Shared key authentication is considered more secure than open authentication.
Shared key authentication is considered less secure than open authentication.
If the WEP keys do not match using the open authentication method， the client will not authenticate， associate， and transfer data.
If the WEP keys do not match using the open authentication method， the client will still be able to authenticate and associate， but will not transfer data.
If the WEP keys do not match using the open authentication method， the client will still be able to authenticate， associate， and transfer data.
多选题 When a router converts analog signals to digital signals， what three steps are always included in the process？（）
多选题 Which two VoIP capabilities are utilized when the CallManager and the gateway are configured for Survivable Remote Site Telephony？（）
Analog phones， connected to the PSTN， act as internal call agents if IP communication to the CallManager is lost.
An onsite gateway reroutes calls over the PSTN if IP communication to the CallManager is lost.
The IP phones can reroute calls over the PSTN if IP communication to the CallManager is lost.
Local voice gateways can assume the function of a call agent if IP communication to the CallManager is lost.
IP phones use an internal call agent if IP communication to the CallManager is lost.
small packet sizes
The rate of traffic is measured and compared to a configured policy.
Classification is used to differentiate traffic.
Traffic is marked and sent out according to priority.
Both can be applied to inbound and outbound traffic.
Both buffer traffic to ensure a predetermined traffic rate.
Both drop traffic that is above a predetermined traffic rate.
多选题 Which two statements are true about the Wi-Fi Protected Access （WPA） and Wi-Fi Protected Access version 2 （WPA2） security solutions？（）
both WPA and WPA2 require authentication support via IEEE 802.1 x and Pre-Shared Key （PSK）
both WPA and WPA2 address all known Wired Equivalent Privacy （WEP） vulnerabilities in the IEEE 802.11i security implementation
WPA is supported on client devices only. WPA2 is supported on both access point （AP） and client devices
WPA provides only a standard for authentication. WPA2 provides a standard for authentication and encryption
WPA requires encryption support via Temporal Key Integrity Protocol （TKIP） WPA2 provides encryption support via （symmetric block cipher）AES-CCMP
多选题 Which three traffic descriptors are typically used as QoS markings for packets or frames entering the network？（）
AutoQoS is supported on Frame Relay multipoint subinterfaces.
AutoQoS is supported on low-speed ATM PVCs in point-to-point subinterfaces.
AutoQoS is supported on serial PPP and HDLC interfaces.
AutoQoS is supported only on Frame Relay main interfaces and not on any subinterface configuration.
a class can be identified as a single application， multiple applications with similar service needs，or be based on the source or destination IP address
a drawback of the DiffServ field in the MAC header to mark frames into behavior aggregates （BAs）
DiffServ uses the DiffServ field in the MAC header to mark frames into behavior
the DiffServ field occupies the same eight bits of the MAC header that were previously used for the ToS field
the first six high-order bits of the DiffServ field are used to identify the Resource Reservation Protocol （RSVP） value
the primary goal of DiffServ is scalability
Cable modems only operate at Layer 1 of the OSI model.
Cable modems operate at Layers 1 and 2 of the OSI model.
Cable modems operate at Layers 1， 2， and 3 of the OSI model.
A function of the cable modem termination system （CMTS） is to convert the modulated signal from the cable modem into a digital signal.
A function of the cable modem termination system is to convert the digital data stream from the end user host into a modulated RF signal for transmission onto the cable system.