CMS专题

多选题Which two statements about the open and shared key wireless-authentication methods are true? ()AShared key authentication is considered more secure than open authentication.BShared key authentication is considered less secure than open authentication.C

题目
多选题
Which two statements about the open and shared key wireless-authentication methods are true? ()
A

Shared key authentication is considered more secure than open authentication.

B

Shared key authentication is considered less secure than open authentication.

C

If the WEP keys do not match using the open authentication method, the client will not authenticate, associate, and transfer data.

D

If the WEP keys do not match using the open authentication method, the client will still be able to authenticate and associate, but will not transfer data.

E

If the WEP keys do not match using the open authentication method, the client will still be able to authenticate, associate, and transfer data.

如果没有搜索结果,请直接 联系老师 获取答案。
如果没有搜索结果,请直接 联系老师 获取答案。
相似问题和答案

第1题:

Which two statements regarding symmetric key encryption are true?() (Choose two.)

A. The same key is used for encryption and decryption.

B. It is commonly used to create digital certificate signatures.

C. It uses two keys: one for encryption and a different key for decryption.

D. An attacker can decrypt data if the attacker captures the key used for encryption.


参考答案:A, D

第2题:

Which two statements about the open and shared key wireless-authentication methods are true? ()

  • A、 Shared key authentication is considered more secure than open authentication.
  • B、 Shared key authentication is considered less secure than open authentication.
  • C、 If the WEP keys do not match using the open authentication method, the client will not authenticate, associate, and transfer data.
  • D、 If the WEP keys do not match using the open authentication method, the client will still be able to authenticate and associate, but will not transfer data.
  • E、 If the WEP keys do not match using the open authentication method, the client will still be able to authenticate, associate, and transfer data.

正确答案:B,D

第3题:

Which two statements are true about a Work Item with "Open" Notification? ()(Choose two.)

A. The Work Item is not eligible for Purge.

B. The Work Item is eligible for a Permanent purge.

C. The Work Item is eligible for a Temporary purge.

D. The Work Item is not complete because it still has "Open" Notification.

E. The Work Item is eligible for both Temporary and Permanent purge.


参考答案:A, D

第4题:

Which two statements best describe the wireless security standard that is defined by WPA? (Choose two.)()

  • A、It specifies use of a static encryption key that must be changed frequently to enhance security.
  • B、It requires use of an open authentication method.
  • C、It specifies the use of dynamic encryption keys that change each time a client establishes a connection.
  • D、It requires that all access points and wireless devices use the same encryption key.
  • E、It includes authentication by PSK

正确答案:C,E

第5题:

Which two statements about SCSI are true? ()

  • A、 The bus is limited to 32 devices
  • B、 It is a full duplex serial standard
  • C、 It is a half-duplex serial standard
  • D、 It allows up to 320 MB/s of shared channel bandwidth

正确答案:C,D

第6题:

Which two statements about VACLs on Cisco Nexus 7000 Series Switches are true? ()

  • A、 A single VACL can be shared across two or more VDCs.
  • B、 Use of VACLs requires no special license to be installed.
  • C、 VACLs make use of IP or MAC ACLs.
  • D、 Only options drop and forward are permitted.

正确答案:B,C

第7题:

Which two statements about NTP version 4 are true?()

  • A、It supports fast synchronization at starting and before network failures
  • B、It supports automatic server discovery
  • C、It uses a fixed-point arithmetion
  • D、It supports the "nanokernel" kernel implementation
  • E、It does not support Public-Key Cryptography

正确答案:B,D

第8题:

Which two statements about the Diffie-Hellman (DH) key exchange process are correct? ()(Choose two.)

A. In the DH key exchange process, the session key is never passed across the network.

B. In the DH key exchange process, the public and private keys are mathematically related using the DH algorithm.

C. In the DH key exchange process, the session key is passed across the network to the peer for confirmation.

D. In the DH key exchange process, the public and private keys are not mathematically related, ensuring higher security


参考答案:A, B

第9题:

Which two statements about the Wired Equivalent Privacy (WEP) encryption mechanism are true? ()

  • A、the two methods of authentication using the WEP encryption are open and shared key
  • B、the 802.11 standard defines WEP security using 128-bit keys
  • C、WEP can provide stronger authentication through the use of LEAP, PEAP, or EAP-FAST
  • D、WEP is a scalable encryption solution that uses static keys for authentication
  • E、WEP security provides only one-way authentication
  • F、WEPv2 offers improved encryption by replacing the RC4 encryption mechanism with the AES (symmetric block cipher) mechanism

正确答案:A,E

第10题:

Which two statements about the open and shared key wireless-authentication methods are true?()

  • A、shared key authentication is considered more secure than open authentication
  • B、shared key authentication is considered less secure than open authentication
  • C、if the WEP keys do not match using the open authentication method, the client will not authenticate, associate, and transfer data
  • D、if the WEP keys do not match using the open authentication method, the client will still be able to authenticate and associate, but will not transfer data
  • E、if the WEP keys do not match using the open authentication method, the client will still be able to authenticate, associate, and transfer data

正确答案:B,D

更多相关问题