网友您好, 请在下方输入框内输入要搜索的题目:

题目内容 (请给出正确答案)

属于IEEE802.11的用户认证机制有:()。

  • A、Open authentication
  • B、Pre-Shared Key authentication
  • C、Shared Key authentication
  • D、MAC authentication

参考答案

更多 “属于IEEE802.11的用户认证机制有:()。A、Open authenticationB、Pre-Shared Key authenticationC、Shared Key authenticationD、MAC authentication” 相关考题
考题 在防火墙实现认证的方法中,采用通过数据包中的源地址来认证的是()。 A. Password-Based AuthenticationB. Address-Based AuthenticationC. Cryptographic AuthenticationD. None of Above

考题 进行PPP配置时,可利用(54)命令诊断身份认证过程中出现的问题,得到如图8-8所示的系统输出信息。A.debug chap authenticationB.debug pap authenticationC.debug ppp authenticationD.ppp authentication chap

考题 Which two methods of authentication are used by the Infranet Controller for IPSec enforcement?() A. dial-up VPNB. IKE authenticationC. XAuth authenticationD. shared IKE authentication

考题 You are an administrator of a network that uses PPP for CHAP authentication over ever WAN link. What command would you enter to display the CHAP authentication as it occurs in real time?() A. show ppp authenticationB. debug PAP authenticationC. debug PPP authenticationD. show interface serial0E. show CHAP authentication

考题 Which two features did WPAv1 add to address the inherent weaknesses found in WEP?() A.a stronger encryption algorithmB.key mixing using temporal keysC.shared key authenticationD.a shorter initialization vectorE.per frame sequence counters

考题 ● (67)不属于用户认证机制。(67)A.用户名和密码B.数字证书C.SSLD.User Key

考题 属于IEEE802.11的用户认证机制有:()。 A.Open authenticationB.Pre-Shared Key authenticationC.Shared Key authenticationD.MAC authentication

考题 ( )不属于用户认证机制。A.用户名和密码 B.数字证书 C.SSL D.User Key

考题 Which two features did WPAv1 add to address the inherent weaknesses found in WEP?()A、a stronger encryption algorithmB、key mixing using temporal keysC、shared key authenticationD、a shorter initialization vectorE、per frame sequence counters

考题 Which two statements about the open and shared key wireless-authentication methods are true? ()A、 Shared key authentication is considered more secure than open authentication.B、 Shared key authentication is considered less secure than open authentication.C、 If the WEP keys do not match using the open authentication method, the client will not authenticate, associate, and transfer data.D、 If the WEP keys do not match using the open authentication method, the client will still be able to authenticate and associate, but will not transfer data.E、 If the WEP keys do not match using the open authentication method, the client will still be able to authenticate, associate, and transfer data.

考题 网络入侵者使用sniffer对网络进行侦听,在防火墙实现认证的方法中,下列身份认证可能会造成不安全后果的是()。A、Password-Based AuthenticationB、Address-Based AuthenticationC、Cryptographic AuthenticationD、None of Above

考题 You are an administrator of a network that uses PPP for CHAP authentication over ever WAN link. What command would you enter to display the CHAP authentication as it occurs in real time?()A、show ppp authenticationB、debug PAP authenticationC、debug PPP authenticationD、show interface serial0E、show CHAP authentication

考题 In the wireless Advanced Feature Set using lightweight access points, a virtual interface is used when supporting which of the following features?()A、PSK authenticationB、EAP authenticationC、WPA authenticationD、Web authentication

考题 Which two statements about the open and shared key wireless-authentication methods are true?()A、shared key authentication is considered more secure than open authenticationB、shared key authentication is considered less secure than open authenticationC、if the WEP keys do not match using the open authentication method, the client will not authenticate, associate, and transfer dataD、if the WEP keys do not match using the open authentication method, the client will still be able to authenticate and associate, but will not transfer dataE、if the WEP keys do not match using the open authentication method, the client will still be able to authenticate, associate, and transfer data

考题 Which command displays the CHAP authentication process as it occurs between two routers?()A、debug authenticationB、debug chap pppC、debug chap authenticationD、debug ppp authentication

考题 On a standalone access point, client association using EAP-Cisco Wireless (Cisco-LEAP) isfailing, but association using EAP-PEAP is functioning. What needs to be enabled on the standalone accesspoint to correct this issue?()A、network EAPB、open authentication plus MACC、open authentication plus EAPD、a shared key

考题 Which description of BGP authentication is true?()A、MD5 has been used by BGP to encrypt BGP update packets.B、BGP uses a message-digest algorithm to authenticate BGP peersC、A plain-text password authentication is an option of BGP authenticationD、EBGP peers authentication is faster than IBGP peers authenticationE、BGP uses public key and private key to authenticate BGP peers.

考题 Which two authentication mechanisms provide weaker protection than other mechanisms?()A、 HTTP Basic AuthenticationB、 Form Based AuthenticationC、 HTTP Digest AuthenticationD、 HTTPS Client Authentication

考题 Which basic authentication type is optional for a J2EE 1.4 compliant web container?()A、HTTP Basic AuthenticationB、Form Based AuthenticationC、HTTP Digest AuthenticationD、HTTPS Client Authentication

考题 Which mechanism requires the client to provide its public key certificate?()A、HTTP Basic AuthenticationB、Form Based AuthenticationC、HTTP Digest AuthenticationD、HTTPS Client Authentication

考题 Which two methods of authentication are used by the Infranet Controller for IPSec enforcement?()A、dial-up VPNB、IKE authenticationC、XAuth authenticationD、shared IKE authentication

考题 在防火墙实现认证的方法中,采用通过数据包中的源地址来认证的是()。A、Password-Based AuthenticationB、Address-Based AuthenticationC、Cryptographic AuthenticationD、None of Above

考题 多选题属于IEEE802.11的用户认证机制有:()。AOpen authenticationBPre-Shared Key authenticationCShared Key authenticationDMAC authentication

考题 多选题Which two statements about the open and shared key wireless-authentication methods are true?()Ashared key authentication is considered more secure than open authenticationBshared key authentication is considered less secure than open authenticationCif the WEP keys do not match using the open authentication method, the client will not authenticate, associate, and transfer dataDif the WEP keys do not match using the open authentication method, the client will still be able to authenticate and associate, but will not transfer dataEif the WEP keys do not match using the open authentication method, the client will still be able to authenticate, associate, and transfer data

考题 多选题Which two statements about the open and shared key wireless-authentication methods are true? ()AShared key authentication is considered more secure than open authentication.BShared key authentication is considered less secure than open authentication.CIf the WEP keys do not match using the open authentication method, the client will not authenticate, associate, and transfer data.DIf the WEP keys do not match using the open authentication method, the client will still be able to authenticate and associate, but will not transfer data.EIf the WEP keys do not match using the open authentication method, the client will still be able to authenticate, associate, and transfer data.

考题 单选题Refer to the exhibit. When a profile is configured in the Aironet Desktop Utility, which security option  permits the configuration of host-based Extensible Authentication Protocol (EAP)?()A  WPA/WPA2/CCKMB  WPA/WPA2 PassphraseC  802.1xD  Pre-Shared Key (Static WEP)

考题 单选题Which the basic authentication type is optional for a J2EE 1.4 compliant web container?()A  HTTP Basic AuthenticationB  Form Based AuthenticationC  HTTP Digest AuthenticationD  HTTPS Client Authentication