多选题Which algorithms did TKIP add to the 802.11 specification? ()Akey mixingBAES-based encryptionCanti-replay sequence counterDmessage integrity checkEcyclic redundancy check
多选题
Which algorithms did TKIP add to the 802.11 specification? ()
A
key mixing
B
AES-based encryption
C
anti-replay sequence counter
D
message integrity check
E
cyclic redundancy check
参考解析
解析:
暂无解析
相关考题:
Which of the following protocols is the LEAST secure and should be avoided on a wireless network?() A.WEPB.PEAPC.WPAD.TKIP
Which of the following wireless standards has the highest maximum data rate?() A.802.11nB.802.11bC.802.11aD.802.11g
WhichalgorithmsdidTKIPaddtothe802.11specification?() A.keymixingB.AES-basedencryptionC.anti-replaysequencecounterD. messageintegritycheckE.cyclicredundancycheck
Which two features did WPAv1 add to address the inherent weaknesses found in WEP?() A.a stronger encryption algorithmB.key mixing using temporal keysC.shared key authenticationD.a shorter initialization vectorE.per frame sequence counters
Which two features did WPAv1 add to address the inherent weaknesses found in WEP?()A、a stronger encryption algorithmB、key mixing using temporal keysC、shared key authenticationD、a shorter initialization vectorE、per frame sequence counters
Which algorithms did TKIP add to the 802.11 specification? ()A、 key mixingB、 AES-based encryptionC、 anti-replay sequence counterD、message integrity checkE、 cyclic redundancy check
If there is an existing 802.11g WLAN at a site, which service can be provided without conducting anew site survey?()A、Add a new 802.11a WLANB、Increase the Layer 2 and Layer 3 security of the WLANC、Increase the throughput for the wireless clientsD、Add new services (such as voice) over the WLAN
Which of the following protocols is the LEAST secure and should be avoided on a wireless network?()A、WEPB、PEAPC、WPAD、TKIP
Which of the following is a WiFi device? ()A、EVDO PCMCIA modem cardB、floppy disk drive add-in cardC、802.11g PCMCIA cardD、56K v.34 PCMCIA modem card
IEEE802.11i标准中主要包含的加密技术和认证协议包括()A、EAP-TLSB、TKIP(Temporalkeyintegrityprotocol)C、AES(AdvancedencryptionStandarD.D、IEEE802.1x
Which two wireless security statements are true?()A、A TACACS+ server is required to implement 802.1x.B、MIC protects against man-in-the-middle and replay attacks.C、The 802.1x standard provides encryption services for wireless clients.D、The AES (symmetric block cipher) is specified in the IEEE 802.11i specification.E、The IEEE 802.11i specification uses RC4 as its encryption mechanism.F、WPA requires TKIP and AES as encryption methods.
Which two statements best describe enhanced wireless security encryption?()A、TKIP protects RC4 encryption keysB、CKIP and TKIP protect AES encryption keysC、TKIP encryption is more processor intensive than AES encryption isD、WPA requires TKIP encryption, whereas WPA2 supports AES encryptionE、WPA requires AES encryption, whereas WPA2 supports TKIP encryption
多选题Which three are distinctions between asymmetric and symmetric algorithms? ()AOnly symmetric algorithms have a key exchange technology built inBAsymmetric algorithms are used quite often as key exchange protocols for symmetricalgorithmsCOnly asymmetric algorithms have a key exchange technology built inDAsymmetric algorithms are based on more complex mathematical computations
单选题Which of the following is a WiFi device? ()AEVDO PCMCIA modem cardBfloppy disk drive add-in cardC802.11g PCMCIA cardD56K v.34 PCMCIA modem card
多选题Which two features did WPAv1 add to address the inherent weaknesses found in WEP?()Aa stronger encryption algorithmBkey mixing using temporal keysCshared key authenticationDa shorter initialization vectorEper frame sequence counters
单选题Which of the following wireless networking standards can operate at two different frequenciessimultaneously?()A802.11aB802.11bC802.11gD802.11n
单选题Which of the following wireless standards has a transfer speed of 11 Mbps?()A802.11aB802.11bC802.11gD802.11n
单选题CCMP以及TKIP是Wlan中哪个协议标准里包含的内容()AIEEE802.11hBIEEE802.11iCIEEE802.11xDIEEE802.11s