A.TKIP protects RC4 encryption keys
B.CKIP and TKIP protect AES encryption keys
C.TKIP encryption is more processor intensive than AES encryption is
D.WPA requires TKIP encryption, whereas WPA2 supports AES encryption
E.WPA requires AES encryption, whereas WPA2 supports TKIP encryption
您可能感興趣的試卷
你可能感興趣的試題
A.a set of rules that can be established and associated with the ingress and egress ports of the control plane
B.improves performance of the control plane by marking control plane packets with DSCPEF
C.protects the control plane on a router from DoS attacks
D.treats the control plane as a separate entity with its own ingress (input) and egress (output) ports
E.provides the control plane with a separate token bucket
F.enhances security of the control plane by tunneling packets to and from the control plane
A.both WPA and WPA2 require authentication support via IEEE 802.1 x and Pre-Shared Key (PSK)
B.both WPA and WPA2 address all known Wired Equivalent Privacy (WEP) vulnerabilities in the IEEE 802.11i security implementation
C.WPA is supported on client devices only. WPA2 is supported on both access point (AP) and client devices
D.WPA provides only a standard for authentication. WPA2 provides a standard for authentication and encryption
E.WPA requires encryption support via Temporal Key Integrity Protocol (TKIP) WPA2 provides encryption support via (symmetric block cipher)AES-CCMP
A.WCS
B.WLSE
C.Location Appliance
D.WDS
E.WLSE-Express
A.set a minimum bandwidth guarantee
B.increase bandwidth
C.determine a specific transfer rate
D.establish timers
E.configure CBWFQ for best-effort traffic
F.set a maximum bandwidth limit
A.synchronizes FIFO, PQ, CQ, and MDRR, with WFQ, CBWFQ, and LLQ
B.enables strict priority queuing for voice traffic, and weighted round robin queuing for data traffic
C.enables low latency queuing to ensure that voice traffic receives priority treatment
D.enforces a trust boundary on switch access ports and uplinks/downlinks
E.modifies queue sizes as well as queue weights where required
F.adjusts link speeds to adapt to QoS needs
A.class-based policing is configured using the Modular QoS command-line (MQC)
B.only the Frame Relay traffic-shaping (FRTS) mechanism can interact with a Frame Relay network, adapting to indications of Layer2 congestion in the WAN links
C.Distributed Traffic Shaping (DTS) is configured with the police command under the policy map configuration
D.both Frame Relay traffic shaping (FRTS) and virtual IP (VIP)-based Distributed Traffic Shaping (DTS) have the ability to mark traffic
A.serialization delay
B.end-to-end delay
C.lack of bandwidth
D.inconsistent port costs
E.routing table convergence issues
F.poor file transfer rates
A.video conferencing traffic tends to be much more bursty in nature and is more prone to have an impact on other traffic flows
B.latency requirements are less stringent for video traffic than for voice traffic
C.video traffic is less sensitive to dropped packets than for voice traffic
D.video traffic requires the retransmission capabilities of TCP whereas voice uses UDP
E.video traffic tends to be much more bursty in nature and is more prone to have an impact on other traffic flows
F.voice traffic requires the retransmission capabilities of TCP whereas video uses UDP
A.the two steps of digital to analog conversion are decompression and reconstruction of the analog signal
B.the two steps of digital to analog conversion are decoding and filtering
C.the two steps of digital to analog conversion are decompression and filtering of the analog signal
D.the two steps of digital to analog conversion are quantization and decoding
A.Choose Configure >Access_Point, then enter the AP MAC address
B.Choose Configure >Access_Point, then enter the IP address of the AP
C.Wait until the WLC downloads its code from the WCS and choose the access point from the list under the WLC option of the Configure menu
D.Wait until the AP downloads its code from the WCS and choose the access point from the list under the Access_Point option of the Configure menu
最新試題
Which three benefits are realized by implementing Wireless LAN Solution Engine (WLSE)?()
What is the term that is used to describe the process of converting a signal from digital to analog?()
For delay sensitive traffic, what are the three best ways that are used to prevent packet loss? ()
When QoS levels in the Cisco Wireless Control System (WCS) are entered, which profile names are used to identify the access categories?()
Which statement is true about the Call Admission Control (CAC) feature in VoIP networks?()
Which two QoS classification and marking statements are true? ()
Which two functions can be provided by an Integrated Services Router (ISR) in a VoIP network?()
Which two characteristics are common between traffic policing and traffic shaping?()
What are three factors used to determine the amount of bandwidth that is required for a single VoIP call? ()
Which two statements about the Wi-Fi Multimedia (WMM) standard are true?()