單項選擇題What is one reason that WPA encryption is preferred over WEP?()

A.A WPA key is longer and requires more special characters than the WEP key.
B.The access point and the client are manually configured with different WPA key values.
C.WPA key values remain the same until the client configuration is changed.
D.The values of WPA keys can change dynamically while the system is used.


您可能感興趣的試卷

你可能感興趣的試題

1.單項選擇題A router learns about a remote network from EIGRP, OSPF, and a static route. Assuming all routing protocols are using their default administrative distance, which route will the router use to forward data to the remote network?()

A.The router will use the static route.
B.The router will use the OSPF route.
C.The router will use the EIGRP route.
D.The router will load balance and use all three routes.

4.多項選擇題Which two practices help secure the configuration utilities on wireless access points from unauthorized access? (Choose two.)()

A.assigning a private IP address to the AP
B.changing the default SSID value
C.configuring a new administrator password
D.changing the mixed mode setting to single mode
E.configuring traffic filtering

5.單項選擇題What will an Ethernet switch do if it receives a unicast frame with a destination MAC that is listed in the switch table?()

A.The switch will not forward unicast frames.
B.The switch will forward the frame to a specific port.
C.The switch will return a copy of the frame out the source port.
D.The switch will remove the destination MAC from the switch table.
E.The switch will forward the frame to all ports except the port on which it was received.

最新試題

Three access ports have been installed and configured to a small office.What term defines the wireless topology?()

題型:單項選擇題

The network administrator cannot to switch 1 over a telnet session,although the hosts attached to switch 1 can ping the interface Fa0/0 of the router.Given the information in the graphic and assuming that the router and switch2 are configured properly,which of the following commands should be issued on switch 1 to correct this problem?()

題型:單項選擇題

What is the purpose of the cisco Vlan Trunking protocol?()

題型:單項選擇題

What is the result of issuing the frame-relay map ip 192.168.1.2 202 broadcast command?()

題型:單項選擇題

At which layer of the OSI model dose PPP perform?()

題型:單項選擇題

Which statement describes the rule of split horizon?()

題型:單項選擇題

When you are troubleshooting an ACL issue on a router,which command can help you to verify which interfaces are affected by the ACL?()

題型:單項選擇題

Which name describes an IPV6 host-enable tunneling technique that uses IPV4 UDP,does not require dedicated gateway tunnels,and can pass through existing IPV4 NAT gateways?()

題型:單項選擇題

A network administrator is planning a network installation for a large organization.The design requires 100 separate subnetworks,so the company has acquired a Class B network address.What subnet mask will provide the 100 subnetworks required, if 500 usable host addresses are required per subnet?()

題型:單項選擇題

On which options are standard access list based?()

題型:單項選擇題