网友您好, 请在下方输入框内输入要搜索的题目:
题目内容
(请给出正确答案)
单选题
What is one reason that WPA encryption is preferred over WEP()。
A
A WPA key is longer and requires more special characters than the WEP key.
B
The access point and the client are manually configured with different WPA key values.
C
WPA key values remain the same until the client configuration is changed.
D
The values of WPA keys can change dynamically while the system is used.
参考答案
参考解析
解析:
暂无解析
更多 “单选题What is one reason that WPA encryption is preferred over WEP()。A A WPA key is longer and requires more special characters than the WEP key.B The access point and the client are manually configured with different WPA key values.C WPA key values remain the same until the client configuration is changed.D The values of WPA keys can change dynamically while the system is used.” 相关考题
考题
WhichtwostatementsaretrueabouttheWi-FiProtectedAccess(WPA)andWi-FiProtectedAccessversion2(WPA2)securitysolutions?()
A.bothWPAandWPA2requireauthenticationsupportviaIEEE802.1xandPre-SharedKey(PSK)B.bothWPAandWPA2addressallknownWiredEquivalentPrivacy(WEP)vulnerabilitiesintheIEEE802.11isecurityimplementationC.WPAissupportedonclientdevicesonly.WPA2issupportedonbothaccesspoint(AP)andclientdevicesD.WPAprovidesonlyastandardforauthentication.WPA2providesastandardforauthenticationandencryptionE.WPArequiresencryptionsupportviaTemporalKeyIntegrityProtocol(TKIP)WPA2providesencryptionsupportvia(symmetricblockcipher)AES-CCMP
考题
What is one reason that WPA encryption is preferred over WEP?()
A. A WPA key is longer and requires more special characters than the WEP key.B. The access point and the client are manually configured with different WPA key values.C. WPA key values remain the same until the client configuration is changed.D. The values of WPA keys can change dynamically while the system is used.
考题
Which two statements best describe the wireless security standard that is defined by WPA (Choose two.)()。
A.It specifies use of a static encryption key that must be changed frequently to enhance securityB.It requires use of an open authentication methodC.It specifies the use of dynamic encryption keys that change each time a client establishes a connectionD.It requires that all access points and wireless devices use the same encryption keyE.It includes authentication by PSK
考题
关于WEP和WPA加密方式的说法中正确的有()A、802.11b协议中首次提出WPA加密方式B、802.11i协议中首次提出WPA加密方式C、采用WEP加密方式,只要设置足够复杂的口令就可以避免被破解D、WEP口令无论多么复杂,都很容易遭到破解
考题
Which two statements are true about the Wi-Fi Protected Access (WPA) and Wi-Fi Protected Access version 2 (WPA2) security solutions?()A、both WPA and WPA2 require authentication support via IEEE 802.1 x and Pre-Shared Key (PSK)B、both WPA and WPA2 address all known Wired Equivalent Privacy (WEP) vulnerabilities in the IEEE 802.11i security implementationC、WPA is supported on client devices only. WPA2 is supported on both access point (AP) and client devicesD、WPA provides only a standard for authentication. WPA2 provides a standard for authentication and encryptionE、WPA requires encryption support via Temporal Key Integrity Protocol (TKIP) WPA2 provides encryption support via (symmetric block cipher)AES-CCMP
考题
Static wep is configured on the access point. you are authenticated and associated to the access point but are unable to obtain an ip address. Which of the following will cause this problem?()A、invalid radio type selectedB、no wep key configured on the clientC、invalid ssid configuredD、invalid wep key
考题
Static WEP is configured on the access point. You are authenticated and associated to the accesspoint but are unable to obtain an IP address. Which of the following will cause this problem?()A、invalid radio type selectedB、no WEP key configured on the clientC、invalid SSID configuredD、invalid WEP key
考题
Wi-Fi Protected Access was an interim step on the way to the more secure WPA2. What was added in WPA2 to make it more secure?()A、 PEAPB、 EAP-FASTC、 AES encryptionD、 Rivest Cipher 4 encryption
考题
A company wants to secure access to its internal wireless network. The company wants to use themost secure means to access the network. Which of the following is the BEST choice for wireless security in this situation?()A、WEP encryptionB、Channel rotationC、Disable SSIDD、WPA encryption
考题
Which two statements best describe the wireless security standard that is defined by WPA (Choose two.)()。A、It specifies use of a static encryption key that must be changed frequently to enhance securityB、It requires use of an open authentication methodC、It specifies the use of dynamic encryption keys that change each time a client establishes a connectionD、It requires that all access points and wireless devices use the same encryption keyE、It includes authentication by PSK
考题
What is one reason that WPA encryption is preferred over WEP?()A、A WPA key is longer and requires more special characters than the WEP key.B、The access point and the client are manually configured with different WPA key values.C、WPA key values remain the same until the client configuration is changed.D、The values of WPA keys can change dynamically while the system is used.
考题
Which two statements best describe the wireless security standard that is defined by WPA? (Choose two.)()A、It specifies use of a static encryption key that must be changed frequently to enhance security.B、It requires use of an open authentication method.C、It specifies the use of dynamic encryption keys that change each time a client establishes a connection.D、It requires that all access points and wireless devices use the same encryption key.E、It includes authentication by PSK
考题
What are three security problems with Wi-Fi Protected Access (WPA)?()A、WPA is based on the outdated IEEE 802.11i standard.B、WPA uses RSN,which uses the same base encryption algorithm as RC4.C、WPA requires a hardware upgrade that may not be supported by all vendors.D、WPA uses TKIP,which uses the same base encryption algorithm as WEP.E、WPA is susceptible to a DoS attack when it receives two packets in quick succession with bad MICs,forcing the AP to shut down the entire Basic Service Set (BSS) for one minute.F、WPA is susceptible to a security weakness when preshared keys are used.
考题
Which two statements best describe enhanced wireless security encryption?()A、TKIP protects RC4 encryption keysB、CKIP and TKIP protect AES encryption keysC、TKIP encryption is more processor intensive than AES encryption isD、WPA requires TKIP encryption, whereas WPA2 supports AES encryptionE、WPA requires AES encryption, whereas WPA2 supports TKIP encryption
考题
单选题What is one reason that WPA encryption is preferred over WEP?()A
A WPA key is longer and requires more special characters than the WEP key.B
The access point and the client are manually configured with different WPA key values.C
WPA key values remain the same until the client configuration is changed.D
The values of WPA keys can change dynamically while the system is used.
考题
单选题Wi-Fi Protected Access was an interim step on the way to the more secure WPA2. What was added in WPA2 to make it more secure?()A
PEAPB
EAP-FASTC
AES encryptionD
Rivest Cipher 4 encryption
考题
多选题Which two statements best describe enhanced wireless security encryption?()ATKIP protects RC4 encryption keysBCKIP and TKIP protect AES encryption keysCTKIP encryption is more processor intensive than AES encryption isDWPA requires TKIP encryption, whereas WPA2 supports AES encryptionEWPA requires AES encryption, whereas WPA2 supports TKIP encryption
考题
多选题Which two statements are true about the Wi-Fi Protected Access (WPA) and Wi-Fi Protected Access version 2 (WPA2) security solutions?()Aboth WPA and WPA2 require authentication support via IEEE 802.1 x and Pre-Shared Key (PSK)Bboth WPA and WPA2 address all known Wired Equivalent Privacy (WEP) vulnerabilities in the IEEE 802.11i security implementationCWPA is supported on client devices only. WPA2 is supported on both access point (AP) and client devicesDWPA provides only a standard for authentication. WPA2 provides a standard for authentication and encryptionEWPA requires encryption support via Temporal Key Integrity Protocol (TKIP) WPA2 provides encryption support via (symmetric block cipher)AES-CCMP
考题
单选题Refer to the exhibit. When a profile is configured in the Aironet Desktop Utility, which security option permits the configuration of host-based Extensible Authentication Protocol (EAP)?()A
WPA/WPA2/CCKMB
WPA/WPA2 PassphraseC
802.1xD
Pre-Shared Key (Static WEP)
考题
多选题Which two statements best describe the wireless security standard that is defined by WPA? (Choose two.)()AIt specifies use of a static encryption key that must be changed frequently to enhance security.BIt requires use of an open authentication method.CIt specifies the use of dynamic encryption keys that change each time a client establishes a connection.DIt requires that all access points and wireless devices use the same encryption key.EIt includes authentication by PSK
考题
单选题Static WEP is configured on the access point. You are authenticated and associated to the accesspoint but are unable to obtain an IP address. Which of the following will cause this problem?()A
invalid radio type selectedB
no WEP key configured on the clientC
invalid SSID configuredD
invalid WEP key
考题
单选题Static wep is configured on the access point. you are authenticated and associated to the access point but are unable to obtain an ip address. Which of the following will cause this problem?()A
invalid radio type selectedB
no wep key configured on the clientC
invalid ssid configuredD
invalid wep key
热门标签
最新试卷