多項選擇題What are three security problems with Wi-Fi Protected Access (WPA)?()

A.WPA is based on the outdated IEEE 802.11i standard.
B.WPA uses RSN,which uses the same base encryption algorithm as RC4.
C.WPA requires a hardware upgrade that may not be supported by all vendors.
D.WPA uses TKIP,which uses the same base encryption algorithm as WEP.
E.WPA is susceptible to a DoS attack when it receives two packets in quick succession with bad MICs,forcing the AP to shut down the entire Basic Service Set (BSS) for one minute.
F.WPA is susceptible to a security weakness when preshared keys are used.


您可能感興趣的試卷

你可能感興趣的試題

2.多項選擇題Which three statements about end-to-end delay are true?()

A.End-to-end delay is the sum of propagation delays,processing delays,serialization delays,and queuing delays.
B.Coast-to-coast end-to-end delay over an optical link is about 20 ms.
C.Processing delay depends on various factors,which include CPU speed,CPU utilization,IP switching mode, and router architecture.
D.Propagation and serialization delays are related to the media.
E.Propagation delay is the time it takes to transmit a packet and is measured in bits-per-second (bps).
F.Serialization delay is the time it takes for a router to take the packet from an input interface and put it into the output queue of the output interface.

3.多項選擇題To have the best possible voice quality and to utilize effectively the available bandwidth, which queuing and compression mechanisms need to be used?()

A.class-based weighted fair queuing (CBWFQ)
B.low latency queuing (LLQ)
C.priority queuing (PQ) or custom queuing (CQ)
D.Real-Time Transport Protocol (RTP) header compression
E.TCP header compression
F.UDP header compression

4.多項選擇題

Refer to the exhibit. Both routers have been configured as VoIP gateways. They must also support traditional telephony devices to connect to analog telephones. Which two configuration changes would correctly support the voice requirements?()

A.On each router, under the dial-peer voice 1 pots configuration, add the port fa0/0 command.
B.On each router, under the dial-peer voice 1 pots configuration, add the port 1/0/0 command.
C.On each router, configure dial-peer voice 1 as a voip connection and configure dial-peer voice 2 as a pots connection.
D.Under the dial-peer voice 1 pots configuration, change the destination pattern of 1111 to 2222 on the R1 router, and 2222 to 1111 on the R2 router.
E.Under the dial-peer voice 2 voip configuration, change the destination pattern of 1111 to 2222 on the R1 router, and 2222 to 1111 on the R2 router.
F.Under the dial-peer voice 2 voip configuration, change the destination target address of 10.2.2.2 to 10.1.1.1 on the R1 router, and the destination target address of 10.1.1.1 to 10.2.2.2 on the R2 router.

最新試題

Which set of classes correctly identifies the four traffic classes, from highest priority to lowest priority, specified in the 802.11e standard?()

題型:單項選擇題

Which three functions are associated with a Cisco Unified CallManager? ()

題型:多項選擇題

Which Control Plane Policing (CoPP) statement is true?()

題型:單項選擇題

What can be used to maintain the voice quality on a link by limiting the number of calls that can be active at any given time?()

題型:單項選擇題

When QoS levels in the Cisco Wireless Control System (WCS) are entered, which profile names are used to identify the access categories?()

題型:單項選擇題

When deploying a Cisco Wireless Control System (WCS) with the 2700 series location appliance, to within what range is on-demand location of rogue APs possible?()

題型:單項選擇題

In a VoIP network, which type of interface would an analog fax machine connect to?()

題型:單項選擇題

Within the WMM policy, how many default QoS radio access categories are there?()

題型:單項選擇題

Which two VoIP capabilities are utilized when the CallManager and the gateway are configured for Survivable Remote Site Telephony?()

題型:多項選擇題

The Cisco SDM will create a QoS policy that provides services to two types of traffic. Which two statements indicate the default QoS parameters that are created by SDM?()

題型:多項選擇題