Question: 1. 802.11b security to Secure Access Point (AP) Access includes: a. Service Set Identifier - SSID b. Media Access Control (MAC) Address Filtering c. Wired

1. 802.11b security to Secure Access Point (AP) Access includes:

a. Service Set Identifier - SSID

b. Media Access Control (MAC) Address Filtering

c. Wired Equivalent Privacy WEP

d. all of the above

2. RC4 PRNG is a:

a. Symmetric Algorithm

b. 40 bit encryption key + 24 bit initialization vector 64 bit seed

c. 64 bit string is used as seed to PRNG to generate a key sequence

d. all of the above

e. a&c

3. TKIP advantages over WEP are (is):

a. TKIP uses a longer 128-bit key

b. TKIP uses a new key for each packet

c. Extension of IV to 48 bits instead of 24

d. Adds a frame integrity-check function (It is called Message Integrity Check (MIC)

e. All of the above

4. WPA2- AES-CCMP Encryption enhancement over WPA are (is)

a. IV size is 148 bits.

b. Uses stronger encryption of AES-CTR with 128-bit key and 128-bit block size to generate ciphertext payload.

c. Cipher Block Chaining Message Authentication Code (CBC-MAC) for integrity.

d. all of the above

e. b &c

5. Types of Wireless Probes is (are):

a. Wireless device probe.

b. Desktop probe

c. Access point probe

d. Dedicated probe

e. all of the above

6. You can add more security to WLAN through different means such as:

a. firewalls, which isolate wireless traffic from wired network

b. intrusion detection to detect attacks on wireless networks

c. IPSec / VPNs to protect traffic at IP layer

d. TLS (SSL) to protect traffic at application layer

d. All of the above

7. WLAN Security Exploits attacks include:

a. Brute Force Attacks against AP Passwords

b. Client-to-client Attacks such as DoS - duplicate MAC or IP addresses

c. Encryption Attacks

d. all of the above

e. a & c

8. The required parts in sensor node include:

a. Memory

b. Power supply

c. Sensing hardware

d. Data processing

e. Communication components

f. all of the above

9. Sensor characteristics include:

a. consume low power

b. autonomous

c. adaptive to environment

d. cheap

e. all of the above

10. Wireless Sensor network characteristics include all of the following except:

Large networks of simple sensors

Usually deployed randomly

Must focus on QoS

Use broadcast paradigms to communicate with other sensors

Collect information and send it to base station

11. Symmetric key cryptography includes:

Single key shared between communicating parties

Secret key will never be shared with anyone else

public key can be shared freely

message encrypted with secret key can only be decrypted with corresponding public key

Computationally expensive

All of the above except a

12. Asymmetric key (public key) cryptography includes:

Single key shared between communicating parties

Secret key will never be shared with anyone else

public key can be shared freely

message encrypted with secret key can only be decrypted with corresponding public key

Computationally expensive

All of the above except a

13. Physical Layer DoS attacks are:

Jamming

Tampering

Collision

Exhaustion

All of the above

a &b

14. Link Layer DoS attacks are:

Jamming

Tampering

Collision

Exhaustion

All of the above

b &c

15. Secure Network Encryption Protocol (SNEP) provides the following except:

Data confidentiality

b. Two-party data authentication

c. Data integrity

d. broadcast authentication

e. Data freshness

16. TESLA Key Setup includes except:

One-way key chains

b. K0 is initial commitment to chain

c. Base station gives K0 to all nodes

d. Other keys are bootstrapped from the master key

e. MAC key chain Ki = F(Ki+1)

17. LEAP provides the following technique for local broadcast authentication except:

a. every node generates a two -way key chain of certain length

b. every node transmits the first key in the chain to each neighbor (encrypted with the pairwise shared key)

c. whenever a node sends a message, it takes the next key from the chain (each key is called an AUTH key) and attaches it to message

d. keys are disclosed in reverse order of their generation and a receiver can verify the message based on the first received key or a recently disclosed AUTH key

18. ZigBee has several levels of security, including:

a. no security

b. encryption only

c. authentication only

d. encryption and authentication

e. all of the above

19. Security in IEEE 802.15.4 is handled by the MAC layer includes the following basic security models except:

a. access control

b. message integrity

c. authorization control

d. message confidentiality

e. replay protection

20. In LEAP protocol. the individual key is:

a. First established using a function of a seed and the ID of the node.

b. Then nodes broadcast their IDs. The receiving node uses a function, seeded with an initial key, to calculate the shared key between it and all of its neighbors.

c. Thirdly, the cluster key is distributed by the cluster head using pairwise communication secured with the pairwise shared key.

d. Lastly for distributing the network-wide group key, the sink node broadcasts it in a multihop cluster- by-cluster manner starting with the closest cluster.

e. all of the above

Step by Step Solution

There are 3 Steps involved in it

1 Expert Approved Answer
Step: 1 Unlock blur-text-image
Question Has Been Solved by an Expert!

Get step-by-step solutions from verified subject matter experts

Step: 2 Unlock
Step: 3 Unlock

Students Have Also Explored These Related Databases Questions!