网友您好, 请在下方输入框内输入要搜索的题目:

题目内容 (请给出正确答案)

Which two wireless encryption methods are based on the RC4 encryption algorithm? ()

  • A、WEP
  • B、CCKM
  • C、AES
  • D、TKIP
  • E、CCMP

参考答案

更多 “Which two wireless encryption methods are based on the RC4 encryption algorithm? ()A、WEPB、CCKMC、AESD、TKIPE、CCMP” 相关考题
考题 Which two statements regarding symmetric key encryption are true?() (Choose two.) A. The same key is used for encryption and decryption.B. It is commonly used to create digital certificate signatures.C. It uses two keys: one for encryption and a different key for decryption.D. An attacker can decrypt data if the attacker captures the key used for encryption.

考题 Which of the following standards or encryption types is the MOST secure for wireless networking?() A.WEPB.AESC.TKIPD.DES

考题 When setting up a wireless network to cover a large area, which of the following needs to beconsidered FIRST?() A. Device placementB. Encryption methodsC. Wireless channelsD. SSID name

考题 An administrator is implementing a wireless network. Which of the following encryption technologies is the MOST secure method and will authenticate devices to the network?() A.SSHB.WEPC.VPND.WPA

考题 Which two wireless encryption methods are based on the RC4 encryption algorithm?() A.WEPB.CCKMC.AESD.TKIPE.CCMP

考题 Which two statements best describe the wireless security standard that is defined by WPA (Choose two.)()。 A.It specifies use of a static encryption key that must be changed frequently to enhance securityB.It requires use of an open authentication methodC.It specifies the use of dynamic encryption keys that change each time a client establishes a connectionD.It requires that all access points and wireless devices use the same encryption keyE.It includes authentication by PSK

考题 Which two statements about the Cisco Aironet Desktop Utility (ADU) are true? (Choose two.)()  A、 The Aironet Desktop Utility (ADU) can be used to establish the association between the client adapter  and the access point, manage authentication to the wireless network, and enable data encryption.B、 The Aironet Desktop Utility (ADU) and the Microsoft Wireless Configuration Manager can be used at the same time to configure the wireless client adapter.C、 The Aironet Desktop Utility (ADU) can support only one wireless client adapter installed and used at a  time.D、 The Aironet Desktop Utility (ADU) profile manager feature can create and manage only one profile for the wireless client adapter.E、 When the user selects a different profile in the Aironet Desktop Utility (ADU), the settings for the wireless client adapter are changed only after a reboot.

考题 Which of the following standards or encryption types is the MOST secure for wireless networking?()A、WEPB、AESC、TKIPD、DES

考题 Which two statements best describe the wireless security standard that is defined by WPA (Choose two.)()。A、It specifies use of a static encryption key that must be changed frequently to enhance securityB、It requires use of an open authentication methodC、It specifies the use of dynamic encryption keys that change each time a client establishes a connectionD、It requires that all access points and wireless devices use the same encryption keyE、It includes authentication by PSK

考题 Which two statements about the Cisco Aironet Desktop Utility (ADU) are true()A、The Aironet Desktop Utility (ADU )profile manager feature can create and manage only one profile for the wireless client adapter.B、The Aironet Desktop Utility (ADU) can support only one wireless client adapter installed and used at a time.C、The Aironet Desktop Utility (ADU) can be used to establish the association between the client adapter and the access point , manage authentication to the wireless network , and enable encryption.D、The Aironet Desktop Utility (ADU) and the Microsoft Wireless Configuration Manager can be used at the same time to configure the wireless client adapter.

考题 Which two wireless security statements are true?()A、A TACACS+ server is required to implement 802.1x.B、MIC protects against man-in-the-middle and replay attacks.C、The 802.1x standard provides encryption services for wireless clients.D、The AES (symmetric block cipher) is specified in the IEEE 802.11i specification.E、The IEEE 802.11i specification uses RC4 as its encryption mechanism.F、WPA requires TKIP and AES as encryption methods.

考题 Which two statements best describe the wireless security standard that is defined by WPA? (Choose two.)()A、It specifies use of a static encryption key that must be changed frequently to enhance security.B、It requires use of an open authentication method.C、It specifies the use of dynamic encryption keys that change each time a client establishes a connection.D、It requires that all access points and wireless devices use the same encryption key.E、It includes authentication by PSK

考题 Which two statements best describe enhanced wireless security encryption?()A、TKIP protects RC4 encryption keysB、CKIP and TKIP protect AES encryption keysC、TKIP encryption is more processor intensive than AES encryption isD、WPA requires TKIP encryption, whereas WPA2 supports AES encryptionE、WPA requires AES encryption, whereas WPA2 supports TKIP encryption

考题 Which two wireless devices acts as a communication connection between the client and WLAN()A、 bridgeB、 access pointC、 wireless adaptorD、 Layer 3 switchE、 antenna

考题 Which of the following technologies is the MOST secure form of wireless encryption?()A、SSLB、WPAC、WEPD、TLS

考题 A company finished upgrading the wireless encryption to WPA2 Enterprise. The administrator receives a call from a user who is unable to connect to the company wireless. Which of the following is MOST likely causing the connection problem?()A、The laptop is missing the software supplicantB、The access point SSID is hidden.C、The laptop only supports TKIP and AES encryption,D、The access point is on the wrong channel.

考题 When setting up a wireless network to cover a large area, which of the following needs to beconsidered FIRST?()A、Device placementB、Encryption methodsC、Wireless channelsD、SSID name

考题 An administrator is implementing a wireless network. Which of the following encryption technologies is the MOST secure method and will authenticate devices to the network?()A、SSHB、WEPC、VPND、WPA

考题 Which two statements regarding asymmetric key encryption are true?()A、The same key is used for encryption and decryption.B、It is commonly used to create digital certificate signatures.C、It uses two keys: one for encryption and a different key for decryption.D、An attacker can decrypt data if the attacker captures the key used for encryption

考题 Which two statements are true about encrypting RMAN backup?() (Choose two.)A、The transparent encryption of backups uses the encryption walletB、The database uses the same encryption key for every encrypted backupC、The password encryption of backups only uses the password while creating and restoring backupD、If transparent encryption is configured, you cannot use the SET ENCRYPTION BY PASSWORD command to make password-protected backups.

考题 多选题Which two statements best describe the wireless security standard that is defined by WPA? (Choose two.)()AIt specifies use of a static encryption key that must be changed frequently to enhance security.BIt requires use of an open authentication method.CIt specifies the use of dynamic encryption keys that change each time a client establishes a connection.DIt requires that all access points and wireless devices use the same encryption key.EIt includes authentication by PSK

考题 多选题Which two statements about the Cisco Aironet Desktop Utility (ADU) are true()AThe Aironet Desktop Utility (ADU )profile manager feature can create and manage only one profile for the wireless client adapter.BThe Aironet Desktop Utility (ADU) can support only one wireless client adapter installed and used at a time.CThe Aironet Desktop Utility (ADU) can be used to establish the association between the client adapter and the access point , manage authentication to the wireless network , and enable encryption.DThe Aironet Desktop Utility (ADU) and the Microsoft Wireless Configuration Manager can be used at the same time to configure the wireless client adapter.

考题 单选题A company wants to secure access to its internal wireless network. The company wants to use themost secure means to access the network. Which of the following is the BEST choice for wireless security in this situation?()A WEP encryptionB Channel rotationC Disable SSIDD WPA encryption

考题 多选题Which two wireless encryption methods are based on the RC4 encryption algorithm?()AWEPBCCKMCAESDTKIPECCMP

考题 多选题Which two statements regarding asymmetric key encryption are true?()AThe same key is used for encryption and decryption.BIt is commonly used to create digital certificate signatures.CIt uses two keys: one for encryption and a different key for decryption.DAn attacker can decrypt data if the attacker captures the key used for encryption

考题 多选题Which two statements regarding symmetric key encryption are true?() (Choose two.)AThe same key is used for encryption and decryption.BIt is commonly used to create digital certificate signatures.CIt uses two keys: one for encryption and a different key for decryption.DAn attacker can decrypt data if the attacker captures the key used for encryption.

考题 多选题Which two statements are true about encrypting RMAN backup?() (Choose two.)AThe transparent encryption of backups uses the encryption walletBThe database uses the same encryption key for every encrypted backupCThe password encryption of backups only uses the password while creating and restoring backupDIf transparent encryption is configured, you cannot use the SET ENCRYPTION BY PASSWORD command to make password-protected backups.