A.both WPA and WPA2 require authentication support via IEEE 802.1 x and Pre-Shared Key (PSK)
B.both WPA and WPA2 address all known Wired Equivalent Privacy (WEP) vulnerabilities in the IEEE 802.11i security implementation
C.WPA is supported on client devices only. WPA2 is supported on both access point (AP) and client devices
D.WPA provides only a standard for authentication. WPA2 provides a standard for authentication and encryption
E.WPA requires encryption support via Temporal Key Integrity Protocol (TKIP) WPA2 provides encryption support via (symmetric block cipher)AES-CCMP
您可能感興趣的試卷
你可能感興趣的試題
A.WCS
B.WLSE
C.Location Appliance
D.WDS
E.WLSE-Express
A.set a minimum bandwidth guarantee
B.increase bandwidth
C.determine a specific transfer rate
D.establish timers
E.configure CBWFQ for best-effort traffic
F.set a maximum bandwidth limit
A.synchronizes FIFO, PQ, CQ, and MDRR, with WFQ, CBWFQ, and LLQ
B.enables strict priority queuing for voice traffic, and weighted round robin queuing for data traffic
C.enables low latency queuing to ensure that voice traffic receives priority treatment
D.enforces a trust boundary on switch access ports and uplinks/downlinks
E.modifies queue sizes as well as queue weights where required
F.adjusts link speeds to adapt to QoS needs
A.class-based policing is configured using the Modular QoS command-line (MQC)
B.only the Frame Relay traffic-shaping (FRTS) mechanism can interact with a Frame Relay network, adapting to indications of Layer2 congestion in the WAN links
C.Distributed Traffic Shaping (DTS) is configured with the police command under the policy map configuration
D.both Frame Relay traffic shaping (FRTS) and virtual IP (VIP)-based Distributed Traffic Shaping (DTS) have the ability to mark traffic
A.serialization delay
B.end-to-end delay
C.lack of bandwidth
D.inconsistent port costs
E.routing table convergence issues
F.poor file transfer rates
最新試題
What is the term that is used to describe the process of converting a signal from digital to analog?()
Which two characteristics are common between traffic policing and traffic shaping?()
Which three practices are important to the implementation of a DiffServ QoS architecture?()
What are two ways to minimize the delay of VoIP packets that are traversing a network? ()
Which three user interfaces exist for the Cisco WLAN Controllers?()
In the design of a QoS solution, which two factors should be taken into consideration?()
When deploying a Cisco Wireless Control System (WCS) with the 2700 series location appliance, to within what range is on-demand location of rogue APs possible?()
What are three factors used to determine the amount of bandwidth that is required for a single VoIP call? ()
What is an advantage of the IntServ QoS model?()
What are the three models of quality of service (QoS) in a network?()