网友您好, 请在下方输入框内输入要搜索的题目:
题目内容
(请给出正确答案)
单选题
802.11 security is defined in:()
A
802.11a.
B
802.11b.
C
802.11g.
D
802.11i.
参考答案
参考解析
解析:
暂无解析
更多 “单选题802.11 security is defined in:()A 802.11a.B 802.11b.C 802.11g.D 802.11i.” 相关考题
考题
A network administrator needs to configure port security on a switch.which two statements are true? ()
A.The network administrator can apply port security to dynamic access portsB.The network administrator can configure static secure or sticky secure mac addresses in the voice vlan.C.The sticky learning feature allows the addition of dynamically learned addresses to the running configuration.D.The network administrator can apply port security to EtherChannels.E.When dynamic mac address learning is enabled on an interface,the switch can learn new addresses,up to the maximum defined.
考题
FCAPS is a network maintenance model defined by ISO. What does it stand for?()A、Action ManagementB、Fault ManagementC、Configuration ManagementD、Protocol ManagementE、Security Management
考题
Cisco provides two enhancements to 802.11 security which protect a WEP key from exploits. Which two technologies provide these security enhancements? ()A、802.1XB、Cisco Temporal Key Integrity Protocol (CKIP)C、Extensible Authentication Protocol-Flexible Authentication via Secure Tunneling (EAP-FAST)D、Cisco Message Integrity Check (CMIC)E、One-Time Passwords (OTP)F、Advanced Encryption Standard (AES)
考题
If there is an existing 802.11g WLAN at a site, which service can be provided without conducting anew site survey?()A、Add a new 802.11a WLANB、Increase the Layer 2 and Layer 3 security of the WLANC、Increase the throughput for the wireless clientsD、Add new services (such as voice) over the WLAN
考题
A network administrator needs to configure port security on a switch.which two statements are true?()A、The network administrator can apply port security to dynamic access portsB、The network administrator can configure static secure or sticky secure mac addresses in the voice vlan.C、The sticky learning feature allows the addition of dynamically learned addresses to the runningconfiguration.D、The network administrator can apply port security to EtherChannels.E、When dynamic mac address learning is enabled on an interface,the switch can learn new addresses,up to the maximum defined.
考题
Which of the following should you enable to prevent a switch from forwarding packets with source addresses that are outside an administratively defined group? ()A、 DAIB、 STPC、 PVLAND、 port security
考题
How many channels are defined in the IEEE 802.11b DSSS channel set?()A、 3B、 4C、 11D、 13E、 14
考题
Which two statements best describe the wireless security standard that is defined by WPA? (Choose two.)()A、It specifies use of a static encryption key that must be changed frequently to enhance security.B、It requires use of an open authentication method.C、It specifies the use of dynamic encryption keys that change each time a client establishes a connection.D、It requires that all access points and wireless devices use the same encryption key.E、It includes authentication by PSK
考题
A technician is troubleshooting a WLAN card in a laptop. The wireless infrastructure is 802.11g. TheWLAN card is showing connected at 11Mbps. Which of the following would be the BEST reason why theWLAN card is performing at that speed? ()A、The WLAN card is 802.11g.B、The WLAN card is 802.11b.C、The WLAN card is 802.11n.D、The WLAN card is 802.11a.
考题
For added security, a network administrator has decided to lock down the wireless network. Which of the following are ways to accomplish this? ()(Select TWO).A、Disable all 802.11 trafficB、Disable the SSID from broadcastingC、Disable WPAD、Enable Bluetooth only communicationE、Change the default admin passwordF、Disable WEP
考题
Which security token may carry user attribute information as part of the defined token format?()A、KerberosB、RACF TokenC、SAML AssertionD、Username Token
考题
Which two statements are true for a security policy? ()(Choose two.)A、It controls inter-zone traffic.B、It controls intra-zone traffic.C、It is named with a system-defined name.D、It controls traffic destined to the device's ingress interface.
考题
单选题Which security token may carry user attribute information as part of the defined token format?()A
KerberosB
RACF TokenC
SAML AssertionD
Username Token
考题
多选题For added security, a network administrator has decided to lock down the wireless network. Which of the following are ways to accomplish this? ()(Select TWO).ADisable all 802.11 trafficBDisable the SSID from broadcastingCDisable WPADEnable Bluetooth only communicationEChange the default admin passwordFDisable WEP
考题
单选题Which of the following wireless standards has a transfer speed of 11 Mbps?()A
802.11aB
802.11bC
802.11gD
802.11n
考题
单选题What Wi-Fi 802.11 standards are supported on the Cisco SRP 500 Series? ()A
802.11 aB
802.11 a/bC
802.11 a/b/g/nD
802.11 b/g/n
考题
单选题Which of the following should you enable to prevent a switch from forwarding packets with source addresses that are outside an administratively defined group? ()A
DAIB
STPC
PVLAND
port security
考题
单选题If there is an existing 802.11g WLAN at a site, which service can be provided without conducting anew site survey?()A
Add a new 802.11a WLANB
Increase the Layer 2 and Layer 3 security of the WLANC
Increase the throughput for the wireless clientsD
Add new services (such as voice) over the WLAN
考题
单选题Which of the following has a maximum data rate of 11Mbps?()A
802.11nB
802.11gC
802.11bD
802.11a
热门标签
最新试卷