A.It specifies use of a static encryption key that must be changed frequently to enhance security
B.It requires use of an open authentication method
C.It specifies the use of dynamic encryption keys that change each time a client establishes a connection
D.It requires that all access points and wireless devices use the same encryption key
E.It includes authentication by PSK
第1题:
Which two statements are true about L2TP tunnels?() (Choose two.)
第2题:
Which two statements accurately describe an IBGP peering session?() (Choose two.)
第3题:
Which two of these statements best describe the benefits of the Cisco Compatible Extensions Program? (Choose two.)()
第4题:
Which two statements best describe enhanced wireless security encryption?()
第5题:
Which two statements are true for a security policy? ()(Choose two.)
第6题:
An IPsec tunnel is established on an SRX Series Gateway on an interface whose IP address was obtained using DHCP.Which two statements are true? ()(Choose two.)
第7题:
available only in autonomous APs
available in autonomous and lightweight APs
a feature of WDS in autonomous APs
a feature of WDS in lightweight APs
requires at least one AP and one Wireless LAN Services Module
第8题:
SSID broadcast prevention
man-in-the-middle attack protection
cost reduction through software upgrades in all existing hardware
dynamic key generation
RF jamming prevention
第9题:
AirDefense for wireless IDS is required by autonomous APs.
2.40Hz CK management can monitor both 802.11 and non-802.11 CK interference.
APs only monitor the RF channels that are servicing the clients.
Cisco or CCX compatible client cards can extend the CK IDS service for autonomous APs.
Autonomous APs must be dedicated IDS sensors while lightweight APs can combine client traffic and RF monitoring.
第10题:
Throughput is raised as latency decreases.
Throughput is based on available bandwidth.
Throughput is lowered as latency decreases.
Latency is measured by SYNs returned for each metapacket.
第11题:
copier
microwave oven
toaster
cordless phone
IP phone
AM radio
第12题:
The Cisco Unified Wireless Network provides the framework to segregate wired and wirelessnetworks to deliver the best security for companies that are deploying WLANs.
The Cisco Unified wireless Network provides the framework to integrate and extend wired andwireless networks to deliver the lowest-possible total cost or ownership for companies that aredeploying WLANs
The Cisco Unified Wireless Network extends wireless awareness into important elements ofthe network infrastructure, providing the same level of security for WLANs that organizations havecome to expect from their VPNs.
The Cisco unified Wireless Network extends wireless awareness into important elements ofthe network infrastructure, providing the same level of security scalability, reliability ease ofdeployment and management for WLANs that organizations have come to expect from their wiredLANs.
第13题:
Which two statements best describe the wireless security standard that is defined by WPA (Choose two.)()。
第14题:
Which two statements best describe the Cisco Unified Wireless Network?()
第15题:
Which two statements best describe the wireless security standard that is defined by WPA? (Choose two.)()
第16题:
Which two of these statements best describe fast secure roaming? (Choose two.)()
第17题:
Which two parameters are configured in IPsec policy? ()(Choose two.)
第18题:
It specifies use of a static encryption key that must be changed frequently to enhance security.
It requires use of an open authentication method.
It specifies the use of dynamic encryption keys that change each time a client establishes a connection.
It requires that all access points and wireless devices use the same encryption key.
It includes authentication by PSK
第19题:
Throughput is raised as latency decreases.
Throughput is based on available bandwidth.
Throughput is lowered as latency decreases.
Latency is measured by SYNs returned for each metapacket
第20题:
It controls inter-zone traffic.
It controls intra-zone traffic.
It is named with a system-defined name.
It controls traffic destined to the device's ingress interface.
第21题:
It is compatible with all wireless clients.
It reduces roaming latency through reduced client RF channel scanning enhancements.
It reduces roaming latency to targeted times of less than 75ms.
Roaming occurs without reauthentication through a centralized RADIUS server.
It is enabled through WLSE deployment.
第22题:
TKIP protects RC4 encryption keys
CKIP and TKIP protect AES encryption keys
TKIP encryption is more processor intensive than AES encryption is
WPA requires TKIP encryption, whereas WPA2 supports AES encryption
WPA requires AES encryption, whereas WPA2 supports TKIP encryption
第23题:
An 802.11 g access point with a variety of antennas can be used in all standard site surveys.
Site surveys can be performed manually or through assisted site survey.
Channel power during testing starts at the default minimum and gradually increases to the maximum.
Overlapping access points can create performance problems.
Surveys should be done after hours in an office building or during reduced inventory levels in warehouses.