多项选择题
A. a stronger encryption algorithm
B. key mixing using temporal keys
C. shared key authentication
D. a shorter initialization vector
E. per frame sequence counters
多项选择题 Which three options are valid WAN connectivity methods?()
多项选择题 If IP routing is enabled, which two commands set the gateway of last resort to the default gateway?()
多项选择题 Workstation A has been assigned an IP address of 192.0.2.24/28. Workstation B has been assigned an IP address of 192.0.2.100/28. The two workstations are connected with a straight-through cable. Attempts to ping between the hosts are unsuccessful. What two things can be done to allow communications between the hosts? ()