A. A WPA key is longer and requires more special characters than the WEP key.
B. The access point and the client are manually configured with different WPA key values.
C. WPA key values remain the same until the client configuration is changed.
D. The values of WPA keys can change dynamically while the system is used.
第1题:
WPA是对WEP各种弱点的改进,WPA的密钥管理核心部分是TKIP()。
第2题:
关于WEP和WPA加密方式的说法中正确的有()
第3题:
如何开启AP的动态IP连接()
第4题:
Which two statements are true about the Wi-Fi Protected Access (WPA) and Wi-Fi Protected Access version 2 (WPA2) security solutions?()
第5题:
Which two statements about the Wired Equivalent Privacy (WEP) encryption mechanism are true? ()
第6题:
There are two networks sharing the same office space. One network already has an 802.11g accesspoint. The second network acquires one as well. If known, which of the following would help keep the two networks from interfering with each other?()
第7题:
AP的加密方式包括().
第8题:
What are three security problems with Wi-Fi Protected Access (WPA)?()
第9题:
无线路由技术中常用的WEP加密方式比WPA方式更安全。
第10题:
PEAP
EAP-FAST
AES encryption
Rivest Cipher 4 encryption
第11题:
both WPA and WPA2 require authentication support via IEEE 802.1 x and Pre-Shared Key (PSK)
both WPA and WPA2 address all known Wired Equivalent Privacy (WEP) vulnerabilities in the IEEE 802.11i security implementation
WPA is supported on client devices only. WPA2 is supported on both access point (AP) and client devices
WPA provides only a standard for authentication. WPA2 provides a standard for authentication and encryption
WPA requires encryption support via Temporal Key Integrity Protocol (TKIP) WPA2 provides encryption support via (symmetric block cipher)AES-CCMP
第12题:
WPA is based on the outdated IEEE 802.11i standard.
WPA uses RSN,which uses the same base encryption algorithm as RC4.
WPA requires a hardware upgrade that may not be supported by all vendors.
WPA uses TKIP,which uses the same base encryption algorithm as WEP.
WPA is susceptible to a DoS attack when it receives two packets in quick succession with bad MICs,forcing the AP to shut down the entire Basic Service Set (BSS) for one minute.
WPA is susceptible to a security weakness when preshared keys are used.
第13题:
WPA提供了比WEP更安全的加密方式。
第14题:
手机热点不支持哪种加密()
第15题:
What is the reason for running spanning-tree in a Cisco Single-Site Secure Network Foundation Solution?()
第16题:
Wi-Fi Protected Access was an interim step on the way to the more secure WPA2. What was added in WPA2 to make it more secure?()
第17题:
A company wants to secure access to its internal wireless network. The company wants to use themost secure means to access the network. Which of the following is the BEST choice for wireless security in this situation?()
第18题:
A corporation wants help in reducing backup costs. By proposing a library with LTO-5 drives,which one of the following would be the BEST reason to choose LTO-5 over LTO-4?()
第19题:
What is one reason that WPA encryption is preferred over WEP?()
第20题:
Which two statements best describe enhanced wireless security encryption?()
第21题:
TKIP uses an advanced encryption scheme based on AES
TKIP provides authentication and integrity checking using Cipher Block Chaining Message Authentication Code (CBC-MAC)
TKIP provides per-packet keyingand a rekeying mechanism
TKIP provides message integrity check
TKIP reduces WEP’s vulnerabilities byusing different hardware encryption chipset
TKIP uses a 48 bit InitializationVector
第22题:
TKIP protects RC4 encryption keys
CKIP and TKIP protect AES encryption keys
TKIP encryption is more processor intensive than AES encryption is
WPA requires TKIP encryption, whereas WPA2 supports AES encryption
WPA requires AES encryption, whereas WPA2 supports TKIP encryption
第23题:
A WPA key is longer and requires more special characters than the WEP key.
The access point and the client are manually configured with different WPA key values.
WPA key values remain the same until the client configuration is changed.
The values of WPA keys can change dynamically while the system is used.
第24题:
the two methods of authentication using the WEP encryption are open and shared key
the 802.11 standard defines WEP security using 128-bit keys
WEP can provide stronger authentication through the use of LEAP, PEAP, or EAP-FAST
WEP is a scalable encryption solution that uses static keys for authentication
WEP security provides only one-way authentication
WEPv2 offers improved encryption by replacing the RC4 encryption mechanism with the AES (symmetric block cipher) mechanism