What is one reason that WPA encryption is preferred over WEP?()A. A WPA key is longer and requires more special characters than the WEP key.B. The access point and the client are manually configured with different WPA key values.C. WPA key values remain t

题目
What is one reason that WPA encryption is preferred over WEP?()

A. A WPA key is longer and requires more special characters than the WEP key.

B. The access point and the client are manually configured with different WPA key values.

C. WPA key values remain the same until the client configuration is changed.

D. The values of WPA keys can change dynamically while the system is used.


相似考题
更多“What is one reason that WPA encryption is preferred over WEP?() ”相关问题
  • 第1题:

    WPA是对WEP各种弱点的改进,WPA的密钥管理核心部分是TKIP()。


    答案:正确

  • 第2题:

    关于WEP和WPA加密方式的说法中正确的有()

    • A、802.11b协议中首次提出WPA加密方式
    • B、802.11i协议中首次提出WPA加密方式
    • C、采用WEP加密方式,只要设置足够复杂的口令就可以避免被破解
    • D、WEP口令无论多么复杂,都很容易遭到破解

    正确答案:B,D

  • 第3题:

    如何开启AP的动态IP连接()

    • A、打开wifi广播
    • B、打开wep加密
    • C、打开DHCP功能
    • D、打开WPA/WPA2-PSK

    正确答案:C

  • 第4题:

    Which two statements are true about the Wi-Fi Protected Access (WPA) and Wi-Fi Protected Access version 2 (WPA2) security solutions?()

    • A、both WPA and WPA2 require authentication support via IEEE 802.1 x and Pre-Shared Key (PSK)
    • B、both WPA and WPA2 address all known Wired Equivalent Privacy (WEP) vulnerabilities in the IEEE 802.11i security implementation
    • C、WPA is supported on client devices only. WPA2 is supported on both access point (AP) and client devices
    • D、WPA provides only a standard for authentication. WPA2 provides a standard for authentication and encryption
    • E、WPA requires encryption support via Temporal Key Integrity Protocol (TKIP) WPA2 provides encryption support via (symmetric block cipher)AES-CCMP

    正确答案:A,E

  • 第5题:

    Which two statements about the Wired Equivalent Privacy (WEP) encryption mechanism are true? ()

    • A、the two methods of authentication using the WEP encryption are open and shared key
    • B、the 802.11 standard defines WEP security using 128-bit keys
    • C、WEP can provide stronger authentication through the use of LEAP, PEAP, or EAP-FAST
    • D、WEP is a scalable encryption solution that uses static keys for authentication
    • E、WEP security provides only one-way authentication
    • F、WEPv2 offers improved encryption by replacing the RC4 encryption mechanism with the AES (symmetric block cipher) mechanism

    正确答案:A,E

  • 第6题:

    There are two networks sharing the same office space. One network already has an 802.11g accesspoint. The second network acquires one as well. If known, which of the following would help keep the two networks from interfering with each other?()

    • A、Channel
    • B、WEP key
    • C、Pre-shared key
    • D、Encryption type

    正确答案:A

  • 第7题:

    AP的加密方式包括().

    • A、WEP加密
    • B、WPA-PSK加密
    • C、WPA2-PSK加密
    • D、WAPI-PSK加密

    正确答案:A,B,C,D

  • 第8题:

    What are three security problems with Wi-Fi Protected Access (WPA)?()

    • A、WPA is based on the outdated IEEE 802.11i standard.
    • B、WPA uses RSN,which uses the same base encryption algorithm as RC4.
    • C、WPA requires a hardware upgrade that may not be supported by all vendors.
    • D、WPA uses TKIP,which uses the same base encryption algorithm as WEP.
    • E、WPA is susceptible to a DoS attack when it receives two packets in quick succession with bad MICs,forcing the AP to shut down the entire Basic Service Set (BSS) for one minute.
    • F、WPA is susceptible to a security weakness when preshared keys are used.

    正确答案:D,E,F

  • 第9题:

    无线路由技术中常用的WEP加密方式比WPA方式更安全。


    正确答案:错误

  • 第10题:

    单选题
    Wi-Fi Protected Access was an interim step on the way to the more secure WPA2. What was added in WPA2 to make it more secure?()
    A

     PEAP

    B

     EAP-FAST

    C

     AES encryption

    D

     Rivest Cipher 4 encryption


    正确答案: D
    解析: 暂无解析

  • 第11题:

    多选题
    Which two statements are true about the Wi-Fi Protected Access (WPA) and Wi-Fi Protected Access version 2 (WPA2) security solutions?()
    A

    both WPA and WPA2 require authentication support via IEEE 802.1 x and Pre-Shared Key (PSK)

    B

    both WPA and WPA2 address all known Wired Equivalent Privacy (WEP) vulnerabilities in the IEEE 802.11i security implementation

    C

    WPA is supported on client devices only. WPA2 is supported on both access point (AP) and client devices

    D

    WPA provides only a standard for authentication. WPA2 provides a standard for authentication and encryption

    E

    WPA requires encryption support via Temporal Key Integrity Protocol (TKIP) WPA2 provides encryption support via (symmetric block cipher)AES-CCMP


    正确答案: E,A
    解析: 暂无解析

  • 第12题:

    多选题
    What are three security problems with Wi-Fi Protected Access (WPA)?()
    A

    WPA is based on the outdated IEEE 802.11i standard.

    B

    WPA uses RSN,which uses the same base encryption algorithm as RC4.

    C

    WPA requires a hardware upgrade that may not be supported by all vendors.

    D

    WPA uses TKIP,which uses the same base encryption algorithm as WEP.

    E

    WPA is susceptible to a DoS attack when it receives two packets in quick succession with bad MICs,forcing the AP to shut down the entire Basic Service Set (BSS) for one minute.

    F

    WPA is susceptible to a security weakness when preshared keys are used.


    正确答案: E,F
    解析: 暂无解析

  • 第13题:

    WPA提供了比WEP更安全的加密方式。


    正确答案:正确

  • 第14题:

    手机热点不支持哪种加密()

    • A、wep加密
    • B、wpa_psk
    • C、wpa2_psk
    • D、无加密

    正确答案:A

  • 第15题:

    What is the reason for running spanning-tree in a Cisco Single-Site Secure Network Foundation Solution?()

    • A、To protect the network in case someone inadvertently creates a physical loop in it
    • B、To ensure that if a device fails another device automatically take over for it
    • C、To allow management of all network devices
    • D、To aggregate logical network groups together at one central point

    正确答案:A

  • 第16题:

    Wi-Fi Protected Access was an interim step on the way to the more secure WPA2. What was added in WPA2 to make it more secure?()

    • A、 PEAP
    • B、 EAP-FAST
    • C、 AES encryption
    • D、 Rivest Cipher 4 encryption

    正确答案:C

  • 第17题:

    A company wants to secure access to its internal wireless network. The company wants to use themost secure means to access the network. Which of the following is the BEST choice for wireless security in this situation?()

    • A、WEP encryption
    • B、Channel rotation
    • C、Disable SSID
    • D、WPA encryption

    正确答案:D

  • 第18题:

    A corporation wants help in reducing backup costs. By proposing a library with LTO-5 drives,which one of the following would be the BEST reason to choose LTO-5 over LTO-4?()

    • A、WORM and encryption capability 
    • B、offers sequential stream of batch data 
    • C、offers ability to read and write multiple generation cartridges 
    • D、lower cost per GB when compared to LTO-4

    正确答案:D

  • 第19题:

    What is one reason that WPA encryption is preferred over WEP?()

    • A、A WPA key is longer and requires more special characters than the WEP key.
    • B、The access point and the client are manually configured with different WPA key values.
    • C、WPA key values remain the same until the client configuration is changed.
    • D、The values of WPA keys can change dynamically while the system is used.

    正确答案:D

  • 第20题:

    Which two statements best describe enhanced wireless security encryption?()

    • A、TKIP protects RC4 encryption keys
    • B、CKIP and TKIP protect AES encryption keys
    • C、TKIP encryption is more processor intensive than AES encryption is
    • D、WPA requires TKIP encryption, whereas WPA2 supports AES encryption
    • E、WPA requires AES encryption, whereas WPA2 supports TKIP encryption

    正确答案:A,D

  • 第21题:

    多选题
    When implementing WLAN security, what are three benefits of using the Temporal Key Integrity Protocol (TKIP) instead of WEP? ()
    A

    TKIP uses an advanced encryption scheme based on AES

    B

    TKIP provides authentication and integrity checking using Cipher Block Chaining Message Authentication Code (CBC-MAC)

    C

    TKIP provides per-packet keyingand a rekeying mechanism

    D

    TKIP provides message integrity check

    E

    TKIP reduces WEP’s vulnerabilities byusing different hardware encryption chipset

    F

    TKIP uses a 48 bit InitializationVector


    正确答案: E,F
    解析: 暂无解析

  • 第22题:

    多选题
    Which two statements best describe enhanced wireless security encryption?()
    A

    TKIP protects RC4 encryption keys

    B

    CKIP and TKIP protect AES encryption keys

    C

    TKIP encryption is more processor intensive than AES encryption is

    D

    WPA requires TKIP encryption, whereas WPA2 supports AES encryption

    E

    WPA requires AES encryption, whereas WPA2 supports TKIP encryption


    正确答案: E,A
    解析: 暂无解析

  • 第23题:

    单选题
    What is one reason that WPA encryption is preferred over WEP()。
    A

    A WPA key is longer and requires more special characters than the WEP key.

    B

    The access point and the client are manually configured with different WPA key values.

    C

    WPA key values remain the same until the client configuration is changed.

    D

    The values of WPA keys can change dynamically while the system is used.


    正确答案: D
    解析: 暂无解析

  • 第24题:

    多选题
    Which two statements about the Wired Equivalent Privacy (WEP) encryption mechanism are true? ()
    A

    the two methods of authentication using the WEP encryption are open and shared key

    B

    the 802.11 standard defines WEP security using 128-bit keys

    C

    WEP can provide stronger authentication through the use of LEAP, PEAP, or EAP-FAST

    D

    WEP is a scalable encryption solution that uses static keys for authentication

    E

    WEP security provides only one-way authentication

    F

    WEPv2 offers improved encryption by replacing the RC4 encryption mechanism with the AES (symmetric block cipher) mechanism


    正确答案: A,E
    解析: 暂无解析