niusouti.com

Which IEEE standard is used to define Wi-Fi?()A. IEEE 802.3B. IEEE 802.5C. IEEE 802.11hD. IEEE 802.11cE. IEEE 802.11

题目
Which IEEE standard is used to define Wi-Fi?()

A. IEEE 802.3

B. IEEE 802.5

C. IEEE 802.11h

D. IEEE 802.11c

E. IEEE 802.11


相似考题
更多“Which IEEE standard is used to define Wi-Fi?() ”相关问题
  • 第1题:

    Which of the following can be used to ensure that once a row has been inserted in table TABLEX, the column MAINID in that row cannot be updated?()

    A.Define the column MAINID as NOT UPDATABLE

    B.Define the column MAINID as a PRIMARY KEY

    C.Define the column MAINID as a FOREIGN KEY

    D.Define an UPDATE trigger on table TABLEX


    参考答案:D

  • 第2题:

    Ethernet is the commonly used local area network communication protocol. The standard of Ethernet is ( ) .

    A.IEEE 802.1
    B.IEEE 802.2
    C.IEEE 802.3
    D.IEEE 802.11

    答案:C
    解析:

  • 第3题:

    Wi-Fi联盟制定的安全认证方案WPA(Wi-Fi Protected Access)是 ( ) 标准的子集。

    A.IEEE 802.11
    B.IEEE 802.11a
    C.IEEE 802.11b
    D.IEEE 802.11i

    答案:D
    解析:
    IEEE 802.11i是IEEE 802.11协议标准的扩展,于2004年正式被IEEE通过,取代原来脆弱的WEP加密技术。IEEE 802.11i为使用IEEE 802.11a、IEEE 802.11b和IEEE 802.11g标准的网络提供加密技术和安全认证功能,这样的网络被描述为RSN(Robust Security Network,健壮安全的网络)。

  • 第4题:

    Which of the following is a RF peer to peer mesh protocol used for lighting and other residential electronics?()

    • A、Z-Wave
    • B、X10
    • C、CEBus
    • D、Wi-Fi

    正确答案:A

  • 第5题:

    Which spread spectrum technology does the 802.11b standard define foroperation?()

    • A、IR
    • B、DSSS
    • C、FHSS
    • D、DSSS and FHSS
    • E、IR,FHSS,and DSSS

    正确答案:B

  • 第6题:

    Which two statements about the Wi-Fi Multimedia (WMM) standard are true?()

    • A、 Lower-priority traffic is assigned short interframe wait-timers to allow higher-priority traffic access to the wireless network first.
    • B、 Packets that are not assigned to a specific access category are categorized by default as the background access category.
    • C、 The WMM standard was implemented after the 802.11e standard was approved to provide support for non 802.11e devices.
    • D、 WMM is a Wi-Fi Alliance standard that was implemented before the 802.11e standard was approved.
    • E、 WMM uses Enhanced DCF (EDCF) to stipulate fixed and random wait times for the different access classes.

    正确答案:D,E

  • 第7题:

    Which of the following is a standard IEEE 1394 transmission speed?()

    • A、 100Mbps
    • B、 400Mbps
    • C、 480Mbps
    • D、 1000Mbps

    正确答案:B

  • 第8题:

    When running a Windows server, which option is used with the ping command to define the number of packets transmitted?()

    • A、 -n
    • B、 -a
    • C、 -r
    • D、 -v

    正确答案:A

  • 第9题:

    Which of the following can be used to ensure that once a row has been inserted in table TABLEX, the column MAINID in that row cannot be updated?()

    • A、Define the column MAINID as NOT UPDATABLE
    • B、Define the column MAINID as a PRIMARY KEY
    • C、Define the column MAINID as a FOREIGN KEY
    • D、Define an UPDATE trigger on table TABLEX

    正确答案:D

  • 第10题:

    多选题
    Which two statements are true about the Wi-Fi Protected Access (WPA) and Wi-Fi Protected Access version 2 (WPA2) security solutions?()
    A

    both WPA and WPA2 require authentication support via IEEE 802.1 x and Pre-Shared Key (PSK)

    B

    both WPA and WPA2 address all known Wired Equivalent Privacy (WEP) vulnerabilities in the IEEE 802.11i security implementation

    C

    WPA is supported on client devices only. WPA2 is supported on both access point (AP) and client devices

    D

    WPA provides only a standard for authentication. WPA2 provides a standard for authentication and encryption

    E

    WPA requires encryption support via Temporal Key Integrity Protocol (TKIP) WPA2 provides encryption support via (symmetric block cipher)AES-CCMP


    正确答案: E,A
    解析: 暂无解析

  • 第11题:

    多选题
    Switch ports operating in which two roles will forward traffic according to the IEEE 802.1w standard?()
    A

    alternate

    B

    backup

    C

    designated

    D

    disabled

    E

    root


    正确答案: D,C
    解析: 暂无解析

  • 第12题:

    多选题
    What are three security problems with Wi-Fi Protected Access (WPA)?()
    A

    WPA is based on the outdated IEEE 802.11i standard.

    B

    WPA uses RSN,which uses the same base encryption algorithm as RC4.

    C

    WPA requires a hardware upgrade that may not be supported by all vendors.

    D

    WPA uses TKIP,which uses the same base encryption algorithm as WEP.

    E

    WPA is susceptible to a DoS attack when it receives two packets in quick succession with bad MICs,forcing the AP to shut down the entire Basic Service Set (BSS) for one minute.

    F

    WPA is susceptible to a security weakness when preshared keys are used.


    正确答案: E,F
    解析: 暂无解析

  • 第13题:

    Which spread spectrum technology does the 802.11b standard define for operation()。

    A.IR

    B.DSSS

    C.FHSS

    D.DSSS and FHSS

    E.IR, FHSS, and DSSS


    参考答案:B

  • 第14题:

    Which of the following description is WRONG about Wi-Fi? ( ).

    A.Any standard Wi-Fi device.will work anywhere in the world with global operative set of standards
    B.Now most laptops are built with wireless network adapters inside
    C.One can connect Wi-Fi devices in ad-hoc mode for client-to-client connections without a router
    D.Communications between two devices need the involvement of an access point with Wi-Fi

    答案:D
    解析:
    翻译:

    关于Wi-Fi的描述,错误的是( ):

    A.任何标准Wi-Fi设备都可以在世界任何地方工作,采用全球通用的操作标准

    B.现在大多数笔记本电脑都用无线网络适配器

    C.一个可以连接无线设备在特定模式端到端连接路由器

    D.两个设备之间的通信需要使用Wi-Fi接入点的参与。

  • 第15题:

    Which two statements are true about the Wi-Fi Protected Access (WPA) and Wi-Fi Protected Access version 2 (WPA2) security solutions?()

    • A、both WPA and WPA2 require authentication support via IEEE 802.1 x and Pre-Shared Key (PSK)
    • B、both WPA and WPA2 address all known Wired Equivalent Privacy (WEP) vulnerabilities in the IEEE 802.11i security implementation
    • C、WPA is supported on client devices only. WPA2 is supported on both access point (AP) and client devices
    • D、WPA provides only a standard for authentication. WPA2 provides a standard for authentication and encryption
    • E、WPA requires encryption support via Temporal Key Integrity Protocol (TKIP) WPA2 provides encryption support via (symmetric block cipher)AES-CCMP

    正确答案:A,E

  • 第16题:

    Which two statements about the implementation of WLAN QoS are true?()

    • A、The 802.11e standard is the IEEE 802.11 OoS WLAN standard.
    • B、The Wi-Fi Multimedia (WMM) standard decreases the eight priority levels to four access categories.
    • C、The Wi-Fi Multimedia (WMM) standard is a Wi-Fi Alliance standard that increases the four priority levels to eight access categories.
    • D、The Wi-Fi Multimedia (WMM) standard is an IEEE standard that increases the four priority levels to eight access categories.
    • E、Wireless 802.11 deploys Distributed Coordination Function (DCF), carrier sense multiple access with collision detection (CSMA/CD), interframe spacing, and random wait timers to avoid collisions.
    • F、Wireless OoS designs and implementations commonly use Layer 3 differentiated services code point (DSCP) or Layer 2 802.1 p to ensure priority

    正确答案:A,B

  • 第17题:

    Which IEEE standard is used to define Wi-Fi?()

    • A、IEEE 802.3
    • B、IEEE 802.5
    • C、IEEE 802.11h
    • D、IEEE 802.11c
    • E、IEEE 802.11

    正确答案:E

  • 第18题:

    What are three security problems with Wi-Fi Protected Access (WPA)?()

    • A、WPA is based on the outdated IEEE 802.11i standard.
    • B、WPA uses RSN,which uses the same base encryption algorithm as RC4.
    • C、WPA requires a hardware upgrade that may not be supported by all vendors.
    • D、WPA uses TKIP,which uses the same base encryption algorithm as WEP.
    • E、WPA is susceptible to a DoS attack when it receives two packets in quick succession with bad MICs,forcing the AP to shut down the entire Basic Service Set (BSS) for one minute.
    • F、WPA is susceptible to a security weakness when preshared keys are used.

    正确答案:D,E,F

  • 第19题:

    Which of the following represents a wiring standard for twisted pair cables?()

    • A、Fiber
    • B、T568A
    • C、IEEE1394
    • D、CAT5

    正确答案:B

  • 第20题:

    Which of the following are contained in a store archive?()

    • A、a JAR file containing commands and JSPs
    • B、an XML file defining the content of the store archive
    • C、a ZIP file of Java properties files containing translated text
    • D、a database backup file used to define store data
    • E、a number of ZIP files used to define store data

    正确答案:B,C,E

  • 第21题:

    多选题
    Which three statements about classification marking of traffic at Layer 2 are true? ()
    A

    a Frame Relay header includes a 1-bit discard eligible (DE) bit to provide the class of service (CoS)

    B

    an ATM header includes a 1-bit DE field to provide the CoS

    C

    an MPLS EXP field is inserted in the Layer 3 IP precedence field to identify the CoS

    D

    the CoS field only exists inside Ethernet frames when 802.1Q or Inter-Switch Link (ISL) trunking is used

    E

    in the IEEE 802.1p standard, three bits are used to identify the user priority bits for the CoS

    F

    in the IEEE 802.1q standard, six bits are used to identify the user priority bits for the CoS


    正确答案: F,E
    解析: 暂无解析

  • 第22题:

    单选题
    Which spread spectrum technology does the 802.11b standard define for operation()。
    A

    IR

    B

    DSSS

    C

    FHSS

    D

    DSSS and FHSS

    E

    IR, FHSS, and DSSS


    正确答案: E
    解析: 暂无解析

  • 第23题:

    单选题
    Which IEEE standard is used to define Wi-Fi?()
    A

    IEEE 802.3

    B

    IEEE 802.5

    C

    IEEE 802.11h

    D

    IEEE 802.11c

    E

    IEEE 802.11


    正确答案: D
    解析: 暂无解析