A. A WPA key is longer and requires more special characters than the WEP key.
B. The access point and the client are manually configured with different WPA key values.
C. WPA key values remain the same until the client configuration is changed.
D. The values of WPA keys can change dynamically while the system is used.
您可能感興趣的試卷
你可能感興趣的試題
A. Set the SSID value in the client software to public.
B. Configure open authentication on the AP and the client.
C. Set the SSID value on the client to the SSID configured on the AP.
D. Configured MAC address filtering to permit the client to connect to the AP.
A. AES
B. PSK
C. SSID
D. TKIP
E. WEP
A. application
B. presentation
C. session
D. transport
E. internet
F. data link
A. Layer 2
B. Layer 3
C. Layer 4
D. Layer 5
E. Layer 6
F. Layer 7
A. Authentication needs to be changed to PAP for both routers.
B. Serial IP addresses of routers are not on the same subnet.
C. Username/password is incorrectly configured.
D. Router names are incorrectly configured.
最新試題
At which layer of the OSI model dose PPP perform?()
A network administrator needs to configure a serial link between the main office and a remote location.The router at the remote office is a non-cisco router. How should the network administrator configure the serial interface of the main office router to make the connection?()
At which layer of the OSI model is RSTP used to prevent loops?()
If all OSPF routers in a single area are configured with the same priority value,what value dose a router use for the ODPF router ID in the absence of a loopback interface?()
A network administrator is planning a network installation for a large organization.The design requires 100 separate subnetworks,so the company has acquired a Class B network address.What subnet mask will provide the 100 subnetworks required, if 500 usable host addresses are required per subnet?()
The network administrator cannot to switch 1 over a telnet session,although the hosts attached to switch 1 can ping the interface Fa0/0 of the router.Given the information in the graphic and assuming that the router and switch2 are configured properly,which of the following commands should be issued on switch 1 to correct this problem?()
Which IPsec security protocol should be used when confidentiality is required?()
Which name describes an IPV6 host-enable tunneling technique that uses IPV4 UDP,does not require dedicated gateway tunnels,and can pass through existing IPV4 NAT gateways?()
Which statement describes the rule of split horizon?()
Which command encrypts all plaintext passwords?()