多选题Which algorithms did TKIP add to the 802.11 specification? ()Akey mixingBAES-based encryptionCanti-replay sequence counterDmessage integrity checkEcyclic redundancy check

多选题
Which algorithms did TKIP add to the 802.11 specification? ()
A

key mixing

B

AES-based encryption

C

anti-replay sequence counter

D

 message integrity check

E

cyclic redundancy check


参考解析

解析: 暂无解析

相关考题:

(c) Describe the purposes for which a person specification might be used. (4 marks)

Which of the following protocols is the LEAST secure and should be avoided on a wireless network?() A.WEPB.PEAPC.WPAD.TKIP

Which of the following wireless standards has the highest maximum data rate?() A.802.11nB.802.11bC.802.11aD.802.11g

WhichalgorithmsdidTKIPaddtothe802.11specification?() A.keymixingB.AES-basedencryptionC.anti-replaysequencecounterD. messageintegritycheckE.cyclicredundancycheck

Which two features did WPAv1 add to address the inherent weaknesses found in WEP?() A.a stronger encryption algorithmB.key mixing using temporal keysC.shared key authenticationD.a shorter initialization vectorE.per frame sequence counters

在802.11i标准中,需要通过硬件实现加密的协议是(),所以,此协议需要网卡硬件支持。A、WEPB、AESC、PSKD、TKIP

中国自主研发的802.11安全机制标准的名称是()。A、WPAB、WAPIC、MD5D、TKIP

在802.11i标准中,需要通过硬件实现加密的协议是(),所以,需要网卡硬件支持A、WEPB、AESC、PSKD、TKIP

S10系列手机支持新一代WiFi6标准,基于()协议标准,速度更快连接更稳定。A、802.11acB、802.11nC、802.11adD、802.11ax

Which two features did WPAv1 add to address the inherent weaknesses found in WEP?()A、a stronger encryption algorithmB、key mixing using temporal keysC、shared key authenticationD、a shorter initialization vectorE、per frame sequence counters

Which algorithms did TKIP add to the 802.11 specification? ()A、 key mixingB、 AES-based encryptionC、 anti-replay sequence counterD、message integrity checkE、 cyclic redundancy check

Which encryption type does WPA2 use?()A、AES-CCMPB、PPK via IVC、PSKD、TKIP/MIC

If there is an existing 802.11g WLAN at a site, which service can be provided without conducting anew site survey?()A、Add a new 802.11a WLANB、Increase the Layer 2 and Layer 3 security of the WLANC、Increase the throughput for the wireless clientsD、Add new services (such as voice) over the WLAN

Which of the following protocols is the LEAST secure and should be avoided on a wireless network?()A、WEPB、PEAPC、WPAD、TKIP

Which of the following is a WiFi device? ()A、EVDO PCMCIA modem cardB、floppy disk drive add-in cardC、802.11g PCMCIA cardD、56K v.34 PCMCIA modem card

IEEE802.11i标准中主要包含的加密技术和认证协议包括()A、EAP-TLSB、TKIP(Temporalkeyintegrityprotocol)C、AES(AdvancedencryptionStandarD.D、IEEE802.1x

CCMP以及TKIP是Wlan中哪个协议标准里包含的内容()A、IEEE802.11hB、IEEE802.11iC、IEEE802.11xD、IEEE802.11s

Which two wireless security statements are true?()A、A TACACS+ server is required to implement 802.1x.B、MIC protects against man-in-the-middle and replay attacks.C、The 802.1x standard provides encryption services for wireless clients.D、The AES (symmetric block cipher) is specified in the IEEE 802.11i specification.E、The IEEE 802.11i specification uses RC4 as its encryption mechanism.F、WPA requires TKIP and AES as encryption methods.

Which two statements best describe enhanced wireless security encryption?()A、TKIP protects RC4 encryption keysB、CKIP and TKIP protect AES encryption keysC、TKIP encryption is more processor intensive than AES encryption isD、WPA requires TKIP encryption, whereas WPA2 supports AES encryptionE、WPA requires AES encryption, whereas WPA2 supports TKIP encryption

多选题Which three are distinctions between asymmetric and symmetric algorithms? ()AOnly symmetric algorithms have a key exchange technology built inBAsymmetric algorithms are used quite often as key exchange protocols for symmetricalgorithmsCOnly asymmetric algorithms have a key exchange technology built inDAsymmetric algorithms are based on more complex mathematical computations

单选题Which of the following has a maximum data rate of 11Mbps?()A802.11nB802.11gC802.11bD802.11a

单选题Which of the following is a WiFi device? ()AEVDO PCMCIA modem cardBfloppy disk drive add-in cardC802.11g PCMCIA cardD56K v.34 PCMCIA modem card

单选题In which of the following years did Julius Caesar invade Britain?A55 BCB54 BCC54 ADD43 AD

多选题Which two features did WPAv1 add to address the inherent weaknesses found in WEP?()Aa stronger encryption algorithmBkey mixing using temporal keysCshared key authenticationDa shorter initialization vectorEper frame sequence counters

单选题Which of the following wireless networking standards can operate at two different frequenciessimultaneously?()A802.11aB802.11bC802.11gD802.11n

单选题Which of the following wireless standards has a transfer speed of 11 Mbps?()A802.11aB802.11bC802.11gD802.11n

单选题CCMP以及TKIP是Wlan中哪个协议标准里包含的内容()AIEEE802.11hBIEEE802.11iCIEEE802.11xDIEEE802.11s