单选题Which of the following uses pair authentication to provide a wireless connection between twodevices?()A802.11nBBluetoothCInfraredDCellular

单选题
Which of the following uses pair authentication to provide a wireless connection between twodevices?()
A

802.11n

B

Bluetooth

C

Infrared

D

Cellular


参考解析

解析: 暂无解析

相关考题:

Which of the following pin pairs remain with the same wire color for either T568A or T568B?() A. Pair 1 8B. Pair 2 7C. Pair 3 6D. Pair 4 5

Which of the following LAN technologies is considered fast Ethernet and uses two pairs of cabling,one pair for sending and the other pair for receiving?() A.100Base-T4B.100Base-TXC.100Base-XD.100Base-FX

Which of the following uses pair authentication to provide a wireless connection between twodevices?() A. 802.11nB. BluetoothC. InfraredD. Cellular

Which two statements about using the CHAP authentication mechanism in a PPP link are true?() A.CHAP uses a two-way handshakeB.CHAP authentication periodically occurs after link establishmentC.CHAP has no protection from playback attacksD.CHAP authentication is performed only upon link establishmentE.CHAP uses a three-way handshakeF.CHAP authentication passwords are sent in plaintext

Which of the following would provide good baseline documentation to have on hand whenanalyzing potential problems?(Choose all that apply.)()A、User authentication ID and passwordB、User profileC、Output of debugD、Output of show interfaceE、Result of pingF、Output of show process cpu

Which statement about OSPF authentication is true?()A、To enable OSPF authentication in a network, OSPF area 0 authentications must be enabled firstB、The payload of OSPF version 3 packets contains no authentication informationC、OSPF version 3 supports Advanced Encryption StandardD、OSPF version 3 uses router ID as a key to encrypt OSPF hello packetsE、OSPF MD5 authentication uses TCP, and Plan Test authentication uses UDP

Which of the following connector types is used with twisted pair cable?()A、T-ConnectorB、BNCC、RJ-45D、LC

Which of the following are TACACS+ characteristics?(Choose all that apply.)()A、Cisco proprietaryB、Standards-based protocolC、Provides separate services for authentication, authorization, and accountingD、Encrypts only the passwordE、Uses UDP for a transport layerF、Encrypts the entire packet

Which two statements about using the CHAP authentication mechanism in a PPP link are true?()A、CHAP uses a two-way handshakeB、CHAP authentication periodically occurs after link establishmentC、CHAP has no protection from playback attacksD、CHAP authentication is performed only upon link establishmentE、CHAP uses a three-way handshakeF、CHAP authentication passwords are sent in plaintext

Which description of BGP authentication is true?()A、MD5 has been used by BGP to encrypt BGP update packets.B、BGP uses a message-digest algorithm to authenticate BGP peersC、A plain-text password authentication is an option of BGP authenticationD、EBGP peers authentication is faster than IBGP peers authenticationE、BGP uses public key and private key to authenticate BGP peers.

Which of the following methods of user authentication is the MOST secure?()A、CHAPB、KerberosC、TACACSD、EAP

Which of the following uses a ring topology?()A、DSLB、EthernetC、DOCSISD、SONET

Which of the following pin pairs remain with the same wire color for either T568A or T568B?()A、Pair 1 8B、Pair 2 7C、Pair 3 6D、Pair 4 5

Which of the following uses PKI?()A、BlowfishB、AESC、PGPD、3DES

Which of the following protocols uses port 119, by default?()A、NNTPB、NTPC、TFTPD、FTP

Which security mechanism uses the concept of a realm?()A、AuthorizationB、Data integrityC、ConfidentialityD、Authentication

多选题Which two statements about using the CHAP authentication mechanism in a PPP link are true?()ACHAP uses a two-way handshakeBCHAP authentication periodically occurs after link establishmentCCHAP has no protection from playback attacksDCHAP authentication is performed only upon link establishmentECHAP uses a three-way handshakeFCHAP authentication passwords are sent in plaintext

单选题Which the security mechanism uses the concept of a realm?()A authorizationB data integrityC confidentialityD authentication

单选题Which of the following pair of words are antonyms?Aincrease and decreaseBchoice and optionCblue and greenDrabbit and animal

单选题Which of the following connector types is used with twisted pair cable?()AT-ConnectorBBNCCRJ-45DLC

多选题Which two authentication mechanisms provide weaker protection than other mechanisms?()AHTTP Basic AuthenticationBForm Based AuthenticationCHTTP Digest AuthenticationDHTTPS Client Authentication

单选题Which of the following connectors is commonly used on a shielded twisted pair cable?()ABNCBRJ-45CFDHDMI

单选题Which of the following LAN technologies is considered fast Ethernet and uses two pairs of cabling,one pair for sending and the other pair for receiving?()A100Base-T4B100Base-TXC100Base-XD100Base-FX

单选题Which of the following authentication protocols uses certificates to negotiate access to the network?()APAPBCHAPCEAP-TLSDKerberos

单选题Which one of the following commands can be used to enable AAA authentication to determine if a user canaccess the privilege command level?()Aaaa authentication enable method defaultBaaa authentication enable defaultCaaa authentication enable levelDaaa authentication enable default local

单选题Which statement about OSPF authentication is true?()ATo enable OSPF authentication in a network, OSPF area 0 authentications must be enabled firstBThe payload of OSPF version 3 packets contains no authentication informationCOSPF version 3 supports Advanced Encryption StandardDOSPF version 3 uses router ID as a key to encrypt OSPF hello packetsEOSPF MD5 authentication uses TCP, and Plan Test authentication uses UDP

多选题Which of the following would provide good baseline documentation to have on hand whenanalyzing potential problems?(Choose all that apply.)()AUser authentication ID and passwordBUser profileCOutput of debugDOutput of show interfaceEResult of pingFOutput of show process cpu