Academic Integrity: tutoring, explanations, and feedback — we don’t complete graded work or submit on a student’s behalf.

Wireless ad-hoc mode allows network nodes to organize themselves without the nee

ID: 3695876 • Letter: W

Question

Wireless ad-hoc mode

allows network nodes to organize themselves without the need for a base station

requires the base station to communicate

uses ad-hoc security protocols that are designed as the connection is established to create security through obscurity

allows cell towers of competing wireless companies to communicate directly during disasters

This wireless networking protocol has an approximate range of 30 meters and a maximum transmission rate of 11 Mbps

802.11 b

Bluetooth

Wireless-N

4G/LTE

Wireless network security

relies on ARP - the Airway Recryption Protocol

should not rely on WEP - the Wired Equivalence Protocol

is not needed in a point-to-point wireless link because no one else can receive the radio signal

is impossible because the data is transmitted through the air and anyone can capture those signals

The AES Protocol

uses a 64 bit block size and two 56 bit keys, encrypting with key 1, decrypting with key 2, and encrypting with key 1 again

processes data in 128 bit blocks and can use a 128, 192 or 256 bit keys

uses a a random order of the ASCII table to encrypt the data

uses two keys, one for encryption and the other for decryption

Confidentiality is

that messages cannot be modified without detection

that messages can be communicated at any time when desired by the sender and receiver

the sending and receiving of messages securely, so that only the sender and receiver can understand the contents of their messages

that messages can only be sent anonymously between senders and receivers

Conversational audio and video

relies on the network to be able to deliver the data with high latency and variable network delay

must overcome variable network delay and latency

should deliver network data with more than a 1000 ms delay

can overcome any network delivery issues with sufficient buffering

If Bob and Alice use symmetric key encryption, they need

one key that they both use for both encryption and decryption

two keys - one for encryption and one for decryption

four keys - two for Bob and two for Alice

three keys - one each for Bob, Alice and Trudy

The IPSec protocol secures data by adding encryption

at the network layer

between the application and transport layers

at the data link layer

at the physical layer

If Bob and Alice use public-key encryption, they need

one key that they both use for both encryption and decryption

two keys - one for encryption and one for decryption

three keys - one each for Bob, Alice and Trudy

four keys - two for Bob and two for Alice

In terms of network management, MIB is

the men in black, otherwise known as network administrators who must always wear sunglasses so that the blinking lights of switches and routers don't cause them to forget the OSI data model

a distributed store/database of network management data

the data definition langauge for network management data

the protocol for communicating network management data between managed devices and managing entities

Streaming stored audio and video

requires that network delays do not exceed 400 ms

overcomes many network related issues by relying on the inherent re-transmission capability in UDP

can be stored on different servers at different bitrates to meet the needs of users

requires that the entire file is downloaded by the client prior to playback

Video over IP using the H.323 protocol

is transmitted using RTP (real-time protocol) which relies on TCP

Uses the SIP protocol over TCP

is transmitted using RTP (real-time protocol) which relies on UDP

is transmitted using the DASH protocol which relies on the HTTP and TCP protocols

Wireless networks use CSMA-CA (carrier sense, multiple access, collision avoidance) instead of CSMA-CD (carrier sense, multiple access, collision detection) that is used on wired networks because

wireless network nodes cannot "hear" all other nodes on the network and therefore cannot rely on hearing other transmissions to determine if the network is busy or not

wireless network nodes can "hear" all other network nodes, unlike in a wired network, so they don't have to detect collisions

signal propagation in a wireless network is uni-directional and follows guided network paths, so collision detection isn't needed

wireless nodes can move, so radio wave collision must be avoided as nodes move around the network

SNMP, Simple network management protocol, does not include

security through encryption of messages using WPA2 and AES

management information base (MIB)

transmission of messages using the UDP transport layer protocol

managed devices

The SSL protocol secures data by adding encryption

at the data link layer

at the physical layer

between the application and transport layers

at the network layer

The following are goals for network security except

integrity

availability

anonymity

confidentiality

The SNMP Request/Response messages

data is requested from the managed device, requiring a response from the managing entity

data is sent from the managed device to the managing entity when there is some event or exception that occurs

data is sent from the managing entity to the managed device when there is some event or exception that occurs

data is requested from the managing entity, requiring a response from the managed device

If "Trudy" wishes to do harmful things to the communication between "Bob" and "Alice", she can attempt to do all except

eavesdrop - intercept messages

impersonate either Bob or Alice

hijack the connection, and become a "man-in-the-middle"

crack the AES encryption key easily because of how poorly AES was designed

Select the best authenitcation method that Alice can use to prove who she is to Bob

she can send Bob a hash of her username to prove she is Alice

she can send an encrypted version of her password to Bob to prove that she is Alice

Bob sends a nonce to Alice, which she encrypts with her password as the key, and sends the result back to Bob

she can just send her password to Bob and Bob can validate the password against the database

Message integrity is

that messages can only be sent anonymously between senders and receivers

the sending and receiving of messages securely, so that only the two of them can understand the contents of their messages

that messages cannot be modified without detection

that messages can be communicated at any time when desired by the sender and receiver

In the SSL protocol

a complex substitution cipher using a random order of the ASCII table is used

the WPA2 protocol with 3DES encryption is used

both the RSA protocol during the connection phase and the AES Protocol for bulk encryption are used

only the Caesar cipher is used

Jitter in digital video transmission

is caused by variable network delay

is caused by the user shaking the camera violently

is caused by green blocks of video being transmitted to the receiver

is caused by constant network delay

ASN.1 addresses the problem of

translation between different types of SNMP messages

asynchronous system notation between similar systems

autonomous system networking

the study of national networks through the association for the study of nationalities

The following are issues with wireless networks except

temperature gradients as heat waves interfere with radio waves

signal strength issues as radio signals travel through walls, trees, concrete, water and air at different rates

interference from other intentional and unintentional radio wave sources like other networks, background radiation, electrical equipment and medical devices

multipath propagation as radio signals reflect off objects and arrive at receivers at slightly different times

In the case of the SNMP Trap message,

data is sent from the managing entity to the managed device when there is some event or exception that occurs

data is requested from the managing entity, requiring a response from the managed device

data is sent from the managed device to the managing entity when there is some event or exception that occurs

data is requested from the managed device, requiring a response from the managing entity

Explanation / Answer


Wireless ad-hoc mode

uses ad-hoc security protocols that are designed as the connection is established to create security through obscurity.

This wireless networking protocol has an approximate range of 30 meters and a maximum transmission rate of 11 Mbps

802.11 b

Wireless network security

should not rely on WEP - the Wired Equivalence Protocol

The AES Protocol

processes data in 128 bit blocks and can use a 128, 192 or 256 bit keys

Confidentiality is

the sending and receiving of messages securely, so that only the sender and receiver can understand the contents of their messages

Conversational audio and video

can overcome any network delivery issues with sufficient buffering

If Bob and Alice use symmetric key encryption, they need

one key that they both use for both encryption and decryption

IPSec protocol secures data by adding encryption

at the network layer

If Bob and Alice use public-key encryption, they need

two keys - one for encryption and one for decryption

In terms of network management, MIB is

the data definition langauge for network management data

Streaming stored audio and video

requires that network delays do not exceed 400 ms

Video over IP using the H.323 protocol

is transmitted using RTP (real-time protocol) which relies on TCP

Wireless networks use CSMA-CA (carrier sense, multiple access, collision avoidance) instead of CSMA-CD (carrier sense, multiple access, collision detection) that is used on wired networks because

wireless network nodes can "hear" all other network nodes, unlike in a wired network, so they don't have to detect collisions

SNMP, Simple network management protocol, does not include

security through encryption of messages using WPA2 and AES

The SSL protocol secures data by adding encryption

between the application and transport layers

The following are goals for network security except

anonymity

The SNMP Request/Response messages

data is requested from the managing entity, requiring a response from the managed device

If "Trudy" wishes to do harmful things to the communication between "Bob" and "Alice", she can attempt to do all except

impersonate either Bob or Alice

Select the best authenitcation method that Alice can use to prove who she is to Bob

she can send an encrypted version of her password to Bob to prove that she is Alice

Message integrity is

the sending and receiving of messages securely, so that only the two of them can understand the contents of their messages

Jitter in digital video transmission

is caused by constant network delay

addresses the problem of

the study of national networks through the association for the study of nationalities

The following are issues with wireless networks except

signal strength issues as radio signals travel through walls, trees, concrete, water and air at different rates

In the case of the SNMP Trap message,

data is sent from the managing entity to the managed device when there is some event or exception that occurs

Hire Me For All Your Tutoring Needs
Integrity-first tutoring: clear explanations, guidance, and feedback.
Drop an Email at
drjack9650@gmail.com
Chat Now And Get Quote