A.A WPA key is longer and requires more special characters than the WEP key.
B.The access point and the client are manually configured with different WPA key values.
C.WPA key values remain the same until the client configuration is changed.
D.The values of WPA keys can change dynamically while the system is used.
您可能感興趣的試卷
你可能感興趣的試題
A.The router will use the static route.
B.The router will use the OSPF route.
C.The router will use the EIGRP route.
D.The router will load balance and use all three routes.
A.neighbor table
B.SPF table
C.RTP table
D.topology table
E.query table
F.DUAL table
A.1024
B.2046
C.4094
D.4096
E.8190
A.assigning a private IP address to the AP
B.changing the default SSID value
C.configuring a new administrator password
D.changing the mixed mode setting to single mode
E.configuring traffic filtering
A.The switch will not forward unicast frames.
B.The switch will forward the frame to a specific port.
C.The switch will return a copy of the frame out the source port.
D.The switch will remove the destination MAC from the switch table.
E.The switch will forward the frame to all ports except the port on which it was received.
最新試題
Three access ports have been installed and configured to a small office.What term defines the wireless topology?()
The network administrator cannot to switch 1 over a telnet session,although the hosts attached to switch 1 can ping the interface Fa0/0 of the router.Given the information in the graphic and assuming that the router and switch2 are configured properly,which of the following commands should be issued on switch 1 to correct this problem?()
What is the purpose of the cisco Vlan Trunking protocol?()
What is the result of issuing the frame-relay map ip 192.168.1.2 202 broadcast command?()
At which layer of the OSI model dose PPP perform?()
Which statement describes the rule of split horizon?()
When you are troubleshooting an ACL issue on a router,which command can help you to verify which interfaces are affected by the ACL?()
Which name describes an IPV6 host-enable tunneling technique that uses IPV4 UDP,does not require dedicated gateway tunnels,and can pass through existing IPV4 NAT gateways?()
A network administrator is planning a network installation for a large organization.The design requires 100 separate subnetworks,so the company has acquired a Class B network address.What subnet mask will provide the 100 subnetworks required, if 500 usable host addresses are required per subnet?()
On which options are standard access list based?()