Authentication Proxy
802.1X
Context-Based Access Control
Intrusion Detection System
Stateful firewall
第1题:
A.It specifies use of a static encryption key that must be changed frequently to enhance security
B.It requires use of an open authentication method
C.It specifies the use of dynamic encryption keys that change each time a client establishes a connection
D.It requires that all access points and wireless devices use the same encryption key
E.It includes authentication by PSK
第2题:
The most important features in the growth of American economy in the early 20th cenruty were()
Athe use of steam and electricity as chief energy,the development of lare corporation and the development of railway
Bthe development of large corporation,urbanization and the employment in production of new technology
Cthe appearance of airplane,the use of electricity on a large scale and urbanization
Dthe rapid development of industry,railway and large cities
第3题:
(A)in
(B) about
(C) with
(D) for
正确答案:C
解答参考:C此题考察词组搭配be concerned about 关心,担心;be concerned with 与……有关,忙于 【译文】有四个人在管儿童教育方面的事。
第4题:
A large corporation is concerned about the amount of time it takes to back up their main file server. They are also concerned that their IT technician frequently forgets to change the backup tapes, thereby leaving the company open to data loss. Which backup system would solve both problems?()
第5题:
Which two features or capabilities are valid options for both an Autonomous WLAN solution and a Lightweight WLAN solution? ()
第6题:
第7题:
The most important features in the growth of American economy in the early 20th cenruty were()
第8题:
Two buildings on the San Jose campus of a small company must be connected to use Ethernet with a bandwidth of at least 100 Mbps. The company is concerned about possible problems from voltage potential differences between the two buildings. Which media type should be used for the connection()。
A.UTP cable
B.STP cable
C.coaxial cable
D.fiber optic cable
第9题:
In which of the following scenarios would MAC filtering be MOST effective as a part of wireless security? ()
第10题:
An administrator is concerned about users utilizing the company's wireless signal with their personal laptops. Which of the following is the BEST method to use to prevent unauthorized devices from using the company's wireless network?()