Waiting for answer This question has not been answered yet. You can hire a professional tutor to get the answer.
QUESTION 1 The fundamental problem of WEP is a.RC4 algorithm is broken b.RC4 algorithm is not suitable for wireless c.IV is transmitted in clear text...
QUESTION 1
a.RC4 algorithm is broken
b.RC4 algorithm is not suitable for wireless
c.IV is transmitted in clear text
d.IV is too short thus the per-packet key repeats quickly
QUESTION 2
a. discover hidden SSID
b. change WEP password
c. simulate a fake AP
d. all of above
QUESTION 3
a. masquerading
b. replay
c. message modification
d. all of above
QUESTION 4
a. authentication process
b. channel scanning/probing
c. connection migration
d. none of above
QUESTION 5
a. Primary Master Key
b. Primary Transit Key
c. Per-Packet Key
d. all of above
QUESTION 6
a. authenticating AP to the STA
b. authenticating STA to the AP
c. authenticating STA to the authentication server
d. none of above
QUESTION 7
a. it is possible for a slave to relay other slaves' traffic
b. all devices have to implement encryption capability
c. security mode is the only factor that determines how link is secured
d. none of above
QUESTION 8
a. has the same security loophole as it also uses a stream cipher in a wireless medium
b. has improved security as it has a deeper key hierarchy
c. improved integrity as it encrypts the CRC checksum
d. all of above
QUESTION 9
a. it works at a higher network layer
b. it is typically a software solution and can be slower
c. it provides end-to-end security
d. all of above
QUESTION 10
a. We send more sensitive data over wireless because of its convenience.
b. Wireless is shared medium that cannot be physically secured.
c. There is no need for additional security as WEP is good enough
d. All of above
QUESTION 11
a.To reduce key exposure
b.
c. To dynamically change key size
d.None of above
QUESTION 12
MAC address spoofing to set up a phishing AP
Management frame flooding for denial of service attack
Rogue AP for unauthorized access
All of above
QUESTION 13
a.The attacker sets up the AP broadcasting a legitimate SSID
b. The attacker's AP cannot be detected as it can spoof legitimate MAC address
c. Attacker can perform man-in-middle attack through the Evil Twin AP
d. You can provide reasonable security against Evil Twin by using VPN.
QUESTION 14
a. Data payload MSDU
b. ICV including MICHAEL generated MIC
c. TKIP generated per-packet key
d. 48-bit IV
QUESTION 15
QUESTION 16
a. TKIP and MICHAEL
b. AES and MICHAEL
c. TKIP and CRC
d. AES and CRC
QUESTION 17
QUESTION 18
QUESTION 19
QUESTION 20
QUESTION 21
a. Mobile Station
b.Access Point
c.RADIUS Server
d. any of the above
QUESTION 22
QUESTION 23
QUESTION 24