网友您好, 请在下方输入框内输入要搜索的题目:

题目内容 (请给出正确答案)
单选题
Identity authentication, protocol encryption, secure guest access, voice over WLAN features, and a small device footprint are all highlights of what product in the wireless technology market?()
A

wireless monitoring device

B

wireless LAN controller

C

wireless bridge

D

wireless management device

E

access point


参考答案

参考解析
解析: 暂无解析
更多 “单选题Identity authentication, protocol encryption, secure guest access, voice over WLAN features, and a small device footprint are all highlights of what product in the wireless technology market?()A wireless monitoring deviceB wireless LAN controllerC wireless bridgeD wireless management deviceE access point” 相关考题
考题 在通信专业中,TCP的英文全称是(),认证英文通常翻译为()。A.Transmission Control Process B.Transfer Control Protocol C.Transmission Connecting Protocol D.Transmission Control Protocol A.authentication B.authorization C.control D.encryption

考题 Which of the following standards or encryption types is the MOST secure for wireless networking?() A.WEPB.AESC.TKIPD.DES

考题 All three types of cryptography schemes have unique function mapping to specific.For example,the symmetric key approach( )is typically used for the encryption of data providing( ),whereas asymmetric key cryptography is maidy used in key( )and nonrepudiation,thereby providing confidentiality and authentication.The hash(本题)(noncryptic),on the other hand,does not provide confidentiality but provides message integrity,and cryptographic hash algorithms provide message( )and identity of peers during transport over insecure channels.A.Algorithm B.Secure C.structure D.encryption

考题 All three types of cryptography schemes have unique function mapping to specific.For example, the symmetric key approach (71) is typically used for the encryption of data providing(72), whereas asymmetric key cryptography is maidy used in key(73)and nonrepudiation, thereby providing confidentiality and authentication. The hash(74)(noncryptic), on the other hand, does not provide confidentiality but provides message integrity, and cryptographic hash algorithms provide message(75)and identity of peers during transport over insecure channels.A.Authentication B.structure C.encryption D.exchange

考题 All three types of cryptography schemes have unique function mapping to specific.For example, the symmetric key approach (71) is typically used for the encryption of data providing(72), whereas asymmetric key cryptography is maidy used in key(73)and nonrepudiation, thereby providing confidentiality and authentication. The hash(74)(noncryptic), on the other hand, does not provide confidentiality but provides message integrity, and cryptographic hash algorithms provide message(75)and identity of peers during transport over insecure channels.A.Algorithm B.Secure C.structure D.encryption

考题 Select the two correctstatements from the list below that describe DES and 3DES: ()A、 3DES is muchmore secure than DES.B、 Both DES and 3DES are stream ciphers.C、 DES uses 64 bitkeys, although the effective key lengthis only 56bits.D、 The decryption operation for both DES and 3DES is the same as the encryption operation.E、 DES can only be used for encryption, whereas 3DES can also be used for authentication.

考题 目前电子商务网站较常采用下列哪一种的安全机制是()。A、DES(Data Encryption Standard)B、IPSec(Internet Protocol Security)C、SET(Secure Electronic Transaction)D、SSL(Secure Socket Layer)

考题 Cisco provides two enhancements to 802.11 security which protect a WEP key from exploits. Which two technologies provide these security enhancements? ()A、802.1XB、Cisco Temporal Key Integrity Protocol (CKIP)C、Extensible Authentication Protocol-Flexible Authentication via Secure Tunneling (EAP-FAST)D、Cisco Message Integrity Check (CMIC)E、One-Time Passwords (OTP)F、Advanced Encryption Standard (AES)

考题 You are a network technician at Certpaper.com. Which description is correct when you have generated RSA keys on your Cisco router to prepare for secure device management?()A、You must then specify the general-purpose key size used for authentication with the crypto key generaters a general-keys modulus command.B、You must then zeroize the keys to reset secure shell before configuring other parameters.C、All vty ports are automatically enabled for SSH to provide secure management.D、The SSH protocol is automatically enabled.

考题 LDAP is being utilized throughout the Company Wireless network.  Which issue or set of issues  does the Lightweight Access Point Protocol (LWAPP) address? ()A、 Reduction of processing in wireless controllersB、 Distributed approach to authentication, encryption, and policy enforcementC、 Access point discovery, information exchange, and configurationD、 Provides security by blocking communication between access points and wireless clientsE、 None of the other alternatives apply.

考题 Which of the following options lists the steps in PPP session establishment in the correct order?()A、Optional authentication phase, link establishment phase, network layer protocol phase.B、Network layer protocol phase, link establishment phase, optional authentication phase.C、Network layer protocol phase, optional authentication phase, link establishment phase.D、Link establishment phase, network layer protocol phase, optional authentication phase.E、Link establishment phase, optional authentication phase, network layer protocol phase.F、Optional authentication phase, network layer protocol phase, link establishment phase.

考题 Which two statements about the Wired Equivalent Privacy (WEP) encryption mechanism are true? ()A、the two methods of authentication using the WEP encryption are open and shared keyB、the 802.11 standard defines WEP security using 128-bit keysC、WEP can provide stronger authentication through the use of LEAP, PEAP, or EAP-FASTD、WEP is a scalable encryption solution that uses static keys for authenticationE、WEP security provides only one-way authenticationF、WEPv2 offers improved encryption by replacing the RC4 encryption mechanism with the AES (symmetric block cipher) mechanism

考题 Which of the following standards or encryption types is the MOST secure for wireless networking?()A、WEPB、AESC、TKIPD、DES

考题 IPSec中定义密钥交换的协议是()。A、IKE(internet key exhcnage)B、PAP(password authentication protocol)C、CHAP(challenge handshake authentication protocol)D、ESP(encapsulation seurity payload)

考题 Which two statements best describe the wireless security standard that is defined by WPA (Choose two.)()。A、It specifies use of a static encryption key that must be changed frequently to enhance securityB、It requires use of an open authentication methodC、It specifies the use of dynamic encryption keys that change each time a client establishes a connectionD、It requires that all access points and wireless devices use the same encryption keyE、It includes authentication by PSK

考题 Which issue or set of issues does the Lightweight Access Point Protocol (LWAPP) address?()A、 reduction of processing in wireless controllersB、 distributed approach to authentication, encryption, and policy enforcementC、 provides security by blocking communication between access points and wireless clientsD、 access point discovery, information exchange, and configuration

考题 Identity authentication, protocol encryption, secure guest access, voice over WLAN features, and a small device footprint are all highlights of what product in the wireless technology market?()A、wireless monitoring deviceB、wireless LAN controllerC、wireless bridgeD、wireless management deviceE、access point

考题 Which of the following technologies is the MOST secure form of wireless encryption?()A、SSLB、WPAC、WEPD、TLS

考题 Companycom informs the system administrator that there is concern about the Electronic Service Agent and security. What can be said about Electronic Service Agent that will address concerns about security?()A、All Service Agent transactions are inbound requests secured by encryption (cryptographic processor card) Kerberos, and Hypertext Transfer Protocol Secure (HTTPS). B、The ATT Global Network Services (AGNS ) phone connection generates system IDs and passwords for the client every six months. Service Agent has no inbound capability.C、All Service Agent transactions are outbound requests secured by encryption (Hypertext Transfer Protocol Secure (HTTPS) or POST). Service Agent has no inbound capability. D、The transmissions from Service Agent can be either by Internet or the ATT Global Network Services (AGNS) phone connection. Service Agent transactions are inbound requests generated by a point to point connection.

考题 Your network contains one Active Directory domain. You have a member server named Server1 that runs Windows Server 2008. The server has the Routing and Remote Acecss role service installed. You implement Network Access Protection (NAP) for the domain. You need to configure the Point-to-Point (PPP) authentication method on Server1. Which autnetication method should you choose?()A、Challenge Handshake Authentication Protocol (CHAP)B、Extensible Authentication Protocol (EAP)C、Microsoft Challenge Handshake Authentication Protocol version 2 (MS-CHAP v2)D、Password Authentication Protocol (PAP)

考题 You are a help desk technician for your company. Susan is an executive. Because Susan travels frequently, she uses a Windows XP Professional portable computer that has a smart card reader.  Susan asks you to configure her computer so that she can dial in to the company network when she is out of the office. Company security policy states that dial-in users must use a smart card when they connect to the network, and that the users must use the strongest form of data encryption possible. Company security policy also states that client computers must disconnect if the Routing and Remote Access server does not support both smart card authentication and the strongest possible authentication. You need to configure the dial-up connection properties on Susan’s computer to dial in to the company network. Your solution must ensure that company security policies are enforced.  Which three actions should you perform?() A、Select the Advanced (custom settings) security option.B、Select the Require data encryption check box. C、Select the Typical (recommended settings) security option. D、Select the Use smart card item from the Validate my identity as follows list.E、Select the Maximum strength encryption item from the Data encryption list.F、Select the Extensible Authentication Protocol (EAP) option, and select Smart Card or other Certificate from the EAP list.

考题 Your network contains one Active Directory domain. You have a member server named Server1 that runs Windows Server 2008 R2. The server has the Routing and Remote Access Services role service installed.You implement Network Access Protection (NAP) for the domain.You need to configure the Point-to-Point Protocol (PPP) authentication method on Server1. Which authentication method should you use?()A、Challenge Handshake Authentication Protocol (CHAP)B、Extensible Authentication Protocol (EAP)C、Microsoft Challenge Handshake Authentication Protocol version 2 (MS-CHAP v2)D、Password Authentication Protocol (PAP)

考题 单选题目前电子商务网站较常采用下列哪一种的安全机制是()。A DES(Data Encryption Standard)B IPSec(Internet Protocol Security)C SET(Secure Electronic Transaction)D SSL(Secure Socket Layer)

考题 单选题Which of the following options lists the steps in PPP session establishment in the correct order?()A Optional authentication phase, link establishment phase, network layer protocol phase.B Network layer protocol phase, link establishment phase, optional authentication phase.C Network layer protocol phase, optional authentication phase, link establishment phase.D Link establishment phase, network layer protocol phase, optional authentication phase.E Link establishment phase, optional authentication phase, network layer protocol phase.F Optional authentication phase, network layer protocol phase, link establishment phase.

考题 多选题When implementing WLAN security, what are three benefits of using the Temporal Key Integrity Protocol (TKIP) instead of WEP? ()ATKIP uses an advanced encryption scheme based on AESBTKIP provides authentication and integrity checking using Cipher Block Chaining Message Authentication Code (CBC-MAC)CTKIP provides per-packet keyingand a rekeying mechanismDTKIP provides message integrity checkETKIP reduces WEP’s vulnerabilities byusing different hardware encryption chipsetFTKIP uses a 48 bit InitializationVector

考题 单选题Which issue or set of issues does the Lightweight Access Point Protocol (LWAPP) address?()A  reduction of processing in wireless controllersB  distributed approach to authentication, encryption, and policy enforcementC  provides security by blocking communication between access points and wireless clientsD  access point discovery, information exchange, and configuration

考题 单选题You are a network technician at Certpaper.com. Which description is correct when you have generated RSA keys on your Cisco router to prepare for secure device management?()A You must then specify the general-purpose key size used for authentication with the crypto key generaters a general-keys modulus command.B You must then zeroize the keys to reset secure shell before configuring other parameters.C All vty ports are automatically enabled for SSH to provide secure management.D The SSH protocol is automatically enabled.