單項(xiàng)選擇題What is one reason that WPA encryption is preferred over WEP?()

A. A WPA key is longer and requires more special characters than the WEP key.
B. The access point and the client are manually configured with different WPA key values.
C. WPA key values remain the same until the client configuration is changed.
D. The values of WPA keys can change dynamically while the system is used.


您可能感興趣的試卷

你可能感興趣的試題

1.單項(xiàng)選擇題Which additional configuration step is necessary in order to connect to an access point that has SSID broadcasting disabled?()

A. Set the SSID value in the client software to public.
B. Configure open authentication on the AP and the client.
C. Set the SSID value on the client to the SSID configured on the AP.
D. Configured MAC address filtering to permit the client to connect to the AP.

4.單項(xiàng)選擇題Acknowldgement, Sequencing, and Flow control are characteristics of which OSI layer?()

A. Layer 2
B. Layer 3
C. Layer 4
D. Layer 5
E. Layer 6
F. Layer 7

5.單項(xiàng)選擇題The administrator is unable to establish connectivity between two Cisco routers. Upon reviewing the command output of both routers, what is the most likely caust of the problem?()

A. Authentication needs to be changed to PAP for both routers.
B. Serial IP addresses of routers are not on the same subnet.
C. Username/password is incorrectly configured.
D. Router names are incorrectly configured.

最新試題

At which layer of the OSI model dose PPP perform?()

題型:單項(xiàng)選擇題

A network administrator needs to configure a serial link between the main office and a remote location.The router at the remote office is a non-cisco router. How should the network administrator configure the serial interface of the main office router to make the connection?()

題型:單項(xiàng)選擇題

At which layer of the OSI model is RSTP used to prevent loops?()

題型:單項(xiàng)選擇題

If all OSPF routers in a single area are configured with the same priority value,what value dose a router use for the ODPF router ID in the absence of a loopback interface?()

題型:單項(xiàng)選擇題

A network administrator is planning a network installation for a large organization.The design requires 100 separate subnetworks,so the company has acquired a Class B network address.What subnet mask will provide the 100 subnetworks required, if 500 usable host addresses are required per subnet?()

題型:單項(xiàng)選擇題

The network administrator cannot to switch 1 over a telnet session,although the hosts attached to switch 1 can ping the interface Fa0/0 of the router.Given the information in the graphic and assuming that the router and switch2 are configured properly,which of the following commands should be issued on switch 1 to correct this problem?()

題型:單項(xiàng)選擇題

Which IPsec security protocol should be used when confidentiality is required?()

題型:單項(xiàng)選擇題

Which name describes an IPV6 host-enable tunneling technique that uses IPV4 UDP,does not require dedicated gateway tunnels,and can pass through existing IPV4 NAT gateways?()

題型:單項(xiàng)選擇題

Which statement describes the rule of split horizon?()

題型:單項(xiàng)選擇題

Which command encrypts all plaintext passwords?()

題型:單項(xiàng)選擇題