niusouti.com

多选题Which two statements best describe the wireless security standard that is defined by WPA (Choose two.)()。AIt specifies use of a static encryption key that must be changed frequently to enhance securityBIt requires use of an open authentication methodCI

题目
多选题
Which two statements best describe the wireless security standard that is defined by WPA (Choose two.)()。
A

It specifies use of a static encryption key that must be changed frequently to enhance security

B

It requires use of an open authentication method

C

It specifies the use of dynamic encryption keys that change each time a client establishes a connection

D

It requires that all access points and wireless devices use the same encryption key

E

It includes authentication by PSK


相似考题
更多“Which two statements best describe the wireless security sta”相关问题
  • 第1题:

    From small business to large-scale enterprises, which two best describe how the Cisco Unified Wireless Network reduces overall operational expenses? ()

    • A、 extends networkQoS throughout the network
    • B、 simplifies management of central or remotely located access points
    • C、 ensures implementation of the most recent security protocols
    • D、 streamlines wireless LAN management
    • E、 extends features for optical traffic network services

    正确答案:B,D

  • 第2题:

    Which two statements best describe the wireless security standard that is defined by WPA (Choose two.)()。

    • A、It specifies use of a static encryption key that must be changed frequently to enhance security
    • B、It requires use of an open authentication method
    • C、It specifies the use of dynamic encryption keys that change each time a client establishes a connection
    • D、It requires that all access points and wireless devices use the same encryption key
    • E、It includes authentication by PSK

    正确答案:C,E

  • 第3题:

    Which two statements best describe the Cisco Unified Wireless Network?()

    • A、 The Cisco Unified Wireless Network provides the framework to segregate wired and wirelessnetworks to deliver the best security for companies that are deploying WLANs.
    • B、 The Cisco Unified wireless Network provides the framework to integrate and extend wired andwireless networks to deliver the lowest-possible total cost or ownership for companies that aredeploying WLANs
    • C、 The Cisco Unified Wireless Network extends "wireless awareness" into important elements ofthe network infrastructure, providing the same level of security for WLANs that organizations havecome to expect from their VPNs.
    • D、 The Cisco unified Wireless Network extends "wireless awareness" into important elements ofthe network infrastructure, providing the same level of security scalability, reliability ease ofdeployment and management for WLANs that organizations have come to expect from their wiredLANs.

    正确答案:B,D

  • 第4题:

    Which two statement best describes the Cisco Unified Wireless Network? ()

    • A、 The Cisco Unified Wireless Network provides the framework to segregate wired and wireless networks to deliver the best security for companies that are deploying WLANs
    • B、 The Cisco Unified Wireless Network provides the framework to integrate and extend wired and wireless networks to deliver the lowest-possible total cost of ownership for companies that are deploying WLANs
    • C、 The Cisco Unified Wireless Network extends wireless awareness into important elements of the network infrastructure, providing the same level of security for WLANs that organizations have come to expect from their VPNs
    • D、 The Cisco Unified Wireless Network extends wireless awareness into important elements of the network infrastructure, providing the same level of security, sociability, reliability, ease of deployment, and management for WLANs that organizations have come to expect from their wired LANs

    正确答案:B,D

  • 第5题:

    Which two statements best describe the wireless security standard that is defined by WPA? (Choose two.)()

    • A、It specifies use of a static encryption key that must be changed frequently to enhance security.
    • B、It requires use of an open authentication method.
    • C、It specifies the use of dynamic encryption keys that change each time a client establishes a connection.
    • D、It requires that all access points and wireless devices use the same encryption key.
    • E、It includes authentication by PSK

    正确答案:C,E

  • 第6题:

    Which two of these statements best describe fast secure roaming? (Choose two.)()  

    • A、 available only in autonomous APs
    • B、 available in autonomous and lightweight APs
    • C、 a feature of WDS in autonomous APs
    • D、 a feature of WDS in lightweight APs
    • E、 requires at least one AP and one Wireless LAN Services Module

    正确答案:B,C

  • 第7题:

    Which two statements describe the purpose of a security policy?()

    • A、It enables traffic counting and logging.
    • B、It enforces a set of rules for transit traffic.
    • C、It controls host inbound services on a zone.
    • D、It controls administrator rights to access the device.

    正确答案:A,B

  • 第8题:

    多选题
    Which two of these statements best describe fast secure roaming? (Choose two.)()
    A

    available only in autonomous APs

    B

    available in autonomous and lightweight APs

    C

    a feature of WDS in autonomous APs

    D

    a feature of WDS in lightweight APs

    E

    requires at least one AP and one Wireless LAN Services Module


    正确答案: E,B
    解析: 暂无解析

  • 第9题:

    多选题
    From small businesses to large-scale enterprises, which two best describe how the Cisco UnifiedWireless Network reduces overall operational expenses?()
    A

    extends networkQoS throughout the network

    B

    simplifies management of central or remotely locates access points

    C

    ensures implementation of the most recent security protocols

    D

    streamlines wireless LAN management

    E

    extends features for optical traffic network services


    正确答案: E,D
    解析: 暂无解析

  • 第10题:

    多选题
    Which two of these statements best describe the benefits of Cisco’s wireless IDS functionality? (Choose two.)  ()
    A

    AirDefense for wireless IDS is required by autonomous APs.

    B

    2.40Hz CK management can monitor both 802.11 and non-802.11 CK interference.

    C

    APs only monitor the RF channels that are servicing the clients.

    D

    Cisco or CCX compatible client cards can extend the CK IDS service for autonomous APs.

    E

    Autonomous APs must be dedicated IDS sensors while lightweight APs can combine client traffic and RF monitoring.


    正确答案: C,B
    解析: 暂无解析

  • 第11题:

    多选题
    Businesses face three types of economic impacts as a result of hacks or intrusions: immediate,short-term, and long-term. Which two best describe short-term economic impacts that can becaused by a security breach?()
    A

    loss of retail sales

    B

    delays in receiving checks

    C

    disruption of business operations

    D

    loss of suppliers or customers


    正确答案: A,C
    解析: 暂无解析

  • 第12题:

    多选题
    Which two statements best describe the Cisco Unified Wireless Network?()
    A

    The Cisco Unified Wireless Network provides the framework to segregate wired and wirelessnetworks to deliver the best security for companies that are deploying WLANs.

    B

    The Cisco Unified wireless Network provides the framework to integrate and extend wired andwireless networks to deliver the lowest-possible total cost or ownership for companies that aredeploying WLANs

    C

    The Cisco Unified Wireless Network extends wireless awareness into important elements ofthe network infrastructure, providing the same level of security for WLANs that organizations havecome to expect from their VPNs.

    D

    The Cisco unified Wireless Network extends wireless awareness into important elements ofthe network infrastructure, providing the same level of security scalability, reliability ease ofdeployment and management for WLANs that organizations have come to expect from their wiredLANs.


    正确答案: C,A
    解析: 暂无解析

  • 第13题:

    Which two statements best describe Cisco IOS IP SLA?()

    • A、only implemented between Cisco source and destination-capable devices
    • B、statistics provided by syslog, CLI, and SNMP
    • C、measures delay, jitter, packet loss, and voice quality
    • D、only monitors VoIP traffic flows
    • E、provides active monitoring
    • F、provides passive monitoring

    正确答案:C,E

  • 第14题:

    Which two of these statements best describe the benefits of WPAv1? ()

    • A、 SSID broadcast prevention
    • B、 Improved mutual authentication
    • C、 Improved encryption through AES
    • D、 Improved protection against sniffing initialization vectors
    • E、 RF jamming prevention

    正确答案:B,D

  • 第15题:

    From small businesses to large-scale enterprises, which two best describe how the Cisco UnifiedWireless Network reduces overall operational expenses?()

    • A、 extends networkQoS throughout the network
    • B、 simplifies management of central or remotely locates access points
    • C、 ensures implementation of the most recent security protocols
    • D、 streamlines wireless LAN management
    • E、 extends features for optical traffic network services

    正确答案:B,D

  • 第16题:

    Which two of these statements best describe the benefits of the Cisco Compatible Extensions Program? (Choose two.)()

    • A、 offers a feature-rich implementation alternative to Wi-Fi certification
    • B、 accelerates the availability of innovative features while maintaining interoperability
    • C、 provides innovative features only on Cisco’s wireless client adapters
    • D、 provides an evolving set of specifications for interoperability
    • E、 eliminates the need for testing by providing innovative features to wireless client vendors through a one-time license fee

    正确答案:B,D

  • 第17题:

    Which two statements best describe enhanced wireless security encryption?()

    • A、TKIP protects RC4 encryption keys
    • B、CKIP and TKIP protect AES encryption keys
    • C、TKIP encryption is more processor intensive than AES encryption is
    • D、WPA requires TKIP encryption, whereas WPA2 supports AES encryption
    • E、WPA requires AES encryption, whereas WPA2 supports TKIP encryption

    正确答案:A,D

  • 第18题:

    A company needs strong wireless security enabled for minimal cost. Which of the following security measures is the BEST to use?()

    • A、WEP
    • B、Port filtering
    • C、WPA
    • D、Longer SSID broadcast intervals

    正确答案:C

  • 第19题:

    多选题
    Which two statements best describe the wireless security standard that is defined by WPA? (Choose two.)()
    A

    It specifies use of a static encryption key that must be changed frequently to enhance security.

    B

    It requires use of an open authentication method.

    C

    It specifies the use of dynamic encryption keys that change each time a client establishes a connection.

    D

    It requires that all access points and wireless devices use the same encryption key.

    E

    It includes authentication by PSK


    正确答案: E,B
    解析: 暂无解析

  • 第20题:

    多选题
    Which two of these statements best describe the benefits of WPAv2? (Choose two.)()
    A

    SSID broadcast prevention

    B

    man-in-the-middle attack protection

    C

    cost reduction through software upgrades in all existing hardware

    D

    dynamic key generation

    E

    RF jamming prevention


    正确答案: D,C
    解析: 暂无解析

  • 第21题:

    多选题
    Which two of these statements best describe the benefits of WPAv1? ()
    A

    SSID broadcast prevention

    B

    Improved mutual authentication

    C

    Improved encryption through AES

    D

    Improved protection against sniffing initialization vectors

    E

    RF jamming prevention


    正确答案: A,E
    解析: 暂无解析

  • 第22题:

    多选题
    Which two of these statements best describe fast secure roaming for the wireless core feature set using autonomous access points? (Choose two.) ()
    A

    It is compatible with all wireless clients.

    B

    It reduces roaming latency through reduced client RF channel scanning enhancements.

    C

    It reduces roaming latency to targeted times of less than 75ms.

    D

    Roaming occurs without reauthentication through a centralized RADIUS server.

    E

    It is enabled through WLSE deployment.


    正确答案: A,D
    解析: 暂无解析

  • 第23题:

    多选题
    Which two statements describe the purpose of a security policy?()
    A

    It enables traffic counting and logging.

    B

    It enforces a set of rules for transit traffic.

    C

    It controls host inbound services on a zone.

    D

    It controls administrator rights to access the device.


    正确答案: B,D
    解析: 暂无解析

  • 第24题:

    多选题
    Which two statements best describe Cisco IOS IP SLA?()
    A

    only implemented between Cisco source and destination-capable devices

    B

    statistics provided by syslog, CLI, and SNMP

    C

    measures delay, jitter, packet loss, and voice quality

    D

    only monitors VoIP traffic flows

    E

    provides active monitoring

    F

    provides passive monitoring


    正确答案: E,A
    解析: 暂无解析