A. IEEE 802.3
B. IEEE 802.5
C. IEEE 802.11h
D. IEEE 802.11c
E. IEEE 802.11
第1题:
A.Define the column MAINID as NOT UPDATABLE
B.Define the column MAINID as a PRIMARY KEY
C.Define the column MAINID as a FOREIGN KEY
D.Define an UPDATE trigger on table TABLEX
第2题:
第3题:
第4题:
Which of the following is a RF peer to peer mesh protocol used for lighting and other residential electronics?()
第5题:
Which spread spectrum technology does the 802.11b standard define foroperation?()
第6题:
Which two statements about the Wi-Fi Multimedia (WMM) standard are true?()
第7题:
Which of the following is a standard IEEE 1394 transmission speed?()
第8题:
When running a Windows server, which option is used with the ping command to define the number of packets transmitted?()
第9题:
Which of the following can be used to ensure that once a row has been inserted in table TABLEX, the column MAINID in that row cannot be updated?()
第10题:
both WPA and WPA2 require authentication support via IEEE 802.1 x and Pre-Shared Key (PSK)
both WPA and WPA2 address all known Wired Equivalent Privacy (WEP) vulnerabilities in the IEEE 802.11i security implementation
WPA is supported on client devices only. WPA2 is supported on both access point (AP) and client devices
WPA provides only a standard for authentication. WPA2 provides a standard for authentication and encryption
WPA requires encryption support via Temporal Key Integrity Protocol (TKIP) WPA2 provides encryption support via (symmetric block cipher)AES-CCMP
第11题:
alternate
backup
designated
disabled
root
第12题:
WPA is based on the outdated IEEE 802.11i standard.
WPA uses RSN,which uses the same base encryption algorithm as RC4.
WPA requires a hardware upgrade that may not be supported by all vendors.
WPA uses TKIP,which uses the same base encryption algorithm as WEP.
WPA is susceptible to a DoS attack when it receives two packets in quick succession with bad MICs,forcing the AP to shut down the entire Basic Service Set (BSS) for one minute.
WPA is susceptible to a security weakness when preshared keys are used.
第13题:
A.IR
B.DSSS
C.FHSS
D.DSSS and FHSS
E.IR, FHSS, and DSSS
第14题:
第15题:
Which two statements are true about the Wi-Fi Protected Access (WPA) and Wi-Fi Protected Access version 2 (WPA2) security solutions?()
第16题:
Which two statements about the implementation of WLAN QoS are true?()
第17题:
Which IEEE standard is used to define Wi-Fi?()
第18题:
What are three security problems with Wi-Fi Protected Access (WPA)?()
第19题:
Which of the following represents a wiring standard for twisted pair cables?()
第20题:
Which of the following are contained in a store archive?()
第21题:
a Frame Relay header includes a 1-bit discard eligible (DE) bit to provide the class of service (CoS)
an ATM header includes a 1-bit DE field to provide the CoS
an MPLS EXP field is inserted in the Layer 3 IP precedence field to identify the CoS
the CoS field only exists inside Ethernet frames when 802.1Q or Inter-Switch Link (ISL) trunking is used
in the IEEE 802.1p standard, three bits are used to identify the user priority bits for the CoS
in the IEEE 802.1q standard, six bits are used to identify the user priority bits for the CoS
第22题:
IR
DSSS
FHSS
DSSS and FHSS
IR, FHSS, and DSSS
第23题:
IEEE 802.3
IEEE 802.5
IEEE 802.11h
IEEE 802.11c
IEEE 802.11