网友您好, 请在下方输入框内输入要搜索的题目:
题目内容
(请给出正确答案)
单选题
Which of the following features make using WPA2 versus WEP a BETTER choice in a wirelessenvironment?()
A
Ability to use multiple antennas to send and receive
B
Ability to connect at a higher bandwidth
C
Use of AES 256-bit encryption
D
Lower traffic overhead makes transmissions faster
参考答案
参考解析
解析:
暂无解析
更多 “单选题Which of the following features make using WPA2 versus WEP a BETTER choice in a wirelessenvironment?()A Ability to use multiple antennas to send and receiveB Ability to connect at a higher bandwidthC Use of AES 256-bit encryptionD Lower traffic overhead makes transmissions faster” 相关考题
考题
Which of the following features make using WPA2 versus WEP a BETTER choice in a wirelessenvironment?()
A. Ability to use multiple antennas to send and receiveB. Ability to connect at a higher bandwidthC. Use of AES 256-bit encryptionD. Lower traffic overhead makes transmissions faster
考题
A company wants to secure access to its internal wireless network. The company wants to use themost secure means to access the network. Which of the following is the BEST choice for wireless security in this situation?()A. WEP encryptionB. Channel rotationC. Disable SSIDD. WPA encryption
考题
Which of the following devices is used to connect multiple devices to a network and does not stopbroadcast traffic?()
A.SwitchB.HubC.ModemD.Repeater
考题
An administrator is setting up a network and would like to prevent users from having the ability toplug their PC into the network to receive an IP address.Which of the following addressing schemes should the technician use?()A.NATB.DynamicC.SubnettingD.Static
考题
put computers to practical business use, but below the surface it is the heart of an(22) - the kernel - that provides the technical wizardry to juggle multiple programs, connect to networks and store(23).A traditional kernel provides all the functions for applications. The kernel(24) memory, I/O devices and parcels out processor time.The kernel also supports(25) and fault tolerance, which is the ability to recover automatically when parts of the system fail.A.DatabasesB.ApplicationsC.DriversD.Games
考题
Which of the following are correct regarding ISDN?()
A. Legacy DDR can use port information to define interesting traffic.B. Legacy DDR can configure multiple dialer configurations on the same interface.C. Legacy DDR can use ACLs to define interesting traffic.D. HDLC or PPP can be used to encapsulate ISDN D channel information.E. The BRI interfaces on ISDN routers with dialer profiles configured cannot belong to multiple dialer pools.F. Dialer profiles cannot use extended ACLs to define interesting traffic.
考题
Which of the following may better check students′ ability of using a grammatical structure
A.Having them work out the rule.
B.Having them give some examples.
C.Having them explain the meaning.
D.Having them explain the structure.
考题
Which of the following should a teacher avoid when his/her focus is on developing students' ability to use words appropriately?A.Teaching both the spoken and written form.
B.Teaching words in context and giving examples.
C.Presenting the form, meaning, and use of a word.
D.Asking students to memorize bilingual word lists.
考题
Many linguists believe that evolution is( )for our ability to produce and use language.They claim that our highly evolved brain provides us with an innate language ability not found in lower organisms.A.reliable
B.responsible
C.available
D.accountable
考题
Which two statements about the Wired Equivalent Privacy (WEP) encryption mechanism are true? ()A、the two methods of authentication using the WEP encryption are open and shared keyB、the 802.11 standard defines WEP security using 128-bit keysC、WEP can provide stronger authentication through the use of LEAP, PEAP, or EAP-FASTD、WEP is a scalable encryption solution that uses static keys for authenticationE、WEP security provides only one-way authenticationF、WEPv2 offers improved encryption by replacing the RC4 encryption mechanism with the AES (symmetric block cipher) mechanism
考题
A company wants to secure access to its internal wireless network. The company wants to use themost secure means to access the network. Which of the following is the BEST choice for wireless security in this situation?()A、WEP encryptionB、Channel rotationC、Disable SSIDD、WPA encryption
考题
An administrator is setting up a network and would like to prevent users from having the ability to plug their PC into the network to receive an IP address. Which of the following addressing schemes should the technician use?()A、NATB、DynamicC、SubnettingD、Static
考题
ACME Rocket Sleds is growing, and so is their network. They have determined that they can nolonger continue using static routes and must implement a dynamic routing protocol. They want to have data use multiple paths to the destinations, even if the paths are not equal cost. Which routing protocol has the ability to do this?()A、EIGRPB、OSPFC、RIPv1D、RIPv2E、BGPF、IS - IS
考题
Which of the following devices is used to connect multiple devices to a network and does not stopbroadcast traffic?()A、SwitchB、HubC、ModemD、Repeater
考题
Which of the following features make using WPA2 versus WEP a BETTER choice in a wirelessenvironment?()A、Ability to use multiple antennas to send and receiveB、Ability to connect at a higher bandwidthC、Use of AES 256-bit encryptionD、Lower traffic overhead makes transmissions faster
考题
Which of the following is an advantage of a 100Base-T network card versus an 802.11g wireless network card?()A、Flexibility in relocating the computerB、Ability to provide secure data communicationsC、Faster data speedD、Ability to setup P2P networking
考题
Which two options are reasons for using traffic classification?()A、to use the classification to route trafficB、to use the classification to reorder packets from various sourcesC、to use the classification to discard malformed packetsD、to use the classification to provide the configured service level
考题
单选题ACME Rocket Sleds is growing, and so is their network. They have determined that they can nolonger continue using static routes and must implement a dynamic routing protocol. They want to have data use multiple paths to the destinations, even if the paths are not equal cost. Which routing protocol has the ability to do this?()A
EIGRPB
OSPFC
RIPv1D
RIPv2E
BGPF
IS - IS
考题
单选题Which of the following devices is used to connect multiple devices to a network and does not stopbroadcast traffic?()A
SwitchB
HubC
ModemD
Repeater
考题
多选题Which of the following are correct regarding ISDN?()ALegacy DDR can use port information to define interesting traffic.BLegacy DDR can configure multiple dialer configurations on the same interface.CLegacy DDR can use ACLs to define interesting traffic.DHDLC or PPP can be used to encapsulate ISDN D channel information.EThe BRI interfaces on ISDN routers with dialer profiles configured cannot belong to multiple dialer pools.FDialer profiles cannot use extended ACLs to define interesting traffic.
考题
单选题An administrator is setting up a network and would like to prevent users from having the ability to plug their PC into the network to receive an IP address. Which of the following addressing schemes should the technician use?()A
NATB
DynamicC
SubnettingD
Static
考题
单选题Which of the following may better students’ ability of using a grammatical structure?A
Having them work out the rulB
Having them give some explamples.C
Having them explain the meaninD
Having them explain the structure!
考题
单选题Which of the following should a teacher avoid when his/her focus is on developing students' ability to use words appropriately?A
Teaching both the spoken and written form.B
Teaching words in context and giving examples.C
Presenting the form, meaning, and use of a word.D
Asking students to memorize bilingual word lists.
考题
单选题On the WLSE, Radio Management must be enabled to use most of the features of which one of the following?()A
DevicesB
IDSC
ConfigureD
Reports
考题
单选题In which situation would you use static database registration for a listener()A
when multiple databases are to be registered with the listenerB
when DBAs need to connect remotely to start up the database instanceC
when users need to connect the database instance using the host naming methodD
when the database instance that is to be registered with the listener is configured in shared server mode
考题
单选题If you needed to transport traffic coming from multiple VLANs (connected between switches), and your CTO was insistent on using an open standard,which protocol would you use?()A
802.11BB
spanning-treeC
802.1QD
ISLE
VTPF
Q.921
热门标签
最新试卷