多项选择题
What are three security problems with Wi-Fi Protected Access (WPA)?()
A.WPA is based on the outdated IEEE 802.11i standard.
B.WPA uses RSN,which uses the same base encryption algorithm as RC4.
C.WPA requires a hardware upgrade that may not be supported by all vendors.
D.WPA uses TKIP,which uses the same base encryption algorithm as WEP.
E.WPA is susceptible to a DoS attack when it receives two packets in quick succession with bad MICs,forcing the AP to shut down the entire Basic Service Set (BSS) for one minute.
F.WPA is susceptible to a security weakness when preshared keys are used.
相关考题
-
单项选择题
Refer to the exhibit. What variation of the 802.1x Extensible Authentication Protocol (EAP) uses this authentication process?()
A.LEAP
B.EAP-FAST
C.PEAP
D.EAP-TLS -
多项选择题
Whichthreestatementsaboutend-to-enddelayaretrue?()
A.End-to-end delay is the sum of propagation delays,processing delays,serialization delays,and queuing delays.
B.Coast-to-coast end-to-end delay over an optical link is about 20 ms.
C.Processing delay depends on various factors,which include CPU speed,CPU utilization,IP switching mode, and router architecture.
D.Propagation and serialization delays are related to the media.
E.Propagation delay is the time it takes to transmit a packet and is measured in bits-per-second (bps).
F.Serialization delay is the time it takes for a router to take the packet from an input interface and put it into the output queue of the output interface. -
多项选择题
Tohavethebestpossiblevoicequalityandtoutilizeeffectivelytheavailablebandwidth,whichqueuingandcompressionmechanismsneedtobeused?()
A.class-based weighted fair queuing (CBWFQ)
B.low latency queuing (LLQ)
C.priority queuing (PQ) or custom queuing (CQ)
D.Real-Time Transport Protocol (RTP) header compression
E.TCP header compression
F.UDP header compression
