單項選擇題Wi-Fi Protected Access was an interim step on the way to the more secure WPA2. What was added in WPA2 to make it more secure?()

A. PEAP
B. EAP-FAST
C. AES encryption
D. Rivest Cipher 4 encryption


您可能感興趣的試卷

你可能感興趣的試題

1.多項選擇題Which two of these statements best describe fast secure roaming for the wireless core feature set using autonomous access points? (Choose two.) ()

A. It is compatible with all wireless clients.
B. It reduces roaming latency through reduced client RF channel scanning enhancements.
C. It reduces roaming latency to targeted times of less than 75ms.
D. Roaming occurs without reauthentication through a centralized RADIUS server.
E. It is enabled through WLSE deployment.

2.單項選擇題Which Cisco SDM feature allows you to specify whether you want SDM files installed on your PC or on your router?()  

A. Install Shield Wizard
B. Cisco SDM Express Wizard
C. Cisco SDM Image Manager
D. Create Connection Wizard

5.單項選擇題What is one benefit of the Cisco anti-X defense strategy?()

A. applications security
B. virtual firewall protection
C. security events correlation for proactive response
D. malware, virus, and worm mitigation

最新試題

Which Cisco security tool can best determine it a Cisco ISR router is properly secured? ()

題型:單項選擇題

Which two of these statements best describe fast secure roaming? (Choose two.)()  

題型:多項選擇題

Which two of these statements best describe the benefits of WPAv1? ()

題型:多項選擇題

Which of these is a benefit of an integrated security management system?  ()

題型:單項選擇題

After properly configuring multiple VLANs, an administrator has decided to secure its VLAN network. Which three steps are required to secure this environment? (Choose three.)()

題型:多項選擇題

At which stage of the Cisco Lifecycle Services approach should customer education presentations occur? ()

題型:單項選擇題

What are three benefits of the Cisco Adaptive Threat Defense strategy? (Choose three.) ()

題型:多項選擇題

Which tools on Cisco.com could you use to plan for correct Cisco lOS images to support a customer’s security design and requirements? (Choose two.)()

題型:多項選擇題

What is one reason you might recommend a solution using only autonomous access points to a customer? ()

題型:單項選擇題

Which Cisco PIX and ASA feature provides reliable, comprehensive security against virus and worm propagation, as well as data theft?  ()

題型:單項選擇題