Question: Part I T/F: 1. 802.11b is a wireless network bearer in 2.4 GHz ISM band with data rates up to 54 Mbps ; compatible with
Part I T/F:
1. 802.11b is a wireless network bearer in 2.4 GHz ISM band with data rates up to 54 Mbps ; compatible with 802.11b, 802.11n.
2. 802.11i - Authentication and encryption protocols.
3. 802.11g is a wireless network bearer operating in the 2.4 and 5 GHz ISM bands with data rates up to 600 Mbps.
4. Each AP is programmed with a APID that corresponds to its network then client computer presents correct APID to access AP.
5. Each AP can be programmed with the set of MAC addresses and each client identified by its MAC Address to be permitted to access AP.
6. MAC addresses filtering is very weak because MAC addresses are transmitted in the clear text and an attacker can just sniff for MACs.
7. Using PAP, the user sends an authentication identification only username, then the system checks validity of the identification and password and accepts or denies connection.
8. To connect, a computer needs the SSID (network name), which is send out by the router as beacon frames announcing the SSID.
9. ICV (integrity check vector) is computed for plaintext (CRC-32) then is appended to plaintext to make data bit string, Which is XORd to Key stream Sequence to create ciphertext.
10. In October 2003, Wi-Fi (Wireless Fidelity) Alliance introduced Wi-Fi Protected Access (WPA)to protect both present and future wireless devices, addresses both wireless authentication and encryption.
11. Preshared key (PSK) authentication uses a Passphrase to generate the encryption key, which must be entered into both the access point and all wireless devices (Prior to the devices communicating with the AP).
12. The PSK is used in WPA as an encryption key.
13. TKIP based on RC4 stream cipher algorithm, surrounds WEP cipher engine with 3 new algorithms, 1) Extended 48-bit Initialization Vector (IV), 2) New per-packet key mixing function, re-keying, and 3) A message integrity check (MIC) Michael, ensures messages havent been tampered with during transmission.
14. TKIP consider as a short-term solution for WLAN security, which is used to ease the transition from current WEP WLAN to the next RSN networks.
15. Thin Access Point is an access point without the authentication and encryption functions.
16. Wireless VLANs can segment traffic and increase security in same or different switches.
17. Auditors use wireless protocol analyzer for sniffing rogue access points and for more security, they set up wireless probes to monitor the RF frequency for any threat.
18. Sensor Network is a basic unit in sensor network contains on-board sensors, processor, memory, transceiver, and power supply.
19. Authentication is a process of proving that person/device has performed a certain transaction/transmission.
20. LEAP employs one-way hash-key mechanism for source packet authentication and uses a pre-distribution key to help establish the four types of keys.
Step by Step Solution
There are 3 Steps involved in it
Get step-by-step solutions from verified subject matter experts
