多选题Which algorithms did TKIP add to the 802.11 specification? ()Akey mixingBAES-based encryptionCanti-replay sequence counterD message integrity checkEcyclic redundancy check

题目
多选题
Which algorithms did TKIP add to the 802.11 specification? ()
A

key mixing

B

AES-based encryption

C

anti-replay sequence counter

D

 message integrity check

E

cyclic redundancy check


相似考题
更多“Which algorithms did TKIP add to the 802.11 specification? (”相关问题
  • 第1题:

    Which two features did WPAv1 add to address the inherent weaknesses found in WEP?()

    A.a stronger encryption algorithm

    B.key mixing using temporal keys

    C.shared key authentication

    D.a shorter initialization vector

    E.per frame sequence counters


    参考答案:B, E

  • 第2题:

    中国自主研发的802.11安全机制标准的名称是()。

    • A、WPA
    • B、WAPI
    • C、MD5
    • D、TKIP

    正确答案:B

  • 第3题:

    S10系列手机支持新一代WiFi6标准,基于()协议标准,速度更快连接更稳定。

    • A、802.11ac
    • B、802.11n
    • C、802.11ad
    • D、802.11ax

    正确答案:D

  • 第4题:

    Which algorithms did TKIP add to the 802.11 specification? ()

    • A、 key mixing
    • B、 AES-based encryption
    • C、 anti-replay sequence counter
    • D、 message integrity check
    • E、 cyclic redundancy check

    正确答案:A,C,D

  • 第5题:

    If there is an existing 802.11g WLAN at a site, which service can be provided without conducting anew site survey?()

    • A、Add a new 802.11a WLAN
    • B、Increase the Layer 2 and Layer 3 security of the WLAN
    • C、Increase the throughput for the wireless clients
    • D、Add new services (such as voice) over the WLAN

    正确答案:B

  • 第6题:

    Which of the following is a WiFi device? ()

    • A、EVDO PCMCIA modem card
    • B、floppy disk drive add-in card
    • C、802.11g PCMCIA card
    • D、56K v.34 PCMCIA modem card

    正确答案:C

  • 第7题:

    CCMP以及TKIP是Wlan中哪个协议标准里包含的内容()

    • A、IEEE802.11h
    • B、IEEE802.11i
    • C、IEEE802.11x
    • D、IEEE802.11s

    正确答案:B

  • 第8题:

    Which two statements best describe enhanced wireless security encryption?()

    • A、TKIP protects RC4 encryption keys
    • B、CKIP and TKIP protect AES encryption keys
    • C、TKIP encryption is more processor intensive than AES encryption is
    • D、WPA requires TKIP encryption, whereas WPA2 supports AES encryption
    • E、WPA requires AES encryption, whereas WPA2 supports TKIP encryption

    正确答案:A,D

  • 第9题:

    单选题
    Which of the following has a maximum data rate of 11Mbps?()
    A

    802.11n

    B

    802.11g

    C

    802.11b

    D

    802.11a


    正确答案: D
    解析: 暂无解析

  • 第10题:

    单选题
    In which of the following years did Julius Caesar invade Britain?
    A

    55 BC

    B

    54 BC

    C

    54 AD

    D

    43 AD


    正确答案: A
    解析:
    Julius Caesar凯撒,罗马共和国末期独裁统治者、政治家、军事统帅;他于公元前55年入侵英国。

  • 第11题:

    单选题
    Which of the following wireless networking standards can operate at two different frequenciessimultaneously?()
    A

    802.11a

    B

    802.11b

    C

    802.11g

    D

    802.11n


    正确答案: D
    解析: 暂无解析

  • 第12题:

    单选题
    CCMP以及TKIP是Wlan中哪个协议标准里包含的内容()
    A

    IEEE802.11h

    B

    IEEE802.11i

    C

    IEEE802.11x

    D

    IEEE802.11s


    正确答案: B
    解析: 暂无解析

  • 第13题:

    在802.11i标准中,需要通过硬件实现加密的协议是(),所以,此协议需要网卡硬件支持。

    • A、WEP
    • B、AES
    • C、PSK
    • D、TKIP

    正确答案:B

  • 第14题:

    在802.11i标准中,需要通过硬件实现加密的协议是(),所以,需要网卡硬件支持

    • A、WEP
    • B、AES
    • C、PSK
    • D、TKIP

    正确答案:B

  • 第15题:

    Which two features did WPAv1 add to address the inherent weaknesses found in WEP?()

    • A、a stronger encryption algorithm
    • B、key mixing using temporal keys
    • C、shared key authentication
    • D、a shorter initialization vector
    • E、per frame sequence counters

    正确答案:B,E

  • 第16题:

    Which encryption type does WPA2 use?()

    • A、AES-CCMP
    • B、PPK via IV
    • C、PSK
    • D、TKIP/MIC

    正确答案:A

  • 第17题:

    Which of the following protocols is the LEAST secure and should be avoided on a wireless network?()

    • A、WEP
    • B、PEAP
    • C、WPA
    • D、TKIP

    正确答案:A

  • 第18题:

    IEEE802.11i标准中主要包含的加密技术和认证协议包括()

    • A、EAP-TLS
    • B、TKIP(Temporalkeyintegrityprotocol)
    • C、AES(AdvancedencryptionStandarD.
    • D、IEEE802.1x

    正确答案:A,B

  • 第19题:

    Which two wireless security statements are true?()

    • A、A TACACS+ server is required to implement 802.1x.
    • B、MIC protects against man-in-the-middle and replay attacks.
    • C、The 802.1x standard provides encryption services for wireless clients.
    • D、The AES (symmetric block cipher) is specified in the IEEE 802.11i specification.
    • E、The IEEE 802.11i specification uses RC4 as its encryption mechanism.
    • F、WPA requires TKIP and AES as encryption methods.

    正确答案:B,D

  • 第20题:

    多选题
    Which three are distinctions between asymmetric and symmetric algorithms? ()
    A

    Only symmetric algorithms have a key exchange technology built in

    B

    Asymmetric algorithms are used quite often as key exchange protocols for symmetricalgorithms

    C

    Only asymmetric algorithms have a key exchange technology built in

    D

    Asymmetric algorithms are based on more complex mathematical computations


    正确答案: C,A
    解析: 暂无解析

  • 第21题:

    单选题
    Which of the following is a WiFi device? ()
    A

    EVDO PCMCIA modem card

    B

    floppy disk drive add-in card

    C

    802.11g PCMCIA card

    D

    56K v.34 PCMCIA modem card


    正确答案: D
    解析: 暂无解析

  • 第22题:

    多选题
    Which two features did WPAv1 add to address the inherent weaknesses found in WEP?()
    A

    a stronger encryption algorithm

    B

    key mixing using temporal keys

    C

    shared key authentication

    D

    a shorter initialization vector

    E

    per frame sequence counters


    正确答案: B,E
    解析: 暂无解析

  • 第23题:

    单选题
    Which of the following wireless standards has a transfer speed of 11 Mbps?()
    A

    802.11a

    B

    802.11b

    C

    802.11g

    D

    802.11n


    正确答案: B
    解析: 暂无解析