Question: 1. 802.11b security to Secure Access Point (AP) Access includes: a. Service Set Identifier - SSID b. Media Access Control (MAC) Address Filtering c. Wired
1. 802.11b security to Secure Access Point (AP) Access includes:
a. Service Set Identifier - SSID
b. Media Access Control (MAC) Address Filtering
c. Wired Equivalent Privacy WEP
d. all of the above
2. RC4 PRNG is a:
a. Symmetric Algorithm
b. 40 bit encryption key + 24 bit initialization vector 64 bit seed
c. 64 bit string is used as seed to PRNG to generate a key sequence
d. all of the above
e. a&c
3. TKIP advantages over WEP are (is):
a. TKIP uses a longer 128-bit key
b. TKIP uses a new key for each packet
c. Extension of IV to 48 bits instead of 24
d. Adds a frame integrity-check function (It is called Message Integrity Check (MIC)
e. All of the above
4. WPA2- AES-CCMP Encryption enhancement over WPA are (is)
a. IV size is 148 bits.
b. Uses stronger encryption of AES-CTR with 128-bit key and 128-bit block size to generate ciphertext payload.
c. Cipher Block Chaining Message Authentication Code (CBC-MAC) for integrity.
d. all of the above
e. b &c
5. Types of Wireless Probes is (are):
a. Wireless device probe.
b. Desktop probe
c. Access point probe
d. Dedicated probe
e. all of the above
6. You can add more security to WLAN through different means such as:
a. firewalls, which isolate wireless traffic from wired network
b. intrusion detection to detect attacks on wireless networks
c. IPSec / VPNs to protect traffic at IP layer
d. TLS (SSL) to protect traffic at application layer
d. All of the above
7. WLAN Security Exploits attacks include:
a. Brute Force Attacks against AP Passwords
b. Client-to-client Attacks such as DoS - duplicate MAC or IP addresses
c. Encryption Attacks
d. all of the above
e. a & c
8. The required parts in sensor node include:
a. Memory
b. Power supply
c. Sensing hardware
d. Data processing
e. Communication components
f. all of the above
9. Sensor characteristics include:
a. consume low power
b. autonomous
c. adaptive to environment
d. cheap
e. all of the above
10. Wireless Sensor network characteristics include all of the following except:
Large networks of simple sensors
Usually deployed randomly
Must focus on QoS
Use broadcast paradigms to communicate with other sensors
Collect information and send it to base station
11. Symmetric key cryptography includes:
Single key shared between communicating parties
Secret key will never be shared with anyone else
public key can be shared freely
message encrypted with secret key can only be decrypted with corresponding public key
Computationally expensive
All of the above except a
12. Asymmetric key (public key) cryptography includes:
Single key shared between communicating parties
Secret key will never be shared with anyone else
public key can be shared freely
message encrypted with secret key can only be decrypted with corresponding public key
Computationally expensive
All of the above except a
13. Physical Layer DoS attacks are:
Jamming
Tampering
Collision
Exhaustion
All of the above
a &b
14. Link Layer DoS attacks are:
Jamming
Tampering
Collision
Exhaustion
All of the above
b &c
15. Secure Network Encryption Protocol (SNEP) provides the following except:
Data confidentiality
b. Two-party data authentication
c. Data integrity
d. broadcast authentication
e. Data freshness
16. TESLA Key Setup includes except:
One-way key chains
b. K0 is initial commitment to chain
c. Base station gives K0 to all nodes
d. Other keys are bootstrapped from the master key
e. MAC key chain Ki = F(Ki+1)
17. LEAP provides the following technique for local broadcast authentication except:
a. every node generates a two -way key chain of certain length
b. every node transmits the first key in the chain to each neighbor (encrypted with the pairwise shared key)
c. whenever a node sends a message, it takes the next key from the chain (each key is called an AUTH key) and attaches it to message
d. keys are disclosed in reverse order of their generation and a receiver can verify the message based on the first received key or a recently disclosed AUTH key
18. ZigBee has several levels of security, including:
a. no security
b. encryption only
c. authentication only
d. encryption and authentication
e. all of the above
19. Security in IEEE 802.15.4 is handled by the MAC layer includes the following basic security models except:
a. access control
b. message integrity
c. authorization control
d. message confidentiality
e. replay protection
20. In LEAP protocol. the individual key is:
a. First established using a function of a seed and the ID of the node.
b. Then nodes broadcast their IDs. The receiving node uses a function, seeded with an initial key, to calculate the shared key between it and all of its neighbors.
c. Thirdly, the cluster key is distributed by the cluster head using pairwise communication secured with the pairwise shared key.
d. Lastly for distributing the network-wide group key, the sink node broadcasts it in a multihop cluster- by-cluster manner starting with the closest cluster.
e. all of the above
Step by Step Solution
There are 3 Steps involved in it
Get step-by-step solutions from verified subject matter experts
