多項(xiàng)選擇題Which two statements about the open and shared key wireless-authentication methods are true? ()

A. Shared key authentication is considered more secure than open authentication.
B. Shared key authentication is considered less secure than open authentication.
C. If the WEP keys do not match using the open authentication method, the client will not authenticate, associate, and transfer data.
D. If the WEP keys do not match using the open authentication method, the client will still be able to authenticate and associate, but will not transfer data.
E. If the WEP keys do not match using the open authentication method, the client will still be able to authenticate, associate, and transfer data.


您可能感興趣的試卷

你可能感興趣的試題

1.多項(xiàng)選擇題What are two features of WCS wireless management? ()

A. centralized management for autonomous access points
B. centralized management for lightweight access points
C. integration with the Location Appliance to expand real time tracking to 1500 devices for 30 days
D. integration with the Location Appliance to expand real time tracking to 2500 devices for 15 days
E. the inclusion of an integrated AAA server
F. an external AAA-server requirement

2.多項(xiàng)選擇題What are two features of WLSE-Express wireless management? ()

A. centralized management for autonomous access points
B. centralized management for lightweight access points
C. centralized management that requires an external AAA server
D. centralized management with integrated AAA server
E. integration with the Location Appliance to expand real time tracking to 1500 devices for 30 days
F. integration with the Location Appliance to expand real time tracking to 2500 devices for 30 days

3.多項(xiàng)選擇題When a router converts analog signals to digital signals, what three steps are always included in the process? ()

A. involution
B. encoding
C. sampling
D. quantization
E. compression
F. companding

4.單項(xiàng)選擇題Which statement is true about the comparison of voice traffic with video traffic?()

A. Video conferencing traffic tends to be much more bursty in nature and is more prone to have an impact on other traffic flows.
B. Latency requirements are less stringent for video traffic than for voice traffic.
C. Video traffic is less sensitive to dropped packets than for voice traffic.
D. Video traffic requires the retransmission capabilities of TCP whereas voice uses UDP.
E. Voice traffic tends to be much more bursty in nature and is more prone to have an impact on other traffic flows.
F. Voice traffic requires the retransmission capabilities of TCP whereas video uses UDP.

5.多項(xiàng)選擇題What are two steps needed to define a QoS policy for a traffic class?()

A. Determine a minimum bandwidth guarantee.
B. Determine interfaces to which to apply policy.
C. Assign priorities to the class.
D. Configure access control lists.

最新試題

What are two ways to minimize the delay of VoIP packets that are traversing a network? ()

題型:多項(xiàng)選擇題

When Cisco SDM is used to generate QoS policy, various QoS classes will be created and assigned a percentage of the interface bandwidth. Which three statements indicate the default bandwidth values that are assigned by SDM for outgoing traffic on a WAN interface? ()

題型:多項(xiàng)選擇題

Which two QoS classification and marking statements are true? ()

題型:多項(xiàng)選擇題

In the design of a QoS solution, which two factors should be taken into consideration?()

題型:多項(xiàng)選擇題

Which set of classes correctly identifies the four traffic classes, from highest priority to lowest priority, specified in the 802.11e standard?()

題型:?jiǎn)雾?xiàng)選擇題

Which three functions can an Integrated Services Router perform in a VoIP network?()

題型:多項(xiàng)選擇題

In a VoIP network, which type of interface would an analog fax machine connect to?()

題型:?jiǎn)雾?xiàng)選擇題

Which two VoIP capabilities are utilized when the CallManager and the gateway are configured for Survivable Remote Site Telephony?()

題型:多項(xiàng)選擇題

What are two reasons to implement H·323 gatekeepers?()

題型:多項(xiàng)選擇題

Which two statements are true about Voice over IP (VoIP) packet delivery in a digital infrastructure? ()

題型:多項(xiàng)選擇題