网友您好, 请在下方输入框内输入要搜索的题目:
题目内容
(请给出正确答案)
属于IEEE802.11的用户认证机制有:()。
- A、Open authentication
- B、Pre-Shared Key authentication
- C、Shared Key authentication
- D、MAC authentication
参考答案
更多 “属于IEEE802.11的用户认证机制有:()。A、Open authenticationB、Pre-Shared Key authenticationC、Shared Key authenticationD、MAC authentication” 相关考题
考题
在防火墙实现认证的方法中,采用通过数据包中的源地址来认证的是()。
A. Password-Based AuthenticationB. Address-Based AuthenticationC. Cryptographic AuthenticationD. None of Above
考题
进行PPP配置时,可利用(54)命令诊断身份认证过程中出现的问题,得到如图8-8所示的系统输出信息。A.debug chap authenticationB.debug pap authenticationC.debug ppp authenticationD.ppp authentication chap
考题
Which two methods of authentication are used by the Infranet Controller for IPSec enforcement?()
A. dial-up VPNB. IKE authenticationC. XAuth authenticationD. shared IKE authentication
考题
You are an administrator of a network that uses PPP for CHAP authentication over ever WAN link. What command would you enter to display the CHAP authentication as it occurs in real time?()
A. show ppp authenticationB. debug PAP authenticationC. debug PPP authenticationD. show interface serial0E. show CHAP authentication
考题
Which two features did WPAv1 add to address the inherent weaknesses found in WEP?()
A.a stronger encryption algorithmB.key mixing using temporal keysC.shared key authenticationD.a shorter initialization vectorE.per frame sequence counters
考题
属于IEEE802.11的用户认证机制有:()。
A.Open authenticationB.Pre-Shared Key authenticationC.Shared Key authenticationD.MAC authentication
考题
Which two features did WPAv1 add to address the inherent weaknesses found in WEP?()A、a stronger encryption algorithmB、key mixing using temporal keysC、shared key authenticationD、a shorter initialization vectorE、per frame sequence counters
考题
Which two statements about the open and shared key wireless-authentication methods are true? ()A、 Shared key authentication is considered more secure than open authentication.B、 Shared key authentication is considered less secure than open authentication.C、 If the WEP keys do not match using the open authentication method, the client will not authenticate, associate, and transfer data.D、 If the WEP keys do not match using the open authentication method, the client will still be able to authenticate and associate, but will not transfer data.E、 If the WEP keys do not match using the open authentication method, the client will still be able to authenticate, associate, and transfer data.
考题
网络入侵者使用sniffer对网络进行侦听,在防火墙实现认证的方法中,下列身份认证可能会造成不安全后果的是()。A、Password-Based AuthenticationB、Address-Based AuthenticationC、Cryptographic AuthenticationD、None of Above
考题
You are an administrator of a network that uses PPP for CHAP authentication over ever WAN link. What command would you enter to display the CHAP authentication as it occurs in real time?()A、show ppp authenticationB、debug PAP authenticationC、debug PPP authenticationD、show interface serial0E、show CHAP authentication
考题
In the wireless Advanced Feature Set using lightweight access points, a virtual interface is used when supporting which of the following features?()A、PSK authenticationB、EAP authenticationC、WPA authenticationD、Web authentication
考题
Which two statements about the open and shared key wireless-authentication methods are true?()A、shared key authentication is considered more secure than open authenticationB、shared key authentication is considered less secure than open authenticationC、if the WEP keys do not match using the open authentication method, the client will not authenticate, associate, and transfer dataD、if the WEP keys do not match using the open authentication method, the client will still be able to authenticate and associate, but will not transfer dataE、if the WEP keys do not match using the open authentication method, the client will still be able to authenticate, associate, and transfer data
考题
Which command displays the CHAP authentication process as it occurs between two routers?()A、debug authenticationB、debug chap pppC、debug chap authenticationD、debug ppp authentication
考题
On a standalone access point, client association using EAP-Cisco Wireless (Cisco-LEAP) isfailing, but association using EAP-PEAP is functioning. What needs to be enabled on the standalone accesspoint to correct this issue?()A、network EAPB、open authentication plus MACC、open authentication plus EAPD、a shared key
考题
Which description of BGP authentication is true?()A、MD5 has been used by BGP to encrypt BGP update packets.B、BGP uses a message-digest algorithm to authenticate BGP peersC、A plain-text password authentication is an option of BGP authenticationD、EBGP peers authentication is faster than IBGP peers authenticationE、BGP uses public key and private key to authenticate BGP peers.
考题
Which two authentication mechanisms provide weaker protection than other mechanisms?()A、 HTTP Basic AuthenticationB、 Form Based AuthenticationC、 HTTP Digest AuthenticationD、 HTTPS Client Authentication
考题
Which basic authentication type is optional for a J2EE 1.4 compliant web container?()A、HTTP Basic AuthenticationB、Form Based AuthenticationC、HTTP Digest AuthenticationD、HTTPS Client Authentication
考题
Which mechanism requires the client to provide its public key certificate?()A、HTTP Basic AuthenticationB、Form Based AuthenticationC、HTTP Digest AuthenticationD、HTTPS Client Authentication
考题
Which two methods of authentication are used by the Infranet Controller for IPSec enforcement?()A、dial-up VPNB、IKE authenticationC、XAuth authenticationD、shared IKE authentication
考题
在防火墙实现认证的方法中,采用通过数据包中的源地址来认证的是()。A、Password-Based AuthenticationB、Address-Based AuthenticationC、Cryptographic AuthenticationD、None of Above
考题
多选题属于IEEE802.11的用户认证机制有:()。AOpen authenticationBPre-Shared Key authenticationCShared Key authenticationDMAC authentication
考题
多选题Which two statements about the open and shared key wireless-authentication methods are true?()Ashared key authentication is considered more secure than open authenticationBshared key authentication is considered less secure than open authenticationCif the WEP keys do not match using the open authentication method, the client will not authenticate, associate, and transfer dataDif the WEP keys do not match using the open authentication method, the client will still be able to authenticate and associate, but will not transfer dataEif the WEP keys do not match using the open authentication method, the client will still be able to authenticate, associate, and transfer data
考题
多选题Which two statements about the open and shared key wireless-authentication methods are true? ()AShared key authentication is considered more secure than open authentication.BShared key authentication is considered less secure than open authentication.CIf the WEP keys do not match using the open authentication method, the client will not authenticate, associate, and transfer data.DIf the WEP keys do not match using the open authentication method, the client will still be able to authenticate and associate, but will not transfer data.EIf the WEP keys do not match using the open authentication method, the client will still be able to authenticate, associate, and transfer data.
考题
单选题Refer to the exhibit. When a profile is configured in the Aironet Desktop Utility, which security option permits the configuration of host-based Extensible Authentication Protocol (EAP)?()A
WPA/WPA2/CCKMB
WPA/WPA2 PassphraseC
802.1xD
Pre-Shared Key (Static WEP)
考题
单选题Which the basic authentication type is optional for a J2EE 1.4 compliant web container?()A
HTTP Basic AuthenticationB
Form Based AuthenticationC
HTTP Digest AuthenticationD
HTTPS Client Authentication
热门标签
最新试卷