参考答案和解析
正确答案: D
解析: 暂无解析
更多“单选题Which of the following standards or encryption types is the MOST secure for wireless networking?()A WEPB AESC TKIPD DES”相关问题
  • 第1题:

    Which of the following protocols is the LEAST secure and should be avoided on a wireless network?()

    A.WEP

    B.PEAP

    C.WPA

    D.TKIP


    参考答案:A

  • 第2题:

    Which two of the following EAP types requires a certificate to be installed on the Cisco Secure ACS?()

    • A、EAP-PEAP
    • B、EAP-FAST
    • C、EAP-Cisco Wireless (LEAP)
    • D、EAP-TLS
    • E、EAP-MD5

    正确答案:A,D

  • 第3题:

    Which of the following standards or encryption types is the MOST secure for wireless networking?()

    • A、WEP
    • B、AES
    • C、TKIP
    • D、DES

    正确答案:B

  • 第4题:

    Which of the following wireless networking standards can operate at two different frequenciessimultaneously?()

    • A、802.11a
    • B、802.11b
    • C、802.11g
    • D、802.11n

    正确答案:D

  • 第5题:

    Which of the following offers the HIGHEST wireless security?()

    • A、WEP
    • B、WPA2
    • C、WPA
    • D、HTTPS

    正确答案:B

  • 第6题:

    When installing a wireless network in a large area, which of the following is the FIRST thing thatshould be considered when trying to get the MOST coverage?()

    • A、SSID naming
    • B、Device placement
    • C、Encryption methods
    • D、Channel selection

    正确答案:B

  • 第7题:

    An administrator is implementing a wireless network. Which of the following encryption technologies is the MOST secure method and will authenticate devices to the network?()

    • A、SSH
    • B、WEP
    • C、VPN
    • D、WPA

    正确答案:D

  • 第8题:

    Which of the following wireless security techniques is the MOST secure?()

    • A、Enable Wired Equivalent Privacy
    • B、Disable SSID broadcast
    • C、Enable Wi-Fi Protected Access
    • D、Enable MAC filtering

    正确答案:C

  • 第9题:

    单选题
    Which of the following protocols is the LEAST secure and should be avoided on a wireless network?()
    A

    WEP

    B

    PEAP

    C

    WPA

    D

    TKIP


    正确答案: A
    解析: 暂无解析

  • 第10题:

    单选题
    Which of the following wireless networking standards can operate at two different frequenciessimultaneously?()
    A

    802.11a

    B

    802.11b

    C

    802.11g

    D

    802.11n


    正确答案: B
    解析: 暂无解析

  • 第11题:

    单选题
    An administrator is implementing a wireless network. Which of the following encryption technologies is the MOST secure method and will authenticate devices to the network?()
    A

    SSH

    B

    WEP

    C

    VPN

    D

    WPA


    正确答案: D
    解析: 暂无解析

  • 第12题:

    单选题
    Which of the following is an advantage of a 100Base-T network card versus an 802.11g wireless network card?()
    A

    Flexibility in relocating the computer

    B

    Ability to provide secure data communications

    C

    Faster data speed

    D

    Ability to setup P2P networking


    正确答案: C
    解析: 暂无解析

  • 第13题:

    Which two wireless encryption methods are based on the RC4 encryption algorithm?()

    A.WEP

    B.CCKM

    C.AES

    D.TKIP

    E.CCMP


    参考答案:A, D

  • 第14题:

    A company wants to secure access to its internal wireless network. The company wants to use themost secure means to access the network. Which of the following is the BEST choice for wireless security in this situation?()

    • A、WEP encryption
    • B、Channel rotation
    • C、Disable SSID
    • D、WPA encryption

    正确答案:D

  • 第15题:

    Which of the following protocols is the LEAST secure and should be avoided on a wireless network?()

    • A、WEP
    • B、PEAP
    • C、WPA
    • D、TKIP

    正确答案:A

  • 第16题:

    Which two wireless encryption methods are based on the RC4 encryption algorithm? ()

    • A、WEP
    • B、CCKM
    • C、AES
    • D、TKIP
    • E、CCMP

    正确答案:A,D

  • 第17题:

    Which of the following technologies is the MOST secure form of wireless encryption?()

    • A、SSL
    • B、WPA
    • C、WEP
    • D、TLS

    正确答案:B

  • 第18题:

    Which of the following is an advantage of a 100Base-T network card versus an 802.11g wireless network card?()

    • A、Flexibility in relocating the computer
    • B、Ability to provide secure data communications
    • C、Faster data speed
    • D、Ability to setup P2P networking

    正确答案:C

  • 第19题:

    Which of the following uses PKI?()

    • A、Blowfish
    • B、AES
    • C、PGP
    • D、3DES

    正确答案:C

  • 第20题:

    单选题
    Which of the following technologies is the MOST secure form of wireless encryption?()
    A

    SSL

    B

    WPA

    C

    WEP

    D

    TLS


    正确答案: A
    解析: 暂无解析

  • 第21题:

    多选题
    Which two of the following eap types requires a certificate to be installed on the cisco secure acs?()
    A

    eap-peap

    B

    eap-fast

    C

    eap-cisco wireless (leap)

    D

    eap-tls

    E

    eap-md5


    正确答案: E,B
    解析: 暂无解析

  • 第22题:

    单选题
    Which of the following wireless security techniques is the MOST secure?()
    A

    Enable Wired Equivalent Privacy

    B

    Disable SSID broadcast

    C

    Enable Wi-Fi Protected Access

    D

    Enable MAC filtering


    正确答案: D
    解析: 暂无解析

  • 第23题:

    单选题
    Which of the following standards or encryption types is the MOST secure for wireless networking?()
    A

    WEP

    B

    AES

    C

    TKIP

    D

    DES


    正确答案: B
    解析: 暂无解析

  • 第24题:

    单选题
    A company wants to secure access to its internal wireless network. The company wants to use themost secure means to access the network. Which of the following is the BEST choice for wireless security in this situation?()
    A

    WEP encryption

    B

    Channel rotation

    C

    Disable SSID

    D

    WPA encryption


    正确答案: D
    解析: 暂无解析