网友您好, 请在下方输入框内输入要搜索的题目:
题目内容
(请给出正确答案)
WEP全称为Wired Equivalent Protocol(有线等效协议),是IEEE802.11n认证中的安全加密协议。
参考答案
更多 “WEP全称为Wired Equivalent Protocol(有线等效协议),是IEEE802.11n认证中的安全加密协议。” 相关考题
考题
802.llb定义了无线网的安全协议WEP(Wired Equivalent Privacy)。下面关于WEP的描述中不正确的是( )。A) WEP使用RC4流加密协议B) WEP支持40位密钥和128位密钥C) WEP是一种对称密钥机制D) WEP支持端到端的加密和认证
考题
11b定义了无线网的安全协议WEP(Wired Equivalent Privacy)。以下关于WEP的描述中,正确的是____.A.采用的密钥长度是80位B.其加密算法属于公开密钥密码体系C.WEP只是对802.11站点之间的数据进行加密D.WEP也可以保护AP有线网络端的数据安全
考题
以下关于无线网安全协议WEP(Wired Equivalent Privacy)的描述中,哪项是不正确的?——A.WEP使用RC4流加密协议B.WEP支持端到端的加密和认证C.WEP支持40位密钥和128位密钥D.WEP是一种对称密钥机制
考题
11b定义了无线网的安全协议WEP(Wired Equivalent Privacy)。以下关于WEP的描述中,不正确的是(58)。A.WEP使用RC4流加密协议B.WEP支持40位密钥和128位密钥C.WEP支持端到端的加密和认证D.WEP是一种对称密钥机制
考题
wireless LAN,also widely known as WLAN or WIFI,is probably the most well-known member of the IEEE802 protocol family for home users today.It is standardized by()and shares many properties with wired EthernetA.IEEE 802.1B.IEEE 802.3C.IEEE 802.5D.IEEE 802.11
考题
下列对WEP加密的描述,错误的是()。
A.WEP加密采用一种流加密算法B.WEP加密加入了IV来破坏密钥的规律性C.WEP加密中IV的长度为48bitsD.WEP加密允许设备同时储存四把密钥
考题
11b定义了无线网的安全协议WEP。下列选项中,关于WEP的描述不正确的是( )。A.WEP使用RC4流加密协议B.WEP支持40位密钥和128位密钥C.WEP支持端到端的加密和认证D.WEP是一种对称密钥机制
考题
wireless LAN,also widely known as WLAN or WIFI,is probably the most well-known member of the IEEE802 protocol family for home users today.It is standardized by ( ) and shares many properties with wired Ethernet. A.IEEE 802.1
B.IEEE 802.3
C.IEEE 802.5
D.IEEE 802.11
考题
下列对WEP加密的描述,错误的是()。A、WEP加密采用一种流加密算法B、WEP加密加入了IV来破坏密钥的规律性C、WEP加密中IV的长度为48bitsD、WEP加密允许设备同时储存四把密钥
考题
Which statement is correct for both the LWAPP and CAPWAP AP upstream 802.1Q tagged wired QoS priority for a non-WMM-associated client frame that is H-REAP locally switched running v5.2?()A、Wireless client WMM UP classification is translated to a wired DSCP priority.B、Wireless client 802.11p classification is translated to a wired DSCP priority.C、Wireless client WMM UP classification is translated to a wired 802.1p CoS priority.D、Wireless client 802.11p classification is translated to a wired 802.1p CoS priority.E、WLAN configured QoS level is used to set the wired DSCP priority.F、Wired 802.1p CoS priority is not set.
考题
Which two statements are true about the Wi-Fi Protected Access (WPA) and Wi-Fi Protected Access version 2 (WPA2) security solutions?()A、both WPA and WPA2 require authentication support via IEEE 802.1 x and Pre-Shared Key (PSK)B、both WPA and WPA2 address all known Wired Equivalent Privacy (WEP) vulnerabilities in the IEEE 802.11i security implementationC、WPA is supported on client devices only. WPA2 is supported on both access point (AP) and client devicesD、WPA provides only a standard for authentication. WPA2 provides a standard for authentication and encryptionE、WPA requires encryption support via Temporal Key Integrity Protocol (TKIP) WPA2 provides encryption support via (symmetric block cipher)AES-CCMP
考题
Cisco provides two enhancements to 802.11 security which protect a WEP key from exploits. Which two technologies provide these security enhancements? ()A、802.1XB、Cisco Temporal Key Integrity Protocol (CKIP)C、Extensible Authentication Protocol-Flexible Authentication via Secure Tunneling (EAP-FAST)D、Cisco Message Integrity Check (CMIC)E、One-Time Passwords (OTP)F、Advanced Encryption Standard (AES)
考题
Static WEP is configured on the access point. You are authenticated and associated to the accesspoint but are unable to obtain an IP address. Which of the following will cause this problem?()A、invalid radio type selectedB、no WEP key configured on the clientC、invalid SSID configuredD、invalid WEP key
考题
Which two statements about the Wired Equivalent Privacy (WEP) encryption mechanism are true? ()A、the two methods of authentication using the WEP encryption are open and shared keyB、the 802.11 standard defines WEP security using 128-bit keysC、WEP can provide stronger authentication through the use of LEAP, PEAP, or EAP-FASTD、WEP is a scalable encryption solution that uses static keys for authenticationE、WEP security provides only one-way authenticationF、WEPv2 offers improved encryption by replacing the RC4 encryption mechanism with the AES (symmetric block cipher) mechanism
考题
以下哪些是无线网络要关注的安全因素()A、启用无线设备的不广播功能,不进行SSID的扩散B、使用不规则网络名,禁止使用默认名C、客户端MAC地址过滤D、WEP:wired equivalent privacy(有线等效加密)
考题
Which of the following wireless security techniques is the MOST secure?()A、Enable Wired Equivalent PrivacyB、Disable SSID broadcastC、Enable Wi-Fi Protected AccessD、Enable MAC filtering
考题
You need to design an authentication solution for the wireless network. Your solution must meet the security requirements. What should you do?()A、Create wireless VPNs using L2TP/IPSec between the client computers to the wireless access pointB、Configure IEEE 802.1x authentication with smart cardsC、Configure the wireless network to use Wired Equivalent Privacy (WEP)D、Install and configure an Internet Authentication Service (IAS) server
考题
You need to design a Security strategy for the wireless network at all resort locations.What should you do?()A、Connect the wireless access points to a dedicated subnet. Allow the subnet direct access to the Internet,but not to the company network.Require company users to establish a VPN to access company resourcesB、Install Internet Authentication Service (IAS) on a domain controller.Configure the wireless access points to require IEEE 802.1x authenticationC、Establish IPSec policies on all company servers to request encryption from all computers that connect from the wireless IP networksD、Configure all wireless access points to require the Wired Equivalent Privacy (WEP) protocol for all connections. Use a Group Policy object (GPO) to distribute the WEP keys to all computers in the domain
考题
多选题When implementing WLAN security, what are three benefits of using the Temporal Key Integrity Protocol (TKIP) instead of WEP? ()ATKIP uses an advanced encryption scheme based on AESBTKIP provides authentication and integrity checking using Cipher Block Chaining Message Authentication Code (CBC-MAC)CTKIP provides per-packet keyingand a rekeying mechanismDTKIP provides message integrity checkETKIP reduces WEP’s vulnerabilities byusing different hardware encryption chipsetFTKIP uses a 48 bit InitializationVector
考题
单选题Static WEP is configured on the access point. You are authenticated and associated to the accesspoint but are unable to obtain an IP address. Which of the following will cause this problem?()A
invalid radio type selectedB
no WEP key configured on the clientC
invalid SSID configuredD
invalid WEP key
考题
单选题You need to design an authentication strategy for users of portable computers. Your solution must meet business requirements. What should you do?()A
Issue smart cards and smart card readers to all portable computer users. Configure the domain to require smart cards for login and to log off users who remote their smart cardsB
Configure the portable computers to connect to only wireless networks that use Wired Equivalent Privacy (WEP). Install digital certificates on all portable computersC
Install computer certificates on all portable computers. Configure all portable computers to respond to requests for IPSec encryptionD
Install biometric authentication devices on all portable computers. Configure the Default Domain Policy GPO to require complex passwords for all users
考题
多选题Which two statements are true about the Wi-Fi Protected Access (WPA) and Wi-Fi Protected Access version 2 (WPA2) security solutions?()Aboth WPA and WPA2 require authentication support via IEEE 802.1 x and Pre-Shared Key (PSK)Bboth WPA and WPA2 address all known Wired Equivalent Privacy (WEP) vulnerabilities in the IEEE 802.11i security implementationCWPA is supported on client devices only. WPA2 is supported on both access point (AP) and client devicesDWPA provides only a standard for authentication. WPA2 provides a standard for authentication and encryptionEWPA requires encryption support via Temporal Key Integrity Protocol (TKIP) WPA2 provides encryption support via (symmetric block cipher)AES-CCMP
考题
单选题Refer to the exhibit. When a profile is configured in the Aironet Desktop Utility, which security option permits the configuration of host-based Extensible Authentication Protocol (EAP)?()A
WPA/WPA2/CCKMB
WPA/WPA2 PassphraseC
802.1xD
Pre-Shared Key (Static WEP)
考题
多选题Which two statements about the Wired Equivalent Privacy (WEP) encryption mechanism are true? ()Athe two methods of authentication using the WEP encryption are open and shared keyBthe 802.11 standard defines WEP security using 128-bit keysCWEP can provide stronger authentication through the use of LEAP, PEAP, or EAP-FASTDWEP is a scalable encryption solution that uses static keys for authenticationEWEP security provides only one-way authenticationFWEPv2 offers improved encryption by replacing the RC4 encryption mechanism with the AES (symmetric block cipher) mechanism
热门标签
最新试卷