A.TKIP protects RC4 encryption keys
B.CKIP and TKIP protect AES encryption keys
C.TKIP encryption is more processor intensive than AES encryption is
D.WPA requires TKIP encryption, whereas WPA2 supports AES encryption
E.WPA requires AES encryption, whereas WPA2 supports TKIP encryption
您可能感興趣的試卷
你可能感興趣的試題
A.a set of rules that can be established and associated with the ingress and egress ports of the control plane
B.improves performance of the control plane by marking control plane packets with DSCPEF
C.protects the control plane on a router from DoS attacks
D.treats the control plane as a separate entity with its own ingress (input) and egress (output) ports
E.provides the control plane with a separate token bucket
F.enhances security of the control plane by tunneling packets to and from the control plane
A.both WPA and WPA2 require authentication support via IEEE 802.1 x and Pre-Shared Key (PSK)
B.both WPA and WPA2 address all known Wired Equivalent Privacy (WEP) vulnerabilities in the IEEE 802.11i security implementation
C.WPA is supported on client devices only. WPA2 is supported on both access point (AP) and client devices
D.WPA provides only a standard for authentication. WPA2 provides a standard for authentication and encryption
E.WPA requires encryption support via Temporal Key Integrity Protocol (TKIP) WPA2 provides encryption support via (symmetric block cipher)AES-CCMP
A.WCS
B.WLSE
C.Location Appliance
D.WDS
E.WLSE-Express
A.set a minimum bandwidth guarantee
B.increase bandwidth
C.determine a specific transfer rate
D.establish timers
E.configure CBWFQ for best-effort traffic
F.set a maximum bandwidth limit
A.synchronizes FIFO, PQ, CQ, and MDRR, with WFQ, CBWFQ, and LLQ
B.enables strict priority queuing for voice traffic, and weighted round robin queuing for data traffic
C.enables low latency queuing to ensure that voice traffic receives priority treatment
D.enforces a trust boundary on switch access ports and uplinks/downlinks
E.modifies queue sizes as well as queue weights where required
F.adjusts link speeds to adapt to QoS needs
最新試題
When Cisco SDM is used to generate QoS policy, various QoS classes will be created and assigned a percentage of the interface bandwidth. Which three statements indicate the default bandwidth values that are assigned by SDM for outgoing traffic on a WAN interface? ()
When deploying a Cisco Wireless Control System (WCS) with the 2700 series location appliance, to within what range is on-demand location of rogue APs possible?()
Which two commands should be entered on a WLAN controller to remove any residual configuration?()
Which set of classes correctly identifies the four traffic classes, from highest priority to lowest priority, specified in the 802.11e standard?()
Which three functions are associated with a Cisco Unified CallManager? ()
What are the three models of quality of service (QoS) in a network?()
Which two statements are correct about the signaling methods that are utilized for transmitting voice? ()
Which three functions can an Integrated Services Router perform in a VoIP network?()
What are two reasons to implement H·323 gatekeepers?()
Which three user interfaces exist for the Cisco WLAN Controllers?()