Waiting for answer This question has not been answered yet. You can hire a professional tutor to get the answer.

QUESTION

QUESTION 1 The fundamental problem of WEP is a.RC4 algorithm is broken b.RC4 algorithm is not suitable for wireless c.IV is transmitted in clear text...

QUESTION 1

a.RC4 algorithm is broken

b.RC4 algorithm is not suitable for wireless

c.IV is transmitted in clear text

d.IV is too short thus the per-packet key repeats quickly

QUESTION 2

a. discover hidden SSID

b. change WEP password

c. simulate a fake AP

d. all of above

QUESTION 3

a. masquerading

b. replay

c. message modification

d. all of above

QUESTION 4

a. authentication process

b. channel scanning/probing

c. connection migration

d. none of above

QUESTION 5

a. Primary Master Key

b. Primary Transit Key

c. Per-Packet Key

d. all of above

QUESTION 6

a. authenticating AP to the STA

b. authenticating STA to the AP

c. authenticating STA to the authentication server

d. none of above

QUESTION 7

a. it is possible for a slave to relay other slaves' traffic

b. all devices have to implement encryption capability

c. security mode is the only factor that determines how link is secured

d. none of above

QUESTION 8

a. has the same security loophole as it also uses a stream cipher in a wireless medium

b. has improved security as it has a deeper key hierarchy

c. improved integrity as it encrypts the CRC checksum

d. all of above

QUESTION 9

a. it works at a higher network layer

b. it is typically a software solution and can be slower

c. it provides end-to-end security

d. all of above

QUESTION 10

a. We send more sensitive data over wireless because of its convenience.

b. Wireless is shared medium that cannot be physically secured.

c. There is no need for additional security as WEP is good enough 

d. All of above

QUESTION 11

a.To reduce key exposure

b. 

c. To dynamically change key size

d.None of above

QUESTION 12

MAC address spoofing to set up a phishing AP

Management frame flooding for denial of service attack

Rogue AP for unauthorized access

All of above

QUESTION 13

a.The attacker sets up the AP broadcasting a legitimate SSID

b. The attacker's AP cannot be detected as it can spoof legitimate MAC address 

c. Attacker can perform man-in-middle attack through the Evil Twin AP

d. You can provide reasonable security against Evil Twin by using VPN.

QUESTION 14

a. Data payload MSDU

b. ICV including MICHAEL generated MIC

c. TKIP generated per-packet key

d. 48-bit IV

QUESTION 15

QUESTION 16

a. TKIP and MICHAEL

b. AES and MICHAEL

c. TKIP and CRC

d. AES and CRC

QUESTION 17

QUESTION 18

QUESTION 19

QUESTION 20

QUESTION 21

a. Mobile Station

b.Access Point

c.RADIUS Server

d. any of the above

QUESTION 22

QUESTION 23

QUESTION 24

Show more
LEARN MORE EFFECTIVELY AND GET BETTER GRADES!
Ask a Question