多項(xiàng)選擇題Which two wireless encryption methods are based on the RC4 encryption algorithm?()

A.WEP
B.CCKM
C.AES
D.TKIP
E.CCMP


您可能感興趣的試卷

你可能感興趣的試題

1.多項(xiàng)選擇題Which two features did WPAv1 add to address the inherent weaknesses found in WEP?()

A. a stronger encryption algorithm
B. key mixing using temporal keys
C. shared key authentication
D. a shorter initialization vector
E. per frame sequence counters

2.多項(xiàng)選擇題Which three options are valid WAN connectivity methods?()

A.PPP
B.WAP
C.HDLC
D.MPLS
E.L2TPv3
F.ATM

3.多項(xiàng)選擇題If IP routing is enabled, which two commands set the gateway of last resort to the default gateway?()

A. ip default-gateway 0.0.0.0
B. ip route 172.16.2.1 0.0.0.0 0.0.0.0
C. ip default-network 0.0.0.0
D. ip default-route 0.0.0.0 0.0.0.0 172.16.2.1
E. ip route 0.0.0.0 0.0.0.0 172.16.2.1

4.多項(xiàng)選擇題Workstation A has been assigned an IP address of 192.0.2.24/28. Workstation B has been assigned an IP address of 192.0.2.100/28. The two workstations are connected with a straight-through cable. Attempts to ping between the hosts are unsuccessful. What two things can be done to allow communications between the hosts? ()

A. Replace the straight-through cable with a crossover cable.
B. Change the subnet mask of the hosts to /25.
C. Change the subnet mask of the hosts to /26.
D. Change the address of Workstation A to 192.0.2.15.
E. Change the address of Workstation B to 192.0.2.111.

5.多項(xiàng)選擇題Which two addresses can be assigned to a host with a subnet mask of 255.255.254.0?()

A.113.10.4.0
B.186.54.3.0
C.175.33.3.255
D.26.35.2.255
E.17.35.36.0

最新試題

Which statement describes the rule of split horizon?()

題型:?jiǎn)雾?xiàng)選擇題

Which command displays the CHAP authentication process as it occurs between two routers?()

題型:?jiǎn)雾?xiàng)選擇題

Which encapsulation type is a Frame Relay encapsulation type that is supported by Cisco routers?()

題型:?jiǎn)雾?xiàng)選擇題

What is the subnetwork address for a host with the IP address 201.100.5.68/28?()

題型:?jiǎn)雾?xiàng)選擇題

Which Cisco IOS diagnostics command can disrupt the operation of a router under high-load conditions?()

題型:?jiǎn)雾?xiàng)選擇題

Which cisco ios command can help to determine the timing of various debug events,relative to each other,when you are debugging a complicated router issue?()

題型:?jiǎn)雾?xiàng)選擇題

Which command encrypts all plaintext passwords?()

題型:?jiǎn)雾?xiàng)選擇題

What is the result of issuing the frame-relay map ip 192.168.1.2 202 broadcast command?()

題型:?jiǎn)雾?xiàng)選擇題

What is the purpose of the cisco Vlan Trunking protocol?()

題型:?jiǎn)雾?xiàng)選擇題

A network administrator is trying to add a new router into an established OSPF network.The networks attached to the new router do not appear in the routing tables of the other OSPF routers.Given the information in the partial configuration shown below,what configuration error is causing this problem?()Router(config)#router ospf 1Router(config-router)#network 10.0.0.0 255.0.0.0 area 0

題型:?jiǎn)雾?xiàng)選擇題