网友您好, 请在下方输入框内输入要搜索的题目:
题目内容
(请给出正确答案)
多选题
Which two statements best describe enhanced wireless security encryption?()
A
TKIP protects RC4 encryption keys
B
CKIP and TKIP protect AES encryption keys
C
TKIP encryption is more processor intensive than AES encryption is
D
WPA requires TKIP encryption, whereas WPA2 supports AES encryption
E
WPA requires AES encryption, whereas WPA2 supports TKIP encryption
参考答案
参考解析
解析:
暂无解析
更多 “多选题Which two statements best describe enhanced wireless security encryption?()ATKIP protects RC4 encryption keysBCKIP and TKIP protect AES encryption keysCTKIP encryption is more processor intensive than AES encryption isDWPA requires TKIP encryption, whereas WPA2 supports AES encryptionEWPA requires AES encryption, whereas WPA2 supports TKIP encryption” 相关考题
考题
Which two of these statements best describe the benefits of WPAv2? (Choose two.)()A、 SSID broadcast preventionB、 man-in-the-middle attack protectionC、 cost reduction through software upgrades in all existing hardwareD、 dynamic key generationE、 RF jamming prevention
考题
From small business to large-scale enterprises, which two best describe how the Cisco Unified Wireless Network reduces overall operational expenses? ()A、 extends networkQoS throughout the networkB、 simplifies management of central or remotely located access pointsC、 ensures implementation of the most recent security protocolsD、 streamlines wireless LAN managementE、 extends features for optical traffic network services
考题
Which two statements best describe Cisco IOS IP SLA?()A、only implemented between Cisco source and destination-capable devicesB、statistics provided by syslog, CLI, and SNMPC、measures delay, jitter, packet loss, and voice qualityD、only monitors VoIP traffic flowsE、provides active monitoringF、provides passive monitoring
考题
Which two statements best describe the wireless security standard that is defined by WPA (Choose two.)()。A、It specifies use of a static encryption key that must be changed frequently to enhance securityB、It requires use of an open authentication methodC、It specifies the use of dynamic encryption keys that change each time a client establishes a connectionD、It requires that all access points and wireless devices use the same encryption keyE、It includes authentication by PSK
考题
Which two statements accurately describe an IBGP peering session?() (Choose two.)A、Peers are statically defined.B、Peers exist within the same AS.C、Peers must be directly connected to each other.D、Peers advertise routes learned from other IBGP neighbors.
考题
Which two of these statements best describe the benefits of WPAv1? ()A、 SSID broadcast preventionB、 Improved mutual authenticationC、 Improved encryption through AESD、 Improved protection against sniffing initialization vectorsE、 RF jamming prevention
考题
Which two statements best describe the Cisco Unified Wireless Network?()A、 The Cisco Unified Wireless Network provides the framework to segregate wired and wirelessnetworks to deliver the best security for companies that are deploying WLANs.B、 The Cisco Unified wireless Network provides the framework to integrate and extend wired andwireless networks to deliver the lowest-possible total cost or ownership for companies that aredeploying WLANsC、 The Cisco Unified Wireless Network extends "wireless awareness" into important elements ofthe network infrastructure, providing the same level of security for WLANs that organizations havecome to expect from their VPNs.D、 The Cisco unified Wireless Network extends "wireless awareness" into important elements ofthe network infrastructure, providing the same level of security scalability, reliability ease ofdeployment and management for WLANs that organizations have come to expect from their wiredLANs.
考题
From small businesses to large-scale enterprises, which two best describe how the Cisco UnifiedWireless Network reduces overall operational expenses?()A、 extends networkQoS throughout the networkB、 simplifies management of central or remotely locates access pointsC、 ensures implementation of the most recent security protocolsD、 streamlines wireless LAN managementE、 extends features for optical traffic network services
考题
Which two statements best describe CBWFQ?()A、The CBWFQ scheduler provides a guaranteed minimum amount of bandwidth to each class.B、CBWFQ services each class queue using a strict priority scheduler.C、The class-default queue only supports WFQ.D、Inside a class queue, processing is always FIFO, except for the class-default queue.
考题
Which two statements best describe EtherChannel?()A、EtherChannel technology helps aggregate traffic grouping multiple,full-duplex point-to-point linkstogetherB、EtherChannel technology is based on the 802.1 IEEE standC、EtherChannel can aggregate up to 800 Mbps,8 Gbps,or Gbps of aggregate bandwidth for a Fast EtherChannel,Gigabit EtherChannel,or 10 Gigabit EtherChannel connection respectivelyD、EtherChannel is defined for Rapid Spanning Tree for faster convergence
考题
Which two of these statements best describe the benefits of the Cisco Compatible Extensions Program? (Choose two.)()A、 offers a feature-rich implementation alternative to Wi-Fi certificationB、 accelerates the availability of innovative features while maintaining interoperabilityC、 provides innovative features only on Cisco’s wireless client adaptersD、 provides an evolving set of specifications for interoperabilityE、 eliminates the need for testing by providing innovative features to wireless client vendors through a one-time license fee
考题
Which two statements best describe the wireless security standard that is defined by WPA? (Choose two.)()A、It specifies use of a static encryption key that must be changed frequently to enhance security.B、It requires use of an open authentication method.C、It specifies the use of dynamic encryption keys that change each time a client establishes a connection.D、It requires that all access points and wireless devices use the same encryption key.E、It includes authentication by PSK
考题
Which two statements best describe enhanced wireless security encryption?()A、TKIP protects RC4 encryption keysB、CKIP and TKIP protect AES encryption keysC、TKIP encryption is more processor intensive than AES encryption isD、WPA requires TKIP encryption, whereas WPA2 supports AES encryptionE、WPA requires AES encryption, whereas WPA2 supports TKIP encryption
考题
Which two of these statements best describe fast secure roaming? (Choose two.)() A、 available only in autonomous APsB、 available in autonomous and lightweight APsC、 a feature of WDS in autonomous APsD、 a feature of WDS in lightweight APsE、 requires at least one AP and one Wireless LAN Services Module
考题
A technician is working on a SOHO wireless network and notices that the wireless adaptor in the laptop shows excellent connection at 11Mbps. The technician has a wireless N adaptor. Which of the following would BEST describe this connection speed?()A、The laptop is too far away from the WAP.B、The WAP is using 802.11a frequencies.C、The laptop is only set to allow 802.11n connections.D、The technician is on an 802.11b network.
考题
多选题Which two of these statements best describe fast secure roaming? (Choose two.)()Aavailable only in autonomous APsBavailable in autonomous and lightweight APsCa feature of WDS in autonomous APsDa feature of WDS in lightweight APsErequires at least one AP and one Wireless LAN Services Module
考题
多选题Which two of these statements best describe the benefits of WPAv2? (Choose two.)()ASSID broadcast preventionBman-in-the-middle attack protectionCcost reduction through software upgrades in all existing hardwareDdynamic key generationERF jamming prevention
考题
多选题From small businesses to large-scale enterprises, which two best describe how the Cisco UnifiedWireless Network reduces overall operational expenses?()Aextends networkQoS throughout the networkBsimplifies management of central or remotely locates access pointsCensures implementation of the most recent security protocolsDstreamlines wireless LAN managementEextends features for optical traffic network services
考题
多选题Which two of these statements best describe the benefits of WPAv1? ()ASSID broadcast preventionBImproved mutual authenticationCImproved encryption through AESDImproved protection against sniffing initialization vectorsERF jamming prevention
考题
单选题Which two terms can best describe the following pairs of words: table—tables, day + break—daybreak.A
inflection and compoundB
compound and derivationC
inflection and derivation
考题
多选题Which two statements describe the advantages to the use of RIP over the use of OSPF?()ARIP requires less time to convergeBRIP uses less bandwidthCRIP is less complex to configureDRIP demands fewer router resourcesERIP has a more accurate metric
考题
多选题Which two of these statements best describe the benefits of Cisco’s wireless IDS functionality? (Choose two.) ()AAirDefense for wireless IDS is required by autonomous APs.B2.40Hz CK management can monitor both 802.11 and non-802.11 CK interference.CAPs only monitor the RF channels that are servicing the clients.DCisco or CCX compatible client cards can extend the CK IDS service for autonomous APs.EAutonomous APs must be dedicated IDS sensors while lightweight APs can combine client traffic and RF monitoring.
考题
多选题Which two of these statements best describe fast secure roaming for the wireless core feature set using autonomous access points? (Choose two.) ()AIt is compatible with all wireless clients.BIt reduces roaming latency through reduced client RF channel scanning enhancements.CIt reduces roaming latency to targeted times of less than 75ms.DRoaming occurs without reauthentication through a centralized RADIUS server.EIt is enabled through WLSE deployment.
考题
多选题Which two statements describe the criteria bandwidth detection uses to dynamically alter bandwidth allocation?()(Choose two.)AThroughput is raised as latency decreases.BThroughput is based on available bandwidth.CThroughput is lowered as latency decreases.DLatency is measured by SYNs returned for each metapacket.
考题
多选题Which two of these statements describe important aspects of performing a wireless site survey? (Choose two.) ()AAn 802.11 g access point with a variety of antennas can be used in all standard site surveys.BSite surveys can be performed manually or through assisted site survey.CChannel power during testing starts at the default minimum and gradually increases to the maximum.DOverlapping access points can create performance problems.ESurveys should be done after hours in an office building or during reduced inventory levels in warehouses.
考题
多选题Which two statements best describe the Cisco Unified Wireless Network?()AThe Cisco Unified Wireless Network provides the framework to segregate wired and wirelessnetworks to deliver the best security for companies that are deploying WLANs.BThe Cisco Unified wireless Network provides the framework to integrate and extend wired andwireless networks to deliver the lowest-possible total cost or ownership for companies that aredeploying WLANsCThe Cisco Unified Wireless Network extends wireless awareness into important elements ofthe network infrastructure, providing the same level of security for WLANs that organizations havecome to expect from their VPNs.DThe Cisco unified Wireless Network extends wireless awareness into important elements ofthe network infrastructure, providing the same level of security scalability, reliability ease ofdeployment and management for WLANs that organizations have come to expect from their wiredLANs.
考题
多选题Which two statements best describe Cisco IOS IP SLA?()Aonly implemented between Cisco source and destination-capable devicesBstatistics provided by syslog, CLI, and SNMPCmeasures delay, jitter, packet loss, and voice qualityDonly monitors VoIP traffic flowsEprovides active monitoringFprovides passive monitoring
考题
多选题Which two statements best describe CBWFQ?()AThe CBWFQ scheduler provides a guaranteed minimum amount of bandwidth to each class.BCBWFQ services each class queue using a strict priority scheduler.CThe class-default queue only supports WFQ.DInside a class queue, processing is always FIFO, except for the class-default queue.
热门标签
最新试卷