WPA is based on the outdated IEEE 802.11i standard.
WPA uses RSN,which uses the same base encryption algorithm as RC4.
WPA requires a hardware upgrade that may not be supported by all vendors.
WPA uses TKIP,which uses the same base encryption algorithm as WEP.
WPA is susceptible to a DoS attack when it receives two packets in quick succession with bad MICs,forcing the AP to shut down the entire Basic Service Set (BSS) for one minute.
WPA is susceptible to a security weakness when preshared keys are used.
第1题:
A. access profile
B. client group
C. client
D. default profile
E. external
第2题:
What are three advantages of the Cisco Integrated Services Pouter product family? (Choose three.) ()
第3题:
●Wi-Fi联盟制定的安全认证方案 WPA(Wi-fi Protected Access)是(66)标准的子集。
(66)
A. IEEE 802.11
B. IEEE 802.11a
C. IEEE 802.11b
D. IEEE 802.11i
第4题:
Wi-Fi Protected Access was an interim step on the way to the more secure WPA2. What was added in WPA2 to make it more secure?()
第5题:
What are the three main types of networks that must be considered when defining a security policy?
第6题:
第7题:
Which two statements are true about the Wi-Fi Protected Access (WPA) and Wi-Fi Protected Access version 2 (WPA2) security solutions?()
第8题:
A. sign-in policy
B. authentication realms
C. role restrictions
D. policy realms
E. routing policy
第9题:
What are three important security issues in any small, medium, or enterprise business organization? ()
第10题:
What are three security problems with Wi-Fi Protected Access (WPA)?()