网友您好, 请在下方输入框内输入要搜索的题目:

题目内容 (请给出正确答案)

WEP全称为Wired Equivalent Protocol(有线等效协议),是IEEE802.11n认证中的安全加密协议。


参考答案

更多 “WEP全称为Wired Equivalent Protocol(有线等效协议),是IEEE802.11n认证中的安全加密协议。” 相关考题
考题 802.llb定义了无线网的安全协议WEP(Wired Equivalent Privacy)。下面关于WEP的描述中不正确的是( )。A) WEP使用RC4流加密协议B) WEP支持40位密钥和128位密钥C) WEP是一种对称密钥机制D) WEP支持端到端的加密和认证

考题 11b定义了无线网的安全协议WEP(Wired Equivalent Privacy)。以下关于WEP的描述中,正确的是____.A.采用的密钥长度是80位B.其加密算法属于公开密钥密码体系C.WEP只是对802.11站点之间的数据进行加密D.WEP也可以保护AP有线网络端的数据安全

考题 以下关于无线网安全协议WEP(Wired Equivalent Privacy)的描述中,哪项是不正确的?——A.WEP使用RC4流加密协议B.WEP支持端到端的加密和认证C.WEP支持40位密钥和128位密钥D.WEP是一种对称密钥机制

考题 11b定义了无线网的安全协议WEP(Wired Equivalent Privacy)。以下关于WEP的描述中,不正确的是(58)。A.WEP使用RC4流加密协议B.WEP支持40位密钥和128位密钥C.WEP支持端到端的加密和认证D.WEP是一种对称密钥机制

考题 在无线网络中通常要用WEP加密,请解释WEP的含义。

考题 wireless LAN,also widely known as WLAN or WIFI,is probably the most well-known member of the IEEE802 protocol family for home users today.It is standardized by()and shares many properties with wired EthernetA.IEEE 802.1B.IEEE 802.3C.IEEE 802.5D.IEEE 802.11

考题 下列对WEP加密的描述,错误的是()。 A.WEP加密采用一种流加密算法B.WEP加密加入了IV来破坏密钥的规律性C.WEP加密中IV的长度为48bitsD.WEP加密允许设备同时储存四把密钥

考题 11b定义了无线网的安全协议WEP。下列选项中,关于WEP的描述不正确的是( )。A.WEP使用RC4流加密协议B.WEP支持40位密钥和128位密钥C.WEP支持端到端的加密和认证D.WEP是一种对称密钥机制

考题 wireless LAN,also widely known as WLAN or WIFI,is probably the most well-known member of the IEEE802 protocol family for home users today.It is standardized by ( ) and shares many properties with wired Ethernet. A.IEEE 802.1 B.IEEE 802.3 C.IEEE 802.5 D.IEEE 802.11

考题 下列对WEP加密的描述,错误的是()。A、WEP加密采用一种流加密算法B、WEP加密加入了IV来破坏密钥的规律性C、WEP加密中IV的长度为48bitsD、WEP加密允许设备同时储存四把密钥

考题 Which statement is correct for both the LWAPP and CAPWAP AP upstream 802.1Q tagged wired QoS priority for a non-WMM-associated client frame that is H-REAP locally switched running v5.2?()A、Wireless client WMM UP classification is translated to a wired DSCP priority.B、Wireless client 802.11p classification is translated to a wired DSCP priority.C、Wireless client WMM UP classification is translated to a wired 802.1p CoS priority.D、Wireless client 802.11p classification is translated to a wired 802.1p CoS priority.E、WLAN configured QoS level is used to set the wired DSCP priority.F、Wired 802.1p CoS priority is not set.

考题 Which two statements are true about the Wi-Fi Protected Access (WPA) and Wi-Fi Protected Access version 2 (WPA2) security solutions?()A、both WPA and WPA2 require authentication support via IEEE 802.1 x and Pre-Shared Key (PSK)B、both WPA and WPA2 address all known Wired Equivalent Privacy (WEP) vulnerabilities in the IEEE 802.11i security implementationC、WPA is supported on client devices only. WPA2 is supported on both access point (AP) and client devicesD、WPA provides only a standard for authentication. WPA2 provides a standard for authentication and encryptionE、WPA requires encryption support via Temporal Key Integrity Protocol (TKIP) WPA2 provides encryption support via (symmetric block cipher)AES-CCMP

考题 Cisco provides two enhancements to 802.11 security which protect a WEP key from exploits. Which two technologies provide these security enhancements? ()A、802.1XB、Cisco Temporal Key Integrity Protocol (CKIP)C、Extensible Authentication Protocol-Flexible Authentication via Secure Tunneling (EAP-FAST)D、Cisco Message Integrity Check (CMIC)E、One-Time Passwords (OTP)F、Advanced Encryption Standard (AES)

考题 Static WEP is configured on the access point. You are authenticated and associated to the accesspoint but are unable to obtain an IP address. Which of the following will cause this problem?()A、invalid radio type selectedB、no WEP key configured on the clientC、invalid SSID configuredD、invalid WEP key

考题 Which two statements about the Wired Equivalent Privacy (WEP) encryption mechanism are true? ()A、the two methods of authentication using the WEP encryption are open and shared keyB、the 802.11 standard defines WEP security using 128-bit keysC、WEP can provide stronger authentication through the use of LEAP, PEAP, or EAP-FASTD、WEP is a scalable encryption solution that uses static keys for authenticationE、WEP security provides only one-way authenticationF、WEPv2 offers improved encryption by replacing the RC4 encryption mechanism with the AES (symmetric block cipher) mechanism

考题 以下哪些是无线网络要关注的安全因素()A、启用无线设备的不广播功能,不进行SSID的扩散B、使用不规则网络名,禁止使用默认名C、客户端MAC地址过滤D、WEP:wired equivalent privacy(有线等效加密)

考题 WEP全称为Wired Equivalent Protocol(有线等效协议),是IEEE802.11n认证中的安全加密协议。

考题 对WEP加密方式描述不正确的有()。A、WEP称为共享式加密B、WEP方式对网络资源的开销比较小C、WEP方式是对数据包进行加密D、WEP方式比较容易破解

考题 Which of the following wireless security techniques is the MOST secure?()A、Enable Wired Equivalent PrivacyB、Disable SSID broadcastC、Enable Wi-Fi Protected AccessD、Enable MAC filtering

考题 You need to design an authentication solution for the wireless network. Your solution must meet the security requirements. What should you do?()A、Create wireless VPNs using L2TP/IPSec between the client computers to the wireless access pointB、Configure IEEE 802.1x authentication with smart cardsC、Configure the wireless network to use Wired Equivalent Privacy (WEP)D、Install and configure an Internet Authentication Service (IAS) server

考题 You need to design a Security strategy for the wireless network at all resort locations.What should you do?()A、Connect the wireless access points to a dedicated subnet. Allow the subnet direct access to the Internet,but not to the company network.Require company users to establish a VPN to access company resourcesB、Install Internet Authentication Service (IAS) on a domain controller.Configure the wireless access points to require IEEE 802.1x authenticationC、Establish IPSec policies on all company servers to request encryption from all computers that connect from the wireless IP networksD、Configure all wireless access points to require the Wired Equivalent Privacy (WEP) protocol for all connections. Use a Group Policy object (GPO) to distribute the WEP keys to all computers in the domain

考题 多选题When implementing WLAN security, what are three benefits of using the Temporal Key Integrity Protocol (TKIP) instead of WEP? ()ATKIP uses an advanced encryption scheme based on AESBTKIP provides authentication and integrity checking using Cipher Block Chaining Message Authentication Code (CBC-MAC)CTKIP provides per-packet keyingand a rekeying mechanismDTKIP provides message integrity checkETKIP reduces WEP’s vulnerabilities byusing different hardware encryption chipsetFTKIP uses a 48 bit InitializationVector

考题 单选题Static WEP is configured on the access point. You are authenticated and associated to the accesspoint but are unable to obtain an IP address. Which of the following will cause this problem?()A invalid radio type selectedB no WEP key configured on the clientC invalid SSID configuredD invalid WEP key

考题 单选题You need to design an authentication strategy for users of portable computers. Your solution must meet business requirements. What should you do?()A Issue smart cards and smart card readers to all portable computer users. Configure the domain to require smart cards for login and to log off users who remote their smart cardsB Configure the portable computers to connect to only wireless networks that use Wired Equivalent Privacy (WEP). Install digital certificates on all portable computersC Install computer certificates on all portable computers. Configure all portable computers to respond to requests for IPSec encryptionD Install biometric authentication devices on all portable computers. Configure the Default Domain Policy GPO to require complex passwords for all users

考题 多选题Which two statements are true about the Wi-Fi Protected Access (WPA) and Wi-Fi Protected Access version 2 (WPA2) security solutions?()Aboth WPA and WPA2 require authentication support via IEEE 802.1 x and Pre-Shared Key (PSK)Bboth WPA and WPA2 address all known Wired Equivalent Privacy (WEP) vulnerabilities in the IEEE 802.11i security implementationCWPA is supported on client devices only. WPA2 is supported on both access point (AP) and client devicesDWPA provides only a standard for authentication. WPA2 provides a standard for authentication and encryptionEWPA requires encryption support via Temporal Key Integrity Protocol (TKIP) WPA2 provides encryption support via (symmetric block cipher)AES-CCMP

考题 单选题Refer to the exhibit. When a profile is configured in the Aironet Desktop Utility, which security option  permits the configuration of host-based Extensible Authentication Protocol (EAP)?()A  WPA/WPA2/CCKMB  WPA/WPA2 PassphraseC  802.1xD  Pre-Shared Key (Static WEP)

考题 判断题WEP全称为Wired Equivalent Protocol(有线等效协议),是IEEE802.11n认证中的安全加密协议。A 对B 错

考题 多选题Which two statements about the Wired Equivalent Privacy (WEP) encryption mechanism are true? ()Athe two methods of authentication using the WEP encryption are open and shared keyBthe 802.11 standard defines WEP security using 128-bit keysCWEP can provide stronger authentication through the use of LEAP, PEAP, or EAP-FASTDWEP is a scalable encryption solution that uses static keys for authenticationEWEP security provides only one-way authenticationFWEPv2 offers improved encryption by replacing the RC4 encryption mechanism with the AES (symmetric block cipher) mechanism