多项选择题
Which two statements about the Wired Equivalent Privacy (WEP) encryption mechanism are true? ()
A.the two methods of authentication using the WEP encryption are open and shared key
B.the 802.11 standard defines WEP security using 128-bit keys
C.WEP can provide stronger authentication through the use of LEAP, PEAP, or EAP-FAST
D.WEP is a scalable encryption solution that uses static keys for authentication
E.WEP security provides only one-way authentication
F.WEPv2 offers improved encryption by replacing the RC4 encryption mechanism with the AES (symmetric block cipher) mechanism
相关考题
-
单项选择题
Refertotheexhibit.Whatistheconfigurationanexampleof?()
A.enabling modular QoS over Frame Relay
B.enabling Real-Time Transport Protocol (RTP) header compression
C.enabling distributed compressed Transmission Control Protocol
D.enabling latency and jitter reduction for Transmission Control traffic
E.enabling TCP header compression -
单项选择题
WhattypeofservicesareprovidedbytheCiscoIOSgatewaysinaVoIPnetworkwithCiscoCallMangerfunctionality?()
A.Cisco IOS gateways provide services such as address translation and network access control for the devices on the network
B.Cisco IOS gateways provide services such as bandwidth management and accounting
C.Cisco IOS gateways provide media termination and signal translation between the public switched telephone network (PSTN) and IP networks
D.Cisco IOS gateways provide zone management for all registered endpoints in the network -
单项选择题
TheAcmecompanyhasdeterminedthatduringitsbusiesthours,theaveragenumberofinternalVoIPcallsacrosstheWANlinkisfour(4).Sincethisisanaverage,theWANlinkhasbeensizedforsix(6)callswithnocalladmissioncontrol.WhatwillhappenwhenaseventhcallisattemptedacrosstheWANlink?()
A.the seventh call is routed via the PSTN
B.the call is denied and the original six (6) calls remain
C.the call is completed and the first call is dropped
D.the call is completed, but all calls have quality issues
E.the call is completed but the seventh call has quality issues
