多項(xiàng)選擇題Which two wireless encryption methods are based on the RC4 encryption algorithm?()

A.WEP
B.CCKM
C.AES
D.TKIP
E.CCMP


您可能感興趣的試卷

你可能感興趣的試題

1.多項(xiàng)選擇題Which two features did WPAv1 add to address the inherent weaknesses found in WEP?()

A. a stronger encryption algorithm
B. key mixing using temporal keys
C. shared key authentication
D. a shorter initialization vector
E. per frame sequence counters

2.多項(xiàng)選擇題Which three options are valid WAN connectivity methods?()

A.PPP
B.WAP
C.HDLC
D.MPLS
E.L2TPv3
F.ATM

3.多項(xiàng)選擇題If IP routing is enabled, which two commands set the gateway of last resort to the default gateway?()

A. ip default-gateway 0.0.0.0
B. ip route 172.16.2.1 0.0.0.0 0.0.0.0
C. ip default-network 0.0.0.0
D. ip default-route 0.0.0.0 0.0.0.0 172.16.2.1
E. ip route 0.0.0.0 0.0.0.0 172.16.2.1

4.多項(xiàng)選擇題Workstation A has been assigned an IP address of 192.0.2.24/28. Workstation B has been assigned an IP address of 192.0.2.100/28. The two workstations are connected with a straight-through cable. Attempts to ping between the hosts are unsuccessful. What two things can be done to allow communications between the hosts? ()

A. Replace the straight-through cable with a crossover cable.
B. Change the subnet mask of the hosts to /25.
C. Change the subnet mask of the hosts to /26.
D. Change the address of Workstation A to 192.0.2.15.
E. Change the address of Workstation B to 192.0.2.111.

5.多項(xiàng)選擇題Which two addresses can be assigned to a host with a subnet mask of 255.255.254.0?()

A.113.10.4.0
B.186.54.3.0
C.175.33.3.255
D.26.35.2.255
E.17.35.36.0

最新試題

Which command displays the CHAP authentication process as it occurs between two routers?()

題型:?jiǎn)雾?xiàng)選擇題

A network administrator is planning a network installation for a large organization.The design requires 100 separate subnetworks,so the company has acquired a Class B network address.What subnet mask will provide the 100 subnetworks required, if 500 usable host addresses are required per subnet?()

題型:?jiǎn)雾?xiàng)選擇題

Which statement is true, as relates to classful or classless routing?()

題型:?jiǎn)雾?xiàng)選擇題

Which command encrypts all plaintext passwords?()

題型:?jiǎn)雾?xiàng)選擇題

A network administrator is trying to add a new router into an established OSPF network.The networks attached to the new router do not appear in the routing tables of the other OSPF routers.Given the information in the partial configuration shown below,what configuration error is causing this problem?()Router(config)#router ospf 1Router(config-router)#network 10.0.0.0 255.0.0.0 area 0

題型:?jiǎn)雾?xiàng)選擇題

Which address is the IPV6 all-RIP-routers muticast group address that is used by RIPng as the destaion address?()

題型:?jiǎn)雾?xiàng)選擇題

At which layer of the OSI model dose PPP perform?()

題型:?jiǎn)雾?xiàng)選擇題

Which cisco ios command can help to determine the timing of various debug events,relative to each other,when you are debugging a complicated router issue?()

題型:?jiǎn)雾?xiàng)選擇題

Three switches are connected to one anther via trunk ports.Assuming the default switch configuration,which switch is elected as the root bridge for the spanning-tree instance of vlan 1?()

題型:?jiǎn)雾?xiàng)選擇題

Which statement describes the rule of split horizon?()

題型:?jiǎn)雾?xiàng)選擇題