A. a stronger encryption algorithm
B. key mixing using temporal keys
C. shared key authentication
D. a shorter initialization vector
E. per frame sequence counters
您可能感興趣的試卷
你可能感興趣的試題
A.PPP
B.WAP
C.HDLC
D.MPLS
E.L2TPv3
F.ATM
A. ip default-gateway 0.0.0.0
B. ip route 172.16.2.1 0.0.0.0 0.0.0.0
C. ip default-network 0.0.0.0
D. ip default-route 0.0.0.0 0.0.0.0 172.16.2.1
E. ip route 0.0.0.0 0.0.0.0 172.16.2.1
A. Replace the straight-through cable with a crossover cable.
B. Change the subnet mask of the hosts to /25.
C. Change the subnet mask of the hosts to /26.
D. Change the address of Workstation A to 192.0.2.15.
E. Change the address of Workstation B to 192.0.2.111.
A.113.10.4.0
B.186.54.3.0
C.175.33.3.255
D.26.35.2.255
E.17.35.36.0
A.192.168.5.55
B.192.168.5.47
C.192.168.5.40
D.192.168.5.32
E.192.168.5.14
最新試題
Which statement is true, as relates to classful or classless routing?()
What is the default administrative distance of OSPF?()
A network administrator needs to configure a serial link between the main office and a remote location.The router at the remote office is a non-cisco router. How should the network administrator configure the serial interface of the main office router to make the connection?()
While troubleshooting a network problem,a technician discovers that the current copy of the Cisco IOS is outdated and needs to be updated.Which of the following commands would the technician issue to replace the Cisco router IOS with the newer version?()
What is the subnetwork address for a host with the IP address 201.100.5.68/28?()
If all OSPF routers in a single area are configured with the same priority value,what value dose a router use for the ODPF router ID in the absence of a loopback interface?()
The network administrator cannot to switch 1 over a telnet session,although the hosts attached to switch 1 can ping the interface Fa0/0 of the router.Given the information in the graphic and assuming that the router and switch2 are configured properly,which of the following commands should be issued on switch 1 to correct this problem?()
Which name describes an IPV6 host-enable tunneling technique that uses IPV4 UDP,does not require dedicated gateway tunnels,and can pass through existing IPV4 NAT gateways?()
Three access ports have been installed and configured to a small office.What term defines the wireless topology?()
Which statement describes the rule of split horizon?()