key mixing
AES-based encryption
anti-replay sequence counter
message integrity check
cyclic redundancy check
第1题:
A.a stronger encryption algorithm
B.key mixing using temporal keys
C.shared key authentication
D.a shorter initialization vector
E.per frame sequence counters
第2题:
中国自主研发的802.11安全机制标准的名称是()。
第3题:
S10系列手机支持新一代WiFi6标准,基于()协议标准,速度更快连接更稳定。
第4题:
Which algorithms did TKIP add to the 802.11 specification? ()
第5题:
If there is an existing 802.11g WLAN at a site, which service can be provided without conducting anew site survey?()
第6题:
Which of the following is a WiFi device? ()
第7题:
CCMP以及TKIP是Wlan中哪个协议标准里包含的内容()
第8题:
Which two statements best describe enhanced wireless security encryption?()
第9题:
802.11n
802.11g
802.11b
802.11a
第10题:
55 BC
54 BC
54 AD
43 AD
第11题:
802.11a
802.11b
802.11g
802.11n
第12题:
IEEE802.11h
IEEE802.11i
IEEE802.11x
IEEE802.11s
第13题:
在802.11i标准中,需要通过硬件实现加密的协议是(),所以,此协议需要网卡硬件支持。
第14题:
在802.11i标准中,需要通过硬件实现加密的协议是(),所以,需要网卡硬件支持
第15题:
Which two features did WPAv1 add to address the inherent weaknesses found in WEP?()
第16题:
Which encryption type does WPA2 use?()
第17题:
Which of the following protocols is the LEAST secure and should be avoided on a wireless network?()
第18题:
IEEE802.11i标准中主要包含的加密技术和认证协议包括()
第19题:
Which two wireless security statements are true?()
第20题:
Only symmetric algorithms have a key exchange technology built in
Asymmetric algorithms are used quite often as key exchange protocols for symmetricalgorithms
Only asymmetric algorithms have a key exchange technology built in
Asymmetric algorithms are based on more complex mathematical computations
第21题:
EVDO PCMCIA modem card
floppy disk drive add-in card
802.11g PCMCIA card
56K v.34 PCMCIA modem card
第22题:
a stronger encryption algorithm
key mixing using temporal keys
shared key authentication
a shorter initialization vector
per frame sequence counters
第23题:
802.11a
802.11b
802.11g
802.11n