多选题Cisco provides two enhancements to 802.11 security which protect a WEP key from exploits. Which two technologies provide these security enhancements? ()A802.1XBCisco Temporal Key Integrity Protocol (CKIP)CExtensible Authentication Protocol-Flexible Authentication via Secure Tunneling (EAP-FAST)DCisco Message Integrity Check (CMIC)EOne-Time Passwords (OTP)FAdvanced Encryption Standard (AES)

多选题
Cisco provides two enhancements to 802.11 security which protect a WEP key from exploits. Which two technologies provide these security enhancements? ()
A

802.1X

B

Cisco Temporal Key Integrity Protocol (CKIP)

C

Extensible Authentication Protocol-Flexible Authentication via Secure Tunneling (EAP-FAST)

D

Cisco Message Integrity Check (CMIC)

E

One-Time Passwords (OTP)

F

Advanced Encryption Standard (AES)


参考解析

解析: 暂无解析

相关考题:

Which two differentiators make RSTP the preferred protocol for preventing Layer 2 loops in aswitched network environment?() (Choose two.) A. Features such as UplinkFast and BackboneFast are compatible with RSTP.B. An RSTP that is based on Cisco products generally performs better than the Cisco proprietary 802.1D enhancements.C. Cisco proprietary enhancements are not transparent.D. Information about port roles is sent to all switches.E. RSTPs that are based on Cisco products require no additional configuration.

What are two characteristics of the SDM Security Audit wizard?()A、displays a screen with Fix-it check boxes to let you choose which potential security-related configuration changes to implementB、has two modes of operationinteractive and non-interactiveC、automatically enables Cisco IOS firewall and Cisco IOS IPS to secure the routerD、uses interactive dialogs and prompts to implement role-based CLIE、requires users to first identify which router interfaces connect to the inside network and which connectto the outside network

What are two ways in which the Cisco Security Monitoring, Analysis, and Response System provides superior network protection? ()A、 reports financial losses from attacksB、 providessecutiy command and controlC、 provides VPN connectivity to clientsD、 expedites reporting of incidentsE、 manage rogue wireless signals

Which two management-software applications can you use to manage the Cisco Catalyst Express 500 Series Switches?()A、Cisco Network AssistantB、Cisco Security Device ManagerC、Cisco Device ManagerD、Cisco Adaptive Security Device Manager

Which Cisco security tool can best determine it a Cisco ISR router is properly secured? ()A、 Cisco SDM Security AuditB、 Cisco Security MARSC、 Cisco Security Agent MCD、 Cisco Security IntelliShieldE、 CAN

Cisco provides two enhancements to 802.11 security which protect a WEP key from exploits. Which two technologies provide these security enhancements? ()A、802.1XB、Cisco Temporal Key Integrity Protocol (CKIP)C、Extensible Authentication Protocol-Flexible Authentication via Secure Tunneling (EAP-FAST)D、Cisco Message Integrity Check (CMIC)E、One-Time Passwords (OTP)F、Advanced Encryption Standard (AES)

Which Cisco product is a software component that blocks unwanted connections and provides other gateway security functions for small business?()A、Cisco Firewall Services Module (FWSM)B、Cisco Secure Access Control Server (ACS)C、Cisco Private Internet Exchange (PIX) FirewallD、Cisco Internetwork Operating System (IOS) Firewall

Which two statements best describe Cisco IOS IP SLA?()A、only implemented between Cisco source and destination-capable devicesB、statistics provided by syslog, CLI, and SNMPC、measures delay, jitter, packet loss, and voice qualityD、only monitors VoIP traffic flowsE、provides active monitoringF、provides passive monitoring

Cisco Unified Communications 500 Series for Small Business, a critical part of the Cisco Smart Business Communications System, is a unified communications solution for small businesses that provides voice, data, voicemail. Which three features does the Cisco UC520 support?()A、 distributed routingB、 Cisco Unity ExpressC、 security, firewall and VPND、 analog devices

Which two statements about the Wired Equivalent Privacy (WEP) encryption mechanism are true? ()A、the two methods of authentication using the WEP encryption are open and shared keyB、the 802.11 standard defines WEP security using 128-bit keysC、WEP can provide stronger authentication through the use of LEAP, PEAP, or EAP-FASTD、WEP is a scalable encryption solution that uses static keys for authenticationE、WEP security provides only one-way authenticationF、WEPv2 offers improved encryption by replacing the RC4 encryption mechanism with the AES (symmetric block cipher) mechanism

Which two differentiators make RSTP the preferred protocol for preventing Layer 2 loops in aswitched network environment?() (Choose two.)A、Features such as UplinkFast and BackboneFast are compatible with RSTP.B、An RSTP that is based on Cisco products generally performs better than the Cisco proprietary 802.1D enhancements.C、Cisco proprietary enhancements are not transparent.D、Information about port roles is sent to all switches.E、RSTPs that are based on Cisco products require no additional configuration.

Which two statements best describe the Cisco Unified Wireless Network?()A、 The Cisco Unified Wireless Network provides the framework to segregate wired and wirelessnetworks to deliver the best security for companies that are deploying WLANs.B、 The Cisco Unified wireless Network provides the framework to integrate and extend wired andwireless networks to deliver the lowest-possible total cost or ownership for companies that aredeploying WLANsC、 The Cisco Unified Wireless Network extends "wireless awareness" into important elements ofthe network infrastructure, providing the same level of security for WLANs that organizations havecome to expect from their VPNs.D、 The Cisco unified Wireless Network extends "wireless awareness" into important elements ofthe network infrastructure, providing the same level of security scalability, reliability ease ofdeployment and management for WLANs that organizations have come to expect from their wiredLANs.

Which two series of routers can integrate security services, enable wireless networking, and simplify network management? ()A、 Cisco 830 Series routersB、 Cisco 850 Series routersC、 Cisco 1700 Series Modular Access RoutersD、 Cisco 3800 Series Integrated Services Routers

Which protocol provides a method of sharing VLAN configuration information between two Cisco switch?()A、VTPB、802.1QC、RSTPD、STP

Which Cisco PIX and ASA feature provides reliable, comprehensive security against virus and worm propagation, as well as data theft?  ()A、 WebVPN for SSLB、 IPSecC、 AIMD、 Stateful packet inspection

In Cisco Nexus 1000V deployments which two statements are true?()A、Vmware provides the VNIC and driversB、Vmware provides the VNIC and Cisco provides the driversC、Cisco provides the switching and management of switchingD、Cisco provides the switching and Vmware provides the management of switching

Which two items best describe a Cisco IOS IP SLA responder?()A、required at the destination to implement Cisco IOS IP SLA servicesB、improves measurement accuracyC、required for VoIP jitter measurementsD、provides security on Cisco IOS IP SLA messages via LEAP or EAP-FAST authenticationE、responds to one Cisco IOS IP SLA operation per portF、stores the resulting test statistics

Which tools on Cisco.com could you use to plan for correct Cisco lOS images to support a customer’s security design and requirements? (Choose two.)()A、 Cisco lOS Matrix NavigatorB、 Cisco Feature NavigatorC、 Cisco lOS Package PlannerD、 Cisco lOS Security PlannerE、 Cisco Dynamic Configuration Tool

Which two options are benefits of the Cisco Technical Assistance Center?()A、Increase the performance of the current featuresB、Possesses broad expertise in Cisco technologiesC、Enhances network and/or application availability, reliability and stabilityD、Provides rapid fault isolation in a complex environment, leading to quick resolution

多选题In Cisco Nexus 1000V deployments which two statements are true?()AVmware provides the VNIC and driversBVmware provides the VNIC and Cisco provides the driversCCisco provides the switching and management of switchingDCisco provides the switching and Vmware provides the management of switching

多选题What are two ways in which the Cisco Security Monitoring, Analysis, and Response System provides superior network protection? ()Areports financial losses from attacksBprovidessecutiy command and controlCprovides VPN connectivity to clientsDexpedites reporting of incidentsEmanage rogue wireless signals

单选题Which Cisco PIX and ASA feature provides reliable, comprehensive security against virus and worm propagation, as well as data theft?  ()A WebVPN for SSLB IPSecC AIMD Stateful packet inspection

多选题Which two differentiators make RSTP the preferred protocol for preventing Layer 2 loops in aswitched network environment?() (Choose two.)AFeatures such as UplinkFast and BackboneFast are compatible with RSTP.BAn RSTP that is based on Cisco products generally performs better than the Cisco proprietary 802.1D enhancements.CCisco proprietary enhancements are not transparent.DInformation about port roles is sent to all switches.ERSTPs that are based on Cisco products require no additional configuration.

多选题Which two statements best describe the Cisco Unified Wireless Network?()AThe Cisco Unified Wireless Network provides the framework to segregate wired and wirelessnetworks to deliver the best security for companies that are deploying WLANs.BThe Cisco Unified wireless Network provides the framework to integrate and extend wired andwireless networks to deliver the lowest-possible total cost or ownership for companies that aredeploying WLANsCThe Cisco Unified Wireless Network extends wireless awareness into important elements ofthe network infrastructure, providing the same level of security for WLANs that organizations havecome to expect from their VPNs.DThe Cisco unified Wireless Network extends wireless awareness into important elements ofthe network infrastructure, providing the same level of security scalability, reliability ease ofdeployment and management for WLANs that organizations have come to expect from their wiredLANs.

单选题Which Cisco security tool can best determine it a Cisco ISR router is properly secured? ()A Cisco SDM Security AuditB Cisco Security MARSC Cisco Security Agent MCD Cisco Security IntelliShieldE CAN

单选题Which protocol provides a method of sharing VLAN configuration information between two Cisco switch?()AVTPB802.1QCRSTPDSTP

多选题Cisco provides two enhancements to 802.11 security which protect a WEP key from exploits. Which two technologies provide these security enhancements? ()A802.1XBCisco Temporal Key Integrity Protocol (CKIP)CExtensible Authentication Protocol-Flexible Authentication via Secure Tunneling (EAP-FAST)DCisco Message Integrity Check (CMIC)EOne-Time Passwords (OTP)FAdvanced Encryption Standard (AES)

多选题What are two characteristics of the SDM Security Audit wizard?()Adisplays a screen with Fix-it check boxes to let you choose which potential security-related configuration changes to implementBhas two modes of operationinteractive and non-interactiveCautomatically enables Cisco IOS firewall and Cisco IOS IPS to secure the routerDuses interactive dialogs and prompts to implement role-based CLIErequires users to first identify which router interfaces connect to the inside network and which connectto the outside network