第13题:

    Which two of these statements best describe the benefits of WPAv2? (Choose two.)()

    • A、 SSID broadcast prevention
    • B、 man-in-the-middle attack protection
    • C、 cost reduction through software upgrades in all existing hardware
    • D、 dynamic key generation
    • E、 RF jamming prevention

    正确答案:B,D

  • 第14题:

    Which two statements about the Wired Equivalent Privacy (WEP) encryption mechanism are true? ()

    • A、the two methods of authentication using the WEP encryption are open and shared key
    • B、the 802.11 standard defines WEP security using 128-bit keys
    • C、WEP can provide stronger authentication through the use of LEAP, PEAP, or EAP-FAST
    • D、WEP is a scalable encryption solution that uses static keys for authentication
    • E、WEP security provides only one-way authentication
    • F、WEPv2 offers improved encryption by replacing the RC4 encryption mechanism with the AES (symmetric block cipher) mechanism

    正确答案:A,E

  • 第15题:

    In which of the following scenarios would MAC filtering be MOST effective as a part of wireless security? ()

    • A、A public place where guests are free to access the wireless network.
    • B、A small office where a defined number of specific wireless devices are used.
    • C、A meeting room where various company users will access the wireless network during meetings. 
    • D、An office where some users are unable to use WPA encryption due to older wireless cards so they use MAC filtering.

    正确答案:B

  • 第16题:

    Which of the following should be configured on a wireless router to enhance security? (Select TWO).()

    • A、Disable DHCP
    • B、Change wireless channel
    • C、Disable SSID broadcasting
    • D、Change the default username and password
    • E、Use a static IP address

    正确答案:C,D

  • 第17题:

    Which two wireless security statements are true?()

    • A、A TACACS+ server is required to implement 802.1x.
    • B、MIC protects against man-in-the-middle and replay attacks.
    • C、The 802.1x standard provides encryption services for wireless clients.
    • D、The AES (symmetric block cipher) is specified in the IEEE 802.11i specification.
    • E、The IEEE 802.11i specification uses RC4 as its encryption mechanism.
    • F、WPA requires TKIP and AES as encryption methods.

    正确答案:B,D

  • 第18题:

    Which two statements best describe enhanced wireless security encryption?()

    • A、TKIP protects RC4 encryption keys
    • B、CKIP and TKIP protect AES encryption keys
    • C、TKIP encryption is more processor intensive than AES encryption is
    • D、WPA requires TKIP encryption, whereas WPA2 supports AES encryption
    • E、WPA requires AES encryption, whereas WPA2 supports TKIP encryption

    正确答案:A,D

  • 第19题:

    Which two statements regarding symmetric key encryption are true?() (Choose two.)

    • A、The same key is used for encryption and decryption.
    • B、It is commonly used to create digital certificate signatures.
    • C、It uses two keys: one for encryption and a different key for decryption.
    • D、An attacker can decrypt data if the attacker captures the key used for encryption.

    正确答案:A,D

  • 第20题:

    多选题
    Which two statements best describe enhanced wireless security encryption?()
    A

    TKIP protects RC4 encryption keys

    B

    CKIP and TKIP protect AES encryption keys

    C

    TKIP encryption is more processor intensive than AES encryption is

    D

    WPA requires TKIP encryption, whereas WPA2 supports AES encryption

    E

    WPA requires AES encryption, whereas WPA2 supports TKIP encryption


    正确答案: E,A
    解析: 暂无解析

  • 第21题:

    多选题
    Which two wireless security statements are true?()
    A

    A TACACS+ server is required to implement 802.1x.

    B

    MIC protects against man-in-the-middle and replay attacks.

    C

    The 802.1x standard provides encryption services for wireless clients.

    D

    The AES (symmetric block cipher) is specified in the IEEE 802.11i specification.

    E

    The IEEE 802.11i specification uses RC4 as its encryption mechanism.

    F

    WPA requires TKIP and AES as encryption methods.


    正确答案: F,E
    解析: 暂无解析

  • 第22题:

    多选题
    Which two statements best describe the wireless security standard that is defined by WPA? (Choose two.)()
    A

    It specifies use of a static encryption key that must be changed frequently to enhance security.

    B

    It requires use of an open authentication method.

    C

    It specifies the use of dynamic encryption keys that change each time a client establishes a connection.

    D

    It requires that all access points and wireless devices use the same encryption key.

    E

    It includes authentication by PSK


    正确答案: D,B
    解析: 暂无解析

  • 第23题:

    多选题
    Which two statements regarding symmetric key encryption are true?() (Choose two.)
    A

    The same key is used for encryption and decryption.

    B

    It is commonly used to create digital certificate signatures.

    C

    It uses two keys: one for encryption and a different key for decryption.

    D

    An attacker can decrypt data if the attacker captures the key used for encryption.


    正确答案: D,B
    解析: 暂无解析