What are three security problems with Wi-Fi Protected Access (WPA)?()A、WPA is based on the outdated IEEE 802.11i standard.B、WPA uses RSN,which uses the same base encryption algorithm as RC4.C、WPA requires a hardware upgrade that may not be supported by all vendors.D、WPA uses TKIP,which uses the same base encryption algorithm as WEP.E、WPA is susceptible to a DoS attack when it receives two packets in quick succession with bad MICs,forcing the AP to shut down the entire Basic Service Set (BSS) for one minute.F、WPA is susceptible to a security weakness when preshared keys are used.

What are three security problems with Wi-Fi Protected Access (WPA)?()

  • A、WPA is based on the outdated IEEE 802.11i standard.
  • B、WPA uses RSN,which uses the same base encryption algorithm as RC4.
  • C、WPA requires a hardware upgrade that may not be supported by all vendors.
  • D、WPA uses TKIP,which uses the same base encryption algorithm as WEP.
  • E、WPA is susceptible to a DoS attack when it receives two packets in quick succession with bad MICs,forcing the AP to shut down the entire Basic Service Set (BSS) for one minute.
  • F、WPA is susceptible to a security weakness when preshared keys are used.

相关考题:

WI-FI网络安全接入是一种保护无线网络安全的系统,WPA加密的认证方式不包括( )。A.WPA和WPA2 B.WPA-PSK C.WEP D.WPA2-PSK

根据《智慧家庭场景化培训教材之装维基础》描述,Wi-Fi的安全加密协议主要有:()。 A、WEPB、WPA-PSK(TKIP)C、WPA2-PSK(AES)D、WPA-PSK(TKIP)+WPA2-PSK(AES)E、WPA3F、WAPI

●Wi-Fi联盟制定的安全认证方案 WPA(Wi-fi Protected Access)是(66)标准的子集。(66)A. IEEE 802.11B. IEEE 802.11aC. IEEE 802.11bD. IEEE 802.11i

YouhaveawirelessaccesspointthatisconfiguredtouseAdvancedEncryptionStandard(AES)security.Apre-sharedkeyisnotconfiguredonthewirelessaccesspoint.YouneedtoconnectacomputerthatrunsWindows7tothewirelessaccesspoint.Whichsecuritysettingshouldyouselectforthewirelessconnection?()A.802.1xB.WPA-PersonalC.WPA2-EnterpriseD.WPA2-Personal

What is one reason that WPA encryption is preferred over WEP?() A. A WPA key is longer and requires more special characters than the WEP key.B. The access point and the client are manually configured with different WPA key values.C. WPA key values remain the same until the client configuration is changed.D. The values of WPA keys can change dynamically while the system is used.

Which two statements best describe the wireless security standard that is defined by WPA (Choose two.)()。 A.It specifies use of a static encryption key that must be changed frequently to enhance securityB.It requires use of an open authentication methodC.It specifies the use of dynamic encryption keys that change each time a client establishes a connectionD.It requires that all access points and wireless devices use the same encryption keyE.It includes authentication by PSK

WI-FI网络安全接入是一种保护无线网络安全的系统,WPA加密的认证方式不包括(37)。A.WPA和WPA2B.WPA-PSKC.WEPD.WPA2-PSK

WI-FI网络安全接入是一种保护无线网络安全的系统,WPA加密的认证方式不包括( )。A.WPA和WPA2B.WEPC.WPA-PSKD.WPA2-PSK

Wi-Fi联盟制定的安全认证方案WPA(Wi-Fi Protected Access)是 ( ) 标准的子集。A.IEEE 802.11B.IEEE 802.11aC.IEEE 802.11bD.IEEE 802.11i

关于Wi-Fi联盟提出的安全协议WPA和WPA2的区别,下面描述正确的是()。A、WPA是有线局域安全协议,而WA2是无线局域网协议B、WPA是适用于中国的无线局域安全协议,而WPA2是适用于全世界的无线局域网协议C、WPA没有使用密码算法对接入进行认证,而WA2使用了密码算法对接入进行认证D、WPA是依照802.11i标准草案制定的,而WA2是依照802.11i正式标准制定的

Which two statements are true about the Wi-Fi Protected Access (WPA) and Wi-Fi Protected Access version 2 (WPA2) security solutions?()A、both WPA and WPA2 require authentication support via IEEE 802.1 x and Pre-Shared Key (PSK)B、both WPA and WPA2 address all known Wired Equivalent Privacy (WEP) vulnerabilities in the IEEE 802.11i security implementationC、WPA is supported on client devices only. WPA2 is supported on both access point (AP) and client devicesD、WPA provides only a standard for authentication. WPA2 provides a standard for authentication and encryptionE、WPA requires encryption support via Temporal Key Integrity Protocol (TKIP) WPA2 provides encryption support via (symmetric block cipher)AES-CCMP

Wi-Fi Protected Access was an interim step on the way to the more secure WPA2. What was added in WPA2 to make it more secure?()A、 PEAPB、 EAP-FASTC、 AES encryptionD、 Rivest Cipher 4 encryption

A company wants to secure access to its internal wireless network. The company wants to use themost secure means to access the network. Which of the following is the BEST choice for wireless security in this situation?()A、WEP encryptionB、Channel rotationC、Disable SSIDD、WPA encryption

常见的加密方式有()A、WEPB、WPA/WPA2C、WPA3D、WPA-PSK/WPA2-PSK

Which two statements best describe the wireless security standard that is defined by WPA (Choose two.)()。A、It specifies use of a static encryption key that must be changed frequently to enhance securityB、It requires use of an open authentication methodC、It specifies the use of dynamic encryption keys that change each time a client establishes a connectionD、It requires that all access points and wireless devices use the same encryption keyE、It includes authentication by PSK

Which two wireless security statements are true?()A、A TACACS+ server is required to implement 802.1x.B、MIC protects against man-in-the-middle and replay attacks.C、The 802.1x standard provides encryption services for wireless clients.D、The AES (symmetric block cipher) is specified in the IEEE 802.11i specification.E、The IEEE 802.11i specification uses RC4 as its encryption mechanism.F、WPA requires TKIP and AES as encryption methods.

Which two statements best describe the wireless security standard that is defined by WPA? (Choose two.)()A、It specifies use of a static encryption key that must be changed frequently to enhance security.B、It requires use of an open authentication method.C、It specifies the use of dynamic encryption keys that change each time a client establishes a connection.D、It requires that all access points and wireless devices use the same encryption key.E、It includes authentication by PSK

Which two statements best describe enhanced wireless security encryption?()A、TKIP protects RC4 encryption keysB、CKIP and TKIP protect AES encryption keysC、TKIP encryption is more processor intensive than AES encryption isD、WPA requires TKIP encryption, whereas WPA2 supports AES encryptionE、WPA requires AES encryption, whereas WPA2 supports TKIP encryption

A technician installed a new wireless access point on an existing small office home office (SOHO) network with a selective security option enabled. All wireless computers connect to the new network except one computer that cannot connect to the wireless network. Which of the following is the cause?()A、The network uses MAC filteringB、The network uses WEPC、The network uses SSID broadcastD、The network uses WPA

单选题What is one reason that WPA encryption is preferred over WEP?()AA WPA key is longer and requires more special characters than the WEP key.BThe access point and the client are manually configured with different WPA key values.CWPA key values remain the same until the client configuration is changed.DThe values of WPA keys can change dynamically while the system is used.

单选题A technician installed a new wireless access point on an existing small office home office (SOHO) network with a selective security option enabled. All wireless computers connect to the new network except one computer that cannot connect to the wireless network. Which of the following is the cause?()AThe network uses MAC filteringBThe network uses WEPCThe network uses SSID broadcastDThe network uses WPA

单选题Wi-Fi Protected Access was an interim step on the way to the more secure WPA2. What was added in WPA2 to make it more secure?()A PEAPB EAP-FASTC AES encryptionD Rivest Cipher 4 encryption

多选题Which two statements best describe enhanced wireless security encryption?()ATKIP protects RC4 encryption keysBCKIP and TKIP protect AES encryption keysCTKIP encryption is more processor intensive than AES encryption isDWPA requires TKIP encryption, whereas WPA2 supports AES encryptionEWPA requires AES encryption, whereas WPA2 supports TKIP encryption

多选题Which two statements are true about the Wi-Fi Protected Access (WPA) and Wi-Fi Protected Access version 2 (WPA2) security solutions?()Aboth WPA and WPA2 require authentication support via IEEE 802.1 x and Pre-Shared Key (PSK)Bboth WPA and WPA2 address all known Wired Equivalent Privacy (WEP) vulnerabilities in the IEEE 802.11i security implementationCWPA is supported on client devices only. WPA2 is supported on both access point (AP) and client devicesDWPA provides only a standard for authentication. WPA2 provides a standard for authentication and encryptionEWPA requires encryption support via Temporal Key Integrity Protocol (TKIP) WPA2 provides encryption support via (symmetric block cipher)AES-CCMP

单选题Refer to the exhibit. When a profile is configured in the Aironet Desktop Utility, which security option  permits the configuration of host-based Extensible Authentication Protocol (EAP)?()A  WPA/WPA2/CCKMB  WPA/WPA2 PassphraseC  802.1xD  Pre-Shared Key (Static WEP)

多选题Which two statements best describe the wireless security standard that is defined by WPA? (Choose two.)()AIt specifies use of a static encryption key that must be changed frequently to enhance security.BIt requires use of an open authentication method.CIt specifies the use of dynamic encryption keys that change each time a client establishes a connection.DIt requires that all access points and wireless devices use the same encryption key.EIt includes authentication by PSK

多选题What are three security problems with Wi-Fi Protected Access (WPA)?()AWPA is based on the outdated IEEE 802.11i standard.BWPA uses RSN,which uses the same base encryption algorithm as RC4.CWPA requires a hardware upgrade that may not be supported by all vendors.DWPA uses TKIP,which uses the same base encryption algorithm as WEP.EWPA is susceptible to a DoS attack when it receives two packets in quick succession with bad MICs,forcing the AP to shut down the entire Basic Service Set (BSS) for one minute.FWPA is susceptible to a security weakness when preshared keys are used.