更多"Which two features did WPAv1 add to"的相关试题:
[多项选择]Which two features did WPAv1 add to address the inherent weaknesses found in WEP?()
A. a stronger encryption algorithm
B. key mixing using temporal keys
C. shared key authentication
D. a shorter initialization vector
E. per frame sequence counters
[多项选择]When a DHCP server is configured, which two IP addresses should never be assignable to hosts?()
A. network or subnetwork IP address
B. broadcast address on the network
C. IP address leased to the LAN
D. IP address used by the interfaces
E. manually assigned address to the clients
F. designated IP address to the DHCP server
[多项选择]Which are the two options to which a menu can be assigned?() (Choose two.)
A. menu
B. functions
C. data group
D. responsibility
E. functional group
[多项选择]Which are the two prerequisites before setting up Flashback Data Archive? ()(Choose two.)
A. Flash recovery area must be defined
B. Undo retention guarantee must be enabled.
C. Database must be running in archivelog mode.
D. Automatic undo management must be enabled.
E. The tablespace in which the Flashback Data Archive is created must have automatic segment space Management (ASSM).
[单项选择]Which of the two events listed occurs simultaneously in a two-stroke/cycle diesel engine?()
A. Exhaust and scavenging
B. Scavenging and compression
C. Ignition and expansion
D. Exhaust and compression
[多项选择]Which statement describe two of the benefits of VLAN Trunking Protocol?()
A. VTP allows routing between VLANs.
B. VTP allows a single switch port to carry information to more than one VLAN.
C. VTP allows physically redundant links while preventing switching loops.
D. VTP simplifies switch administration by allowing switches to automatically share VLAN configuration information.
E. VTP helps to limit configuration errors by keeping VLAN naming consistent across the VTP domain.
F. VTP enhances security by preventing unauthorized hosts from connecting to the VTP domain.
[多项选择]Which statements describe two of the benefits of VLAN Trunking Protocol?()
A. VTP allows routing between VLANs.
B. VTP allows a single switch port to carry information to more than one VLAN.
C. VTP allows physically redundant links while preventing switching loops.
D. VTP simplifies switch administration by allowing switches to automatically share VLAN configuration information.
E. VTP helps to limit configuration errors by keeping VLAN naming consistent across the VTP domain.
F. VTP enhances security by preventing unauthorized hosts from connecting to the VTP domain.
[多项选择]Which two of these statements are true of IPv6 address representation? ()
A. There are four types of IPv6 addresses: unicast, multicast, anycast, and broadcast.
B. A single interface may be assigned multiple IPv6 addresses of any type.
C. Every IPv6 interface contains at least one loopback address.
D. The first 64 bits represent the dynamically created interface ID.
E. Leading zeros in an IPv6 16 bit hexadecimal field are mandatory.
[单项选择]Which one of two crossing power-driven vessels has the right of way in a fog().
A. Both vessels
B. Neither vessel
C. The vessel on portside
D. The vessel on starboard side
[单项选择]Which are the two main uses of a VIO server?()
A. Virtualize network and memory to LPARs.
B. Virtualize network and storage to LPARs.
C. Virtualize memory and processors to LPARs.
D. Virtualize storage and processors to LPARs.
[单项选择]Which WAN service utilizes two different encapsulation types (one for data and one for signaling) on its data link layer?()
A. ISDN
B. Frame Relay
C. ATM
D. FDDI
[多项选择]Which two features are added when upgrading from IPCC Express Standard to Enhanced? ()
A. Agent Routing
B. Historical Reporting
C. Conditional Routing
D. Prioritized Queueing
E. Agent Queueing
[单项选择]During which period did mathematics remain unchanged
A. Ancient times
B. The 17th century
C. For 300 years
D. The Dark Ages
[多项选择]Which two statements regarding external authentication servers for firewall user authentication are true?() (Choose two.)
A. Up to three external authentication server types can be used simultaneously.
B. Only one external authentication server type can be used simultaneously.
C. If the local password database is not configured in the authentication order, and the configured authentication server bypassed.
D. If the local password database is not configured in the authentication order, and the configured authentication server authentication is rejected.