Which two statements best describe the wireless security standard that is defined by WPA (Choose two.)()。A.It specifies use of a static encryption key that must be changed frequently to enhance securityB.It requires use of an open authentication methodC.I

题目
Which two statements best describe the wireless security standard that is defined by WPA (Choose two.)()。

A.It specifies use of a static encryption key that must be changed frequently to enhance security

B.It requires use of an open authentication method

C.It specifies the use of dynamic encryption keys that change each time a client establishes a connection

D.It requires that all access points and wireless devices use the same encryption key

E.It includes authentication by PSK


相似考题
更多“Which two statements best describe the wireless security standard that is defined by WPA (Choose two.)()。 ”相关问题
  • 第1题:

    Which two statements are true about L2TP tunnels?() (Choose two.)

    • A、Traffic is clear text
    • B、Traffic is encrypted 
    • C、They are initiated by the LNS
    • D、They are initiated by the LAC

    正确答案:A,D

  • 第2题:

    Which two statements accurately describe an IBGP peering session?() (Choose two.)

    • A、Peers are statically defined.
    • B、Peers exist within the same AS.
    • C、Peers must be directly connected to each other.
    • D、Peers advertise routes learned from other IBGP neighbors.

    正确答案:A,B

  • 第3题:

    Which two of these statements best describe the benefits of the Cisco Compatible Extensions Program? (Choose two.)()

    • A、 offers a feature-rich implementation alternative to Wi-Fi certification
    • B、 accelerates the availability of innovative features while maintaining interoperability
    • C、 provides innovative features only on Cisco’s wireless client adapters
    • D、 provides an evolving set of specifications for interoperability
    • E、 eliminates the need for testing by providing innovative features to wireless client vendors through a one-time license fee

    正确答案:B,D

  • 第4题:

    Which two statements best describe enhanced wireless security encryption?()

    • A、TKIP protects RC4 encryption keys
    • B、CKIP and TKIP protect AES encryption keys
    • C、TKIP encryption is more processor intensive than AES encryption is
    • D、WPA requires TKIP encryption, whereas WPA2 supports AES encryption
    • E、WPA requires AES encryption, whereas WPA2 supports TKIP encryption

    正确答案:A,D

  • 第5题:

    Which two statements are true for a security policy? ()(Choose two.)

    • A、It controls inter-zone traffic.
    • B、It controls intra-zone traffic.
    • C、It is named with a system-defined name.
    • D、It controls traffic destined to the device's ingress interface.

    正确答案:A,B

  • 第6题:

    An IPsec tunnel is established on an SRX Series Gateway on an interface whose IP address was obtained using DHCP.Which two statements are true? ()(Choose two.)

    • A、Only main mode can be used for IKE negotiation
    • B、A local-identity must be defined
    • C、It must be the initiator for IKE
    • D、A remote-identity must be defined

    正确答案:B,C

  • 第7题:

    多选题
    Which two of these statements best describe fast secure roaming? (Choose two.)()
    A

    available only in autonomous APs

    B

    available in autonomous and lightweight APs

    C

    a feature of WDS in autonomous APs

    D

    a feature of WDS in lightweight APs

    E

    requires at least one AP and one Wireless LAN Services Module


    正确答案: E,B
    解析: 暂无解析

  • 第8题:

    多选题
    Which two of these statements best describe the benefits of WPAv2? (Choose two.)()
    A

    SSID broadcast prevention

    B

    man-in-the-middle attack protection

    C

    cost reduction through software upgrades in all existing hardware

    D

    dynamic key generation

    E

    RF jamming prevention


    正确答案: D,C
    解析: 暂无解析

  • 第9题:

    多选题
    Which two of these statements best describe the benefits of Cisco’s wireless IDS functionality? (Choose two.)  ()
    A

    AirDefense for wireless IDS is required by autonomous APs.

    B

    2.40Hz CK management can monitor both 802.11 and non-802.11 CK interference.

    C

    APs only monitor the RF channels that are servicing the clients.

    D

    Cisco or CCX compatible client cards can extend the CK IDS service for autonomous APs.

    E

    Autonomous APs must be dedicated IDS sensors while lightweight APs can combine client traffic and RF monitoring.


    正确答案: C,B
    解析: 暂无解析

  • 第10题:

    多选题
    Which two statements describe the criteria bandwidth detection uses to dynamically alter bandwidth allocation?()(Choose two.)
    A

    Throughput is raised as latency decreases.

    B

    Throughput is based on available bandwidth.

    C

    Throughput is lowered as latency decreases.

    D

    Latency is measured by SYNs returned for each metapacket.


    正确答案: B,A
    解析: 暂无解析

  • 第11题:

    多选题
    Which two devices can interfere with the operation of a wireless network because they operate on similar frequencies? (Choose two.)()
    A

    copier

    B

    microwave oven

    C

    toaster

    D

    cordless phone

    E

    IP phone

    F

    AM radio


    正确答案: F,E
    解析: 暂无解析

  • 第12题:

    多选题
    Which two statements best describe the Cisco Unified Wireless Network?()
    A

    The Cisco Unified Wireless Network provides the framework to segregate wired and wirelessnetworks to deliver the best security for companies that are deploying WLANs.

    B

    The Cisco Unified wireless Network provides the framework to integrate and extend wired andwireless networks to deliver the lowest-possible total cost or ownership for companies that aredeploying WLANs

    C

    The Cisco Unified Wireless Network extends wireless awareness into important elements ofthe network infrastructure, providing the same level of security for WLANs that organizations havecome to expect from their VPNs.

    D

    The Cisco unified Wireless Network extends wireless awareness into important elements ofthe network infrastructure, providing the same level of security scalability, reliability ease ofdeployment and management for WLANs that organizations have come to expect from their wiredLANs.


    正确答案: C,A
    解析: 暂无解析

  • 第13题:

    Which two statements best describe the wireless security standard that is defined by WPA (Choose two.)()。

    • A、It specifies use of a static encryption key that must be changed frequently to enhance security
    • B、It requires use of an open authentication method
    • C、It specifies the use of dynamic encryption keys that change each time a client establishes a connection
    • D、It requires that all access points and wireless devices use the same encryption key
    • E、It includes authentication by PSK

    正确答案:C,E

  • 第14题:

    Which two statements best describe the Cisco Unified Wireless Network?()

    • A、 The Cisco Unified Wireless Network provides the framework to segregate wired and wirelessnetworks to deliver the best security for companies that are deploying WLANs.
    • B、 The Cisco Unified wireless Network provides the framework to integrate and extend wired andwireless networks to deliver the lowest-possible total cost or ownership for companies that aredeploying WLANs
    • C、 The Cisco Unified Wireless Network extends "wireless awareness" into important elements ofthe network infrastructure, providing the same level of security for WLANs that organizations havecome to expect from their VPNs.
    • D、 The Cisco unified Wireless Network extends "wireless awareness" into important elements ofthe network infrastructure, providing the same level of security scalability, reliability ease ofdeployment and management for WLANs that organizations have come to expect from their wiredLANs.

    正确答案:B,D

  • 第15题:

    Which two statements best describe the wireless security standard that is defined by WPA? (Choose two.)()

    • A、It specifies use of a static encryption key that must be changed frequently to enhance security.
    • B、It requires use of an open authentication method.
    • C、It specifies the use of dynamic encryption keys that change each time a client establishes a connection.
    • D、It requires that all access points and wireless devices use the same encryption key.
    • E、It includes authentication by PSK

    正确答案:C,E

  • 第16题:

    Which two of these statements best describe fast secure roaming? (Choose two.)()  

    • A、 available only in autonomous APs
    • B、 available in autonomous and lightweight APs
    • C、 a feature of WDS in autonomous APs
    • D、 a feature of WDS in lightweight APs
    • E、 requires at least one AP and one Wireless LAN Services Module

    正确答案:B,C

  • 第17题:

    Which two parameters are configured in IPsec policy? ()(Choose two.)

    • A、mode
    • B、IKE gateway
    • C、security proposal
    • D、Perfect Forward Secrecy

    正确答案:C,D

  • 第18题:

    多选题
    Which two statements best describe the wireless security standard that is defined by WPA? (Choose two.)()
    A

    It specifies use of a static encryption key that must be changed frequently to enhance security.

    B

    It requires use of an open authentication method.

    C

    It specifies the use of dynamic encryption keys that change each time a client establishes a connection.

    D

    It requires that all access points and wireless devices use the same encryption key.

    E

    It includes authentication by PSK


    正确答案: E,B
    解析: 暂无解析

  • 第19题:

    多选题
    Which two statements describe the criteria bandwidth detection uses to dynamically alter bandwidth allocation?()(Choose two.)
    A

    Throughput is raised as latency decreases.

    B

    Throughput is based on available bandwidth.

    C

    Throughput is lowered as latency decreases.

    D

    Latency is measured by SYNs returned for each metapacket


    正确答案: D,C
    解析: 暂无解析

  • 第20题:

    多选题
    Which two statements are true for a security policy? ()(Choose two.)
    A

    It controls inter-zone traffic.

    B

    It controls intra-zone traffic.

    C

    It is named with a system-defined name.

    D

    It controls traffic destined to the device's ingress interface.


    正确答案: D,A
    解析: 暂无解析

  • 第21题:

    多选题
    Which two of these statements best describe fast secure roaming for the wireless core feature set using autonomous access points? (Choose two.) ()
    A

    It is compatible with all wireless clients.

    B

    It reduces roaming latency through reduced client RF channel scanning enhancements.

    C

    It reduces roaming latency to targeted times of less than 75ms.

    D

    Roaming occurs without reauthentication through a centralized RADIUS server.

    E

    It is enabled through WLSE deployment.


    正确答案: A,D
    解析: 暂无解析

  • 第22题:

    多选题
    Which two statements best describe enhanced wireless security encryption?()
    A

    TKIP protects RC4 encryption keys

    B

    CKIP and TKIP protect AES encryption keys

    C

    TKIP encryption is more processor intensive than AES encryption is

    D

    WPA requires TKIP encryption, whereas WPA2 supports AES encryption

    E

    WPA requires AES encryption, whereas WPA2 supports TKIP encryption


    正确答案: E,A
    解析: 暂无解析

  • 第23题:

    多选题
    Which two of these statements describe important aspects of performing a wireless site survey? (Choose two.)  ()
    A

    An 802.11 g access point with a variety of antennas can be used in all standard site surveys.

    B

    Site surveys can be performed manually or through assisted site survey.

    C

    Channel power during testing starts at the default minimum and gradually increases to the maximum.

    D

    Overlapping access points can create performance problems.

    E

    Surveys should be done after hours in an office building or during reduced inventory levels in warehouses.


    正确答案: B,D
    解析: 暂无解析