Question: QUESTION 6 A wire 02s network using the opan sysom autentication ? much weaker in security than a wreeGG network using the shared wEP key

QUESTION 6 A wire 02s network using the opan sysom autentication ? much weaker in security than a wreeGG network using the shared wEP key authentication, true or talso? Falso QUESTION 7 modulation changca tho numbor ot wavas roprozontng one ayclo. Phaso shit Phaae QUESTION 8 What is the first step in shared key authentication? AP encrypts challenge text and 55nd5 it to wireless device wrolos* device encrypts challenge ?01 and 84nd" to AP AP sends wirele device an auhenication feame that coans a biock of sext knoun as the chalange text wreess device sends an authentioatian frame to the AP QUESTION 9 Attackon WEP involves viewing colsions to derive plaintext values. capture weak key psoudo-random number QUESTION 10 il provid* opon access and inorr ot oonnectvity She por orrns the loaing steps An attacker s ar r ing n o dor to local. w Ns that aro on and provide not ac ?She detects 11 wLANe al * spec e location and neods to dete mre which WL N Look at the list of WLANs to see if any are isted ar? unsecured. Connect to th WLAN that is listed as unsecured with goalost signal strengh. Did she meen her objective of ?cating a open WLAN that provides Interne, access and why? Yes because she was able to identy and connect to the unsecured WLAN No, because she does not have the appropriate WEP kay Yos, becauze an unsecured WLAN aways provide inornet acceas No, bocause sho has connecled o ho WLAN, but she has not detormined if Inlornet accoss is availatlo QUESTION 6 A wire 02s network using the opan sysom autentication ? much weaker in security than a wreeGG network using the shared wEP key authentication, true or talso? Falso QUESTION 7 modulation changca tho numbor ot wavas roprozontng one ayclo. Phaso shit Phaae QUESTION 8 What is the first step in shared key authentication? AP encrypts challenge text and 55nd5 it to wireless device wrolos* device encrypts challenge ?01 and 84nd" to AP AP sends wirele device an auhenication feame that coans a biock of sext knoun as the chalange text wreess device sends an authentioatian frame to the AP QUESTION 9 Attackon WEP involves viewing colsions to derive plaintext values. capture weak key psoudo-random number QUESTION 10 il provid* opon access and inorr ot oonnectvity She por orrns the loaing steps An attacker s ar r ing n o dor to local. w Ns that aro on and provide not ac ?She detects 11 wLANe al * spec e location and neods to dete mre which WL N Look at the list of WLANs to see if any are isted ar? unsecured. Connect to th WLAN that is listed as unsecured with goalost signal strengh. Did she meen her objective of ?cating a open WLAN that provides Interne, access and why? Yes because she was able to identy and connect to the unsecured WLAN No, because she does not have the appropriate WEP kay Yos, becauze an unsecured WLAN aways provide inornet acceas No, bocause sho has connecled o ho WLAN, but she has not detormined if Inlornet accoss is availatlo
Step by Step Solution
There are 3 Steps involved in it
Get step-by-step solutions from verified subject matter experts
