儿科护理专业实践能力

多选题What are three security problems with Wi-Fi Protected Access (WPA)?()AWPA is based on the outdated IEEE 802.11i standard.BWPA uses RSN,which uses the same base encryption algorithm as RC4.CWPA requires a hardware upgrade that may not be supported by al

题目
多选题
What are three security problems with Wi-Fi Protected Access (WPA)?()
A

WPA is based on the outdated IEEE 802.11i standard.

B

WPA uses RSN,which uses the same base encryption algorithm as RC4.

C

WPA requires a hardware upgrade that may not be supported by all vendors.

D

WPA uses TKIP,which uses the same base encryption algorithm as WEP.

E

WPA is susceptible to a DoS attack when it receives two packets in quick succession with bad MICs,forcing the AP to shut down the entire Basic Service Set (BSS) for one minute.

F

WPA is susceptible to a security weakness when preshared keys are used.

如果没有搜索结果,请直接 联系老师 获取答案。
如果没有搜索结果,请直接 联系老师 获取答案。
相似问题和答案

第1题:

Which three firewall user authentication objects can be referenced in a security policy? ()(Choose three.)

A. access profile

B. client group

C. client

D. default profile

E. external


参考答案:A, B, C

第2题:

What are three advantages of the Cisco Integrated Services Pouter product family? (Choose three.) ()

  • A、 provides advanced security such as hardware encryption acceleration
  • B、 provides investment protection through increased modularity
  • C、 comes equipped with at least one 1000-based TX interlace
  • D、 contains integrated wireless access using the 802.11 g/b standard
  • E、 contains integrated web-based management tools for easy configuration and maintenance

正确答案:A,D,E

第3题:

●Wi-Fi联盟制定的安全认证方案 WPA(Wi-fi Protected Access)是(66)标准的子集。

(66)

A. IEEE 802.11

B. IEEE 802.11a

C. IEEE 802.11b

D. IEEE 802.11i


正确答案:D

第4题:

Wi-Fi Protected Access was an interim step on the way to the more secure WPA2. What was added in WPA2 to make it more secure?()

  • A、 PEAP
  • B、 EAP-FAST
  • C、 AES encryption
  • D、 Rivest Cipher 4 encryption

正确答案:C

第5题:

What are the three main types of networks that must be considered when defining a security policy?


正确答案:Trusted, untrusted, unknown.

第6题:

Wi-Fi联盟制定的安全认证方案WPA(Wi-Fi Protected Access)是 ( ) 标准的子集。

A.IEEE 802.11
B.IEEE 802.11a
C.IEEE 802.11b
D.IEEE 802.11i

答案:D
解析:
IEEE 802.11i是IEEE 802.11协议标准的扩展,于2004年正式被IEEE通过,取代原来脆弱的WEP加密技术。IEEE 802.11i为使用IEEE 802.11a、IEEE 802.11b和IEEE 802.11g标准的网络提供加密技术和安全认证功能,这样的网络被描述为RSN(Robust Security Network,健壮安全的网络)。

第7题:

Which two statements are true about the Wi-Fi Protected Access (WPA) and Wi-Fi Protected Access version 2 (WPA2) security solutions?()

  • A、both WPA and WPA2 require authentication support via IEEE 802.1 x and Pre-Shared Key (PSK)
  • B、both WPA and WPA2 address all known Wired Equivalent Privacy (WEP) vulnerabilities in the IEEE 802.11i security implementation
  • C、WPA is supported on client devices only. WPA2 is supported on both access point (AP) and client devices
  • D、WPA provides only a standard for authentication. WPA2 provides a standard for authentication and encryption
  • E、WPA requires encryption support via Temporal Key Integrity Protocol (TKIP) WPA2 provides encryption support via (symmetric block cipher)AES-CCMP

正确答案:A,E

第8题:

What are three elements the Junos Pulse Access Control Service uses to establish endpoint access to protected resources?()

A. sign-in policy

B. authentication realms

C. role restrictions

D. policy realms

E. routing policy


参考答案:A, B, C

第9题:

What are three important security issues in any small, medium, or enterprise business organization? ()

  • A、 rapid response time
  • B、 head count
  • C、 connectivity
  • D、 security threats
  • E、 reduced complexity
  • F、 disaster recovery

正确答案:A,D,F

第10题:

What are three security problems with Wi-Fi Protected Access (WPA)?()

  • A、WPA is based on the outdated IEEE 802.11i standard.
  • B、WPA uses RSN,which uses the same base encryption algorithm as RC4.
  • C、WPA requires a hardware upgrade that may not be supported by all vendors.
  • D、WPA uses TKIP,which uses the same base encryption algorithm as WEP.
  • E、WPA is susceptible to a DoS attack when it receives two packets in quick succession with bad MICs,forcing the AP to shut down the entire Basic Service Set (BSS) for one minute.
  • F、WPA is susceptible to a security weakness when preshared keys are used.

正确答案:D,E,F

更多相关问题