多项选择题
Which two statements about the open and shared key wireless-authentication methods are true? ()
A. Shared key authentication is considered more secure than open authentication.
B. Shared key authentication is considered less secure than open authentication.
C. If the WEP keys do not match using the open authentication method, the client will not authenticate, associate, and transfer data.
D. If the WEP keys do not match using the open authentication method, the client will still be able to authenticate and associate, but will not transfer data.
E. If the WEP keys do not match using the open authentication method, the client will still be able to authenticate, associate, and transfer data.
相关考题
-
多项选择题
WhataretwofeaturesofWCSwirelessmanagement?()
A. centralized management for autonomous access points
B. centralized management for lightweight access points
C. integration with the Location Appliance to expand real time tracking to 1500 devices for 30 days
D. integration with the Location Appliance to expand real time tracking to 2500 devices for 15 days
E. the inclusion of an integrated AAA server
F. an external AAA-server requirement -
多项选择题
WhataretwofeaturesofWLSE-Expresswirelessmanagement?()
A. centralized management for autonomous access points
B. centralized management for lightweight access points
C. centralized management that requires an external AAA server
D. centralized management with integrated AAA server
E. integration with the Location Appliance to expand real time tracking to 1500 devices for 30 days
F. integration with the Location Appliance to expand real time tracking to 2500 devices for 30 days -
多项选择题
Whenarouterconvertsanalogsignalstodigitalsignals,whatthreestepsarealwaysincludedintheprocess?()
A. involution
B. encoding
C. sampling
D. quantization
E. compression
F. companding
