网友您好, 请在下方输入框内输入要搜索的题目:

题目内容 (请给出正确答案)
单选题
Which IEEE standard is used to define Wi-Fi?()
A

IEEE 802.3

B

IEEE 802.5

C

IEEE 802.11h

D

IEEE 802.11c

E

IEEE 802.11


参考答案

参考解析
解析: 暂无解析
更多 “单选题Which IEEE standard is used to define Wi-Fi?()A IEEE 802.3B IEEE 802.5C IEEE 802.11hD IEEE 802.11cE IEEE 802.11” 相关考题
考题 ● Ethernet is the commonly used local area network communication protocol. The standard of Ethernet is __(72)__.(72)A.IEEE 802.1 B.IEEE 802.2 C.IEEE 802.3 D.IEEE 802.11

考题 is a channel' s capacity which directly reflects the data transfer rate of the channel.(67)functions in a NetWare network which is used to define addressing schemes.(68)is a network layer device that suports multiple LAN interfaces and segments LANs into smaller collision and broadcast domains.(69).is the popular LAN develped under the direction of the IEEE 802.3.(70)is a device which enables digital microcomputers to communicate across analog telephone lines.A.The volumeB.The bandwidthC.The noiseD.The delay

考题 ●Wi-Fi联盟制定的安全认证方案 WPA(Wi-fi Protected Access)是(66)标准的子集。(66)A. IEEE 802.11B. IEEE 802.11aC. IEEE 802.11bD. IEEE 802.11i

考题 The(66)is a channel's capacity which directly reflects the data transfer rate of the channel.(67)functions in a NetWare network which is used to define addressing schemes.The(68)is a network layer device that supports multiple LAN interfaces and segments LANs into smaller collision and broadcast domains.(69)is the popular LAN developed under the direction of the IEEE802.3.The(70 is a device which enables digital microcomputers to communicate across analog telephone lines.A.volumeB.bandwidthC.noiseD.delay

考题 Which of the following can be used to ensure that once a row has been inserted in table TABLEX, the column MAINID in that row cannot be updated?() A.Define the column MAINID as NOT UPDATABLEB.Define the column MAINID as a PRIMARY KEYC.Define the column MAINID as a FOREIGN KEYD.Define an UPDATE trigger on table TABLEX

考题 Which IEEE standard is used to define Wi-Fi?() A. IEEE 802.3B. IEEE 802.5C. IEEE 802.11hD. IEEE 802.11cE. IEEE 802.11

考题 Which spread spectrum technology does the 802.11b standard define for operation()。 A.IRB.DSSSC.FHSSD.DSSS and FHSSE.IR, FHSS, and DSSS

考题 Ethernet is the commonly used local area network communication protocol. The standard of Ethernet is ( ) .A.IEEE 802.1 B.IEEE 802.2 C.IEEE 802.3 D.IEEE 802.11

考题 Which of the following description is WRONG about Wi-Fi? ( ).A.Any standard Wi-Fi device.will work anywhere in the world with global operative set of standards B.Now most laptops are built with wireless network adapters inside C.One can connect Wi-Fi devices in ad-hoc mode for client-to-client connections without a router D.Communications between two devices need the involvement of an access point with Wi-Fi

考题 Wi-Fi联盟制定的安全认证方案WPA(Wi-Fi Protected Access)是 ( ) 标准的子集。A.IEEE 802.11 B.IEEE 802.11a C.IEEE 802.11b D.IEEE 802.11i

考题 Which two statements are true about the Wi-Fi Protected Access (WPA) and Wi-Fi Protected Access version 2 (WPA2) security solutions?()A、both WPA and WPA2 require authentication support via IEEE 802.1 x and Pre-Shared Key (PSK)B、both WPA and WPA2 address all known Wired Equivalent Privacy (WEP) vulnerabilities in the IEEE 802.11i security implementationC、WPA is supported on client devices only. WPA2 is supported on both access point (AP) and client devicesD、WPA provides only a standard for authentication. WPA2 provides a standard for authentication and encryptionE、WPA requires encryption support via Temporal Key Integrity Protocol (TKIP) WPA2 provides encryption support via (symmetric block cipher)AES-CCMP

考题 Which of the following is a RF peer to peer mesh protocol used for lighting and other residential electronics?()A、Z-WaveB、X10C、CEBusD、Wi-Fi

考题 Which two statements about the implementation of WLAN QoS are true?()A、The 802.11e standard is the IEEE 802.11 OoS WLAN standard.B、The Wi-Fi Multimedia (WMM) standard decreases the eight priority levels to four access categories.C、The Wi-Fi Multimedia (WMM) standard is a Wi-Fi Alliance standard that increases the four priority levels to eight access categories.D、The Wi-Fi Multimedia (WMM) standard is an IEEE standard that increases the four priority levels to eight access categories.E、Wireless 802.11 deploys Distributed Coordination Function (DCF), carrier sense multiple access with collision detection (CSMA/CD), interframe spacing, and random wait timers to avoid collisions.F、Wireless OoS designs and implementations commonly use Layer 3 differentiated services code point (DSCP) or Layer 2 802.1 p to ensure priority

考题 Which spread spectrum technology does the 802.11b standard define foroperation?()A、IRB、DSSSC、FHSSD、DSSS and FHSSE、IR,FHSS,and DSSS

考题 Which IEEE standard is used to define Wi-Fi?()A、IEEE 802.3B、IEEE 802.5C、IEEE 802.11hD、IEEE 802.11cE、IEEE 802.11

考题 Which two statements about the Wi-Fi Multimedia (WMM) standard are true?()A、 Lower-priority traffic is assigned short interframe wait-timers to allow higher-priority traffic access to the wireless network first.B、 Packets that are not assigned to a specific access category are categorized by default as the background access category.C、 The WMM standard was implemented after the 802.11e standard was approved to provide support for non 802.11e devices.D、 WMM is a Wi-Fi Alliance standard that was implemented before the 802.11e standard was approved.E、 WMM uses Enhanced DCF (EDCF) to stipulate fixed and random wait times for the different access classes.

考题 What are three security problems with Wi-Fi Protected Access (WPA)?()A、WPA is based on the outdated IEEE 802.11i standard.B、WPA uses RSN,which uses the same base encryption algorithm as RC4.C、WPA requires a hardware upgrade that may not be supported by all vendors.D、WPA uses TKIP,which uses the same base encryption algorithm as WEP.E、WPA is susceptible to a DoS attack when it receives two packets in quick succession with bad MICs,forcing the AP to shut down the entire Basic Service Set (BSS) for one minute.F、WPA is susceptible to a security weakness when preshared keys are used.

考题 Which of the following is a standard IEEE 1394 transmission speed?()A、 100MbpsB、 400MbpsC、 480MbpsD、 1000Mbps

考题 Which of the following represents a wiring standard for twisted pair cables?()A、FiberB、T568AC、IEEE1394D、CAT5

考题 When running a Windows server, which option is used with the ping command to define the number of packets transmitted?()A、 -nB、 -aC、 -rD、 -v

考题 Which of the following are contained in a store archive?()A、a JAR file containing commands and JSPsB、an XML file defining the content of the store archiveC、a ZIP file of Java properties files containing translated textD、a database backup file used to define store dataE、a number of ZIP files used to define store data

考题 Which of the following can be used to ensure that once a row has been inserted in table TABLEX, the column MAINID in that row cannot be updated?()A、Define the column MAINID as NOT UPDATABLEB、Define the column MAINID as a PRIMARY KEYC、Define the column MAINID as a FOREIGN KEYD、Define an UPDATE trigger on table TABLEX

考题 多选题Which three statements about classification marking of traffic at Layer 2 are true? ()Aa Frame Relay header includes a 1-bit discard eligible (DE) bit to provide the class of service (CoS)Ban ATM header includes a 1-bit DE field to provide the CoSCan MPLS EXP field is inserted in the Layer 3 IP precedence field to identify the CoSDthe CoS field only exists inside Ethernet frames when 802.1Q or Inter-Switch Link (ISL) trunking is usedEin the IEEE 802.1p standard, three bits are used to identify the user priority bits for the CoSFin the IEEE 802.1q standard, six bits are used to identify the user priority bits for the CoS

考题 多选题Which two statements are true about the Wi-Fi Protected Access (WPA) and Wi-Fi Protected Access version 2 (WPA2) security solutions?()Aboth WPA and WPA2 require authentication support via IEEE 802.1 x and Pre-Shared Key (PSK)Bboth WPA and WPA2 address all known Wired Equivalent Privacy (WEP) vulnerabilities in the IEEE 802.11i security implementationCWPA is supported on client devices only. WPA2 is supported on both access point (AP) and client devicesDWPA provides only a standard for authentication. WPA2 provides a standard for authentication and encryptionEWPA requires encryption support via Temporal Key Integrity Protocol (TKIP) WPA2 provides encryption support via (symmetric block cipher)AES-CCMP

考题 单选题Which spread spectrum technology does the 802.11b standard define for operation()。A IRB DSSSC FHSSD DSSS and FHSSE IR, FHSS, and DSSS

考题 多选题Switch ports operating in which two roles will forward traffic according to the IEEE 802.1w standard?()AalternateBbackupCdesignatedDdisabledEroot

考题 多选题What are three security problems with Wi-Fi Protected Access (WPA)?()AWPA is based on the outdated IEEE 802.11i standard.BWPA uses RSN,which uses the same base encryption algorithm as RC4.CWPA requires a hardware upgrade that may not be supported by all vendors.DWPA uses TKIP,which uses the same base encryption algorithm as WEP.EWPA is susceptible to a DoS attack when it receives two packets in quick succession with bad MICs,forcing the AP to shut down the entire Basic Service Set (BSS) for one minute.FWPA is susceptible to a security weakness when preshared keys are used.