WhichtwoofthesestatementsbestdescribethebenefitsofWPAv2?(Choosetwo.)() A.SSIDbroadcastpreventionB.man-in-the-middleattackprotectionC.costreductionthroughsoftwareupgradesinallexistinghardwareD.dynamickeygenerationE.RFjammingprevention

WhichtwoofthesestatementsbestdescribethebenefitsofWPAv2?(Choosetwo.)()

A.SSIDbroadcastprevention

B.man-in-the-middleattackprotection

C.costreductionthroughsoftwareupgradesinallexistinghardware

D.dynamickeygeneration

E.RFjammingprevention


相关考题:

Which two statements are true regarding an Automatic Storage Management (ASM) instance?() (Choosetwo.) A. As ASM instance mounts an ASM control fileB. An ASM instance uses the ASMB process for rebalancing of disks within a disk groupC. Automatic Memory Management is enabled in an ASM instance even when the MEMORY_TARGET parameter is not set explicitlyD. An RDBMS instance gets connected to an ASM instance using ASMB as a foreground process when the database instance is started

Whataretwoimportantapproachestocommunicatewhenidentifyingacustomer’ssecurityrisks?(Choosetwo.)() A.Smallercompaniesareatlessriskthanlargerenterprises,sotheirsecurityneedsarenotasgreat.B.Businessstrategyshoulddirectlyrelatetothesecuritypolicyandbudget.C.ThedesignatedsecurityexpertshouldreporttotheITdepartment,sincethatiswherethesolutionwillbeimplemented.D.Securityshouldbeacontinuousprocess.E.Securitysolutionsshouldcomefrommultiplevendorstomakeiteasiertocoordinatesecurityeventsfromthepointoforigin.

WhichtoolsonCisco.comcouldyouusetoplanforcorrectCiscolOSimagestosupportacustomer’ssecuritydesignandrequirements?(Choosetwo.)() A.CiscolOSMatrixNavigatorB.CiscoFeatureNavigatorC.CiscolOSPackagePlannerD.CiscolOSSecurityPlannerE.CiscoDynamicConfigurationTool

Whichtwoofthesestatementsbestdescribefastsecureroaming?(Choosetwo.)() A.availableonlyinautonomousAPsB.availableinautonomousandlightweightAPsC.afeatureofWDSinautonomousAPsD.afeatureofWDSinlightweightAPsE.requiresatleastoneAPandoneWirelessLANServicesModule

Whichtwoofthesestatementsdescribeimportantaspectsofperformingawirelesssitesurvey?(Choosetwo.)() A.An802.11gaccesspointwithavarietyofantennascanbeusedinallstandardsitesurveys.B.Sitesurveyscanbeperformedmanuallyorthroughassistedsitesurvey.C.Channelpowerduringtestingstartsatthedefaultminimumandgraduallyincreasestothemaximum.D.Overlappingaccesspointscancreateperformanceproblems.E.Surveysshouldbedoneafterhoursinanofficebuildingorduringreducedinventorylevelsinwarehouses.

WhichtwoofthesedataencryptionAIMmodesarefoundonthe3800familyofCiscoISRRouters?(Choosetwo.)() A.BPIIB.SPII-PlusC.FPIID.EPII-PlusE.HPIIF.HPII-PIus

Whichtwoofthesearecorrectregardingaccesscontrollists?(Choosetwo.)() A.AnACLcanbeappliedtomultipleinterlaces.B.AnACLwildcardmaskisidenticaltoanIPsubnetmask.C.TheremaybemultipleACLsperprotocol,perdirection,andperinterface.D.ThereisanimplicitdenyattheendofanACLandwillresultinadroppedpacket.E.AnACLactsonallpackets,thoseflowingthrutherouterandthoseoriginatedbytherouteritself.F.AnACLwillbeprocessedfromtoptobottomandmayhavemultiplematchesthatwillactonthepacketthatisbeingtested.

TheCiscoSDMcanconfiguremost,butnotall,routingprotocols.WhichtwooftheseroutingprotocolscanbeconfiguredusingSDM?(Choosetwo.)() A.BGPB.IGRPC.ISISD.OSPFE.EIGRP

WhichtwoofthesestatementsbestdescribethebenefitsofCisco’swirelessIDSfunctionality?(Choosetwo.)() A.AirDefenseforwirelessIDSisrequiredbyautonomousAPs.B.2.40HzCKmanagementcanmonitorboth802.11andnon-802.11CKinterference.C.APsonlymonitortheRFchannelsthatareservicingtheclients.D.CiscoorCCXcompatibleclientcardscanextendtheCKIDSserviceforautonomousAPs.E.AutonomousAPsmustbededicatedIDSsensorswhilelightweightAPscancombineclienttrafficandRFmonitoring.

ThePIXSecurityAppliancefeaturesetisasubsetoftheASASecurityAppliancefeatureset.WhichtwoofthesefeaturesareonlysupportedbyanASASecurityAppliance?(Choosetwo.)() A.securitycontextsB.-transparentfirewallC.WebVPND.Active/ActivefailoverE.lowlatencyqueuingF.AIP-SSMintrusionprevention

WhichtwomethodsenableaPCconnectedtothePartnerNettoconnecttoaserveronDMZ1butdenyitaccesstobothDMZ2andtheInsidenetwork?(Choosetwo.)() A.EnableportaddresstranslationfortrafficsourcedfromthePartnerNetPCtotheDMZ1server.B.DisableNATcontrolonDM72andtheInsideinterfacesonly.C.EnablestaticNATtranslationfortheDMZ1server,andthenuseanACLtopermitthePartnerNetPCtraffictotheDMZ1server.D.DisableNATcontrolontheDMZ1interfaceonly.E.LowerthesecurityleveloftheDMZ2interfaceto30.F.RaisethesecuritylevelofthePartnerNetinterfaceto55.

WhichtwostatementsabouttheCiscoAironetDesktopUtility(ADU)aretrue?(Choosetwo.)() A.TheAironetDesktopUtility(ADU)canbeusedtoestablishtheassociationbetweentheclientadapterandtheaccesspoint,manageauthenticationtothewirelessnetwork,andenabledataencryption.B.TheAironetDesktopUtility(ADU)andtheMicrosoftWirelessConfigurationManagercanbeusedatthesametimetoconfigurethewirelessclientadapter.C.TheAironetDesktopUtility(ADU)cansupportonlyonewirelessclientadapterinstalledandusedatatime.D.TheAironetDesktopUtility(ADU)profilemanagerfeaturecancreateandmanageonlyoneprofileforthewirelessclientadapter.E.WhentheuserselectsadifferentprofileintheAironetDesktopUtility(ADU),thesettingsforthewirelessclientadapterarechangedonlyafterareboot.

Refertotheexhibit.Whichtwostatementsaretrueaboutthepartialconfigurationthatisprovided.(Choosetwo.)() A.Alltheconfiguredneighborsareinautonomoussystem100.B.ThepeergroupshortenstheIBGPconfiguration.C.ThepeergroupshortenstheEBGPconfiguration.D.OnlytheoutgoingfiltersareappliedtoBGPupdates.E.ThreeAS-pathfiltersareappliedtoeachBGPneighbor.

Whichtwodevicescaninterferewiththeoperationofawirelessnetworkbecausetheyoperateonsimilarfrequencies?(Choosetwo.)() A.copierB.microwaveovenC.toasterD.cordlessphoneE.IPphoneF.AMradio

Thenetworksecuritypolicyrequiresthatonlyonehostbepermittedtoattachdynamicallytoeachswitchinterface.Ifthatpolicyisviolated,theinterfaceshouldshutdown.Whichtwocommandsmustthenetworkadministratorconfigureonthe2950Catalystswitchtomeetthispolicy?(Choosetwo.)()A.Switch1(config-if)#switchportport-securitymaximum1B.Switch1(config)#mac-address-tablesecureC.Switch1(config)#access-list10permitiphostD.Switch1(config-if)#switchportport-securityviolationshutdownE.Switch1(config-if)#ipaccess-group10

Whichtwostatementsaretrueaboutthecommandiproute172.16.3.0255.255.255.0192.168.2.4?(Choosetwo.)() A.Itestablishesastaticroutetothe172.16.3.0network.B.Itestablishesastaticroutetothe192.168.2.0network.C.Itconfigurestheroutertosendanytrafficforanunknowndestinationtothe172.16.3.0network.D.Itconfigurestheroutertosendanytrafficforanunknowndestinationouttheinterfacewiththeaddress192.168.2.4.E.Itusesthedefaultadministrativedistance.F.Itisaroutethatwouldbeusedlastifotherroutestothesamedestinationexist.

Which of the following statements about authentication responses and conditions is true? ()(Choosetwo.)A、When a router receives a failure response, it stops querying authentication methods.B、When a router receives an error response, it stops querying authentication methods.C、If the router receives a failure response from an authentication method, it queries the next method.D、The router does not differentiate between failure and error responses; the authentication process is always interrupted.E、If it receives no response from the authentication method, a router will determine the error condition On its own; the router also has the option to proceed to the next method in a list if configured accordingly.

多选题Which of the following statements about authentication responses and conditions is true? ()(Choosetwo.)AWhen a router receives a failure response, it stops querying authentication methods.BWhen a router receives an error response, it stops querying authentication methods.CIf the router receives a failure response from an authentication method, it queries the next method.DThe router does not differentiate between failure and error responses; the authentication process is always interrupted.EIf it receives no response from the authentication method, a router will determine the error condition On its own; the router also has the option to proceed to the next method in a list if configured accordingly.

多选题Which two statements are true regarding an Automatic Storage Management (ASM) instance?() (Choosetwo.)AAs ASM instance mounts an ASM control fileBAn ASM instance uses the ASMB process for rebalancing of disks within a disk groupCAutomatic Memory Management is enabled in an ASM instance even when the MEMORY_TARGET parameter is not set explicitlyDAn RDBMS instance gets connected to an ASM instance using ASMB as a foreground process when the database instance is started