多項(xiàng)選擇題Which two statements about the open and shared key wireless-authentication methods are true?()

A.shared key authentication is considered more secure than open authentication
B.shared key authentication is considered less secure than open authentication
C.if the WEP keys do not match using the open authentication method, the client will not authenticate, associate, and transfer data
D.if the WEP keys do not match using the open authentication method, the client will still be able to authenticate and associate, but will not transfer data
E.if the WEP keys do not match using the open authentication method, the client will still be able to authenticate, associate, and transfer data


您可能感興趣的試卷

你可能感興趣的試題

2.多項(xiàng)選擇題What are three features of voice traffic on a network?()

A.bursty
B.constant
C.bandwidth intensive
D.small packet sizes
E.time-sensitive
F.retransmittable

4.單項(xiàng)選擇題Which statement is true about the distributed call control in a VoIP network?()

A.the VoIP endpoints have the intelligence to set up and control calls
B.Call setup and control functionality is centralized in one call agent or cluster
C.Call setup and control resides in call agents that are distributed throughout the network
D.Each VoIP device has separate call control, voice packetization, and transport mechanisms

5.單項(xiàng)選擇題What is the purpose of the NBAR protocol discovery?()

A.to build a Packet Description Language Module (PDLM) file to be used in protocol matching
B.to discover applications and build class maps for data classification
C.to look into the TCP or UDP payload and classify packets based on the content
D.to build a database of all application data that passes through the router and queue the data accordingly

最新試題

Which three user interfaces exist for the Cisco WLAN Controllers?()

題型:多項(xiàng)選擇題

In a VoIP network, which type of interface would an analog fax machine connect to?()

題型:單項(xiàng)選擇題

Which statement is true about the Call Admission Control (CAC) feature in VoIP networks?()

題型:單項(xiàng)選擇題

End-to-end QoS is maintained in the Cisco WLAN deployment model by utilizing what parameter in lieu of 802.1p?()

題型:單項(xiàng)選擇題

When Cisco SDM is used to generate QoS policy, various QoS classes will be created and assigned a percentage of the interface bandwidth. Which three statements indicate the default bandwidth values that are assigned by SDM for outgoing traffic on a WAN interface? ()

題型:多項(xiàng)選擇題

Which two characteristics are common between traffic policing and traffic shaping?()

題型:多項(xiàng)選擇題

The Cisco SDM will create a QoS policy that provides services to two types of traffic. Which two statements indicate the default QoS parameters that are created by SDM?()

題型:多項(xiàng)選擇題

When QoS levels in the Cisco Wireless Control System (WCS) are entered, which profile names are used to identify the access categories?()

題型:單項(xiàng)選擇題

Which three functions can an Integrated Services Router perform in a VoIP network?()

題型:多項(xiàng)選擇題

What are two ways to minimize the delay of VoIP packets that are traversing a network? ()

題型:多項(xiàng)選擇題