网友您好, 请在下方输入框内输入要搜索的题目:
题目内容
(请给出正确答案)
单选题
Which of the following uses pair authentication to provide a wireless connection between twodevices?()
A
802.11n
B
Bluetooth
C
Infrared
D
Cellular
参考答案
参考解析
解析:
暂无解析
更多 “单选题Which of the following uses pair authentication to provide a wireless connection between twodevices?()A 802.11nB BluetoothC InfraredD Cellular” 相关考题
考题
Which of the following pin pairs remain with the same wire color for either T568A or T568B?()
A. Pair 1 8B. Pair 2 7C. Pair 3 6D. Pair 4 5
考题
Which of the following LAN technologies is considered fast Ethernet and uses two pairs of cabling,one pair for sending and the other pair for receiving?()
A.100Base-T4B.100Base-TXC.100Base-XD.100Base-FX
考题
Which of the following uses pair authentication to provide a wireless connection between twodevices?()
A. 802.11nB. BluetoothC. InfraredD. Cellular
考题
Which two statements about using the CHAP authentication mechanism in a PPP link are true?()
A.CHAP uses a two-way handshakeB.CHAP authentication periodically occurs after link establishmentC.CHAP has no protection from playback attacksD.CHAP authentication is performed only upon link establishmentE.CHAP uses a three-way handshakeF.CHAP authentication passwords are sent in plaintext
考题
Which of the following would provide good baseline documentation to have on hand whenanalyzing potential problems?(Choose all that apply.)()A、User authentication ID and passwordB、User profileC、Output of debugD、Output of show interfaceE、Result of pingF、Output of show process cpu
考题
Which statement about OSPF authentication is true?()A、To enable OSPF authentication in a network, OSPF area 0 authentications must be enabled firstB、The payload of OSPF version 3 packets contains no authentication informationC、OSPF version 3 supports Advanced Encryption StandardD、OSPF version 3 uses router ID as a key to encrypt OSPF hello packetsE、OSPF MD5 authentication uses TCP, and Plan Test authentication uses UDP
考题
Which of the following connector types is used with twisted pair cable?()A、T-ConnectorB、BNCC、RJ-45D、LC
考题
Which of the following are TACACS+ characteristics?(Choose all that apply.)()A、Cisco proprietaryB、Standards-based protocolC、Provides separate services for authentication, authorization, and accountingD、Encrypts only the passwordE、Uses UDP for a transport layerF、Encrypts the entire packet
考题
Which two statements about using the CHAP authentication mechanism in a PPP link are true?()A、CHAP uses a two-way handshakeB、CHAP authentication periodically occurs after link establishmentC、CHAP has no protection from playback attacksD、CHAP authentication is performed only upon link establishmentE、CHAP uses a three-way handshakeF、CHAP authentication passwords are sent in plaintext
考题
Which description of BGP authentication is true?()A、MD5 has been used by BGP to encrypt BGP update packets.B、BGP uses a message-digest algorithm to authenticate BGP peersC、A plain-text password authentication is an option of BGP authenticationD、EBGP peers authentication is faster than IBGP peers authenticationE、BGP uses public key and private key to authenticate BGP peers.
考题
Which of the following methods of user authentication is the MOST secure?()A、CHAPB、KerberosC、TACACSD、EAP
考题
Which of the following pin pairs remain with the same wire color for either T568A or T568B?()A、Pair 1 8B、Pair 2 7C、Pair 3 6D、Pair 4 5
考题
Which security mechanism uses the concept of a realm?()A、AuthorizationB、Data integrityC、ConfidentialityD、Authentication
考题
多选题Which two statements about using the CHAP authentication mechanism in a PPP link are true?()ACHAP uses a two-way handshakeBCHAP authentication periodically occurs after link establishmentCCHAP has no protection from playback attacksDCHAP authentication is performed only upon link establishmentECHAP uses a three-way handshakeFCHAP authentication passwords are sent in plaintext
考题
单选题Which the security mechanism uses the concept of a realm?()A
authorizationB
data integrityC
confidentialityD
authentication
考题
单选题Which of the following pair of words are antonyms?A
increase and decreaseB
choice and optionC
blue and greenD
rabbit and animal
考题
单选题Which of the following connector types is used with twisted pair cable?()A
T-ConnectorB
BNCC
RJ-45D
LC
考题
多选题Which two authentication mechanisms provide weaker protection than other mechanisms?()AHTTP Basic AuthenticationBForm Based AuthenticationCHTTP Digest AuthenticationDHTTPS Client Authentication
考题
单选题Which of the following connectors is commonly used on a shielded twisted pair cable?()A
BNCB
RJ-45C
FD
HDMI
考题
单选题Which of the following LAN technologies is considered fast Ethernet and uses two pairs of cabling,one pair for sending and the other pair for receiving?()A
100Base-T4B
100Base-TXC
100Base-XD
100Base-FX
考题
单选题Which of the following authentication protocols uses certificates to negotiate access to the network?()A
PAPB
CHAPC
EAP-TLSD
Kerberos
考题
单选题Which one of the following commands can be used to enable AAA authentication to determine if a user canaccess the privilege command level?()A
aaa authentication enable method defaultB
aaa authentication enable defaultC
aaa authentication enable levelD
aaa authentication enable default local
考题
单选题Which statement about OSPF authentication is true?()A
To enable OSPF authentication in a network, OSPF area 0 authentications must be enabled firstB
The payload of OSPF version 3 packets contains no authentication informationC
OSPF version 3 supports Advanced Encryption StandardD
OSPF version 3 uses router ID as a key to encrypt OSPF hello packetsE
OSPF MD5 authentication uses TCP, and Plan Test authentication uses UDP
考题
多选题Which of the following would provide good baseline documentation to have on hand whenanalyzing potential problems?(Choose all that apply.)()AUser authentication ID and passwordBUser profileCOutput of debugDOutput of show interfaceEResult of pingFOutput of show process cpu
热门标签
最新试卷