Wireless ad-hoc mode allows network nodes to organize themselves without the nee
ID: 3695876 • Letter: W
Question
Wireless ad-hoc mode
allows network nodes to organize themselves without the need for a base station
requires the base station to communicate
uses ad-hoc security protocols that are designed as the connection is established to create security through obscurity
allows cell towers of competing wireless companies to communicate directly during disasters
This wireless networking protocol has an approximate range of 30 meters and a maximum transmission rate of 11 Mbps
802.11 b
Bluetooth
Wireless-N
4G/LTE
Wireless network security
relies on ARP - the Airway Recryption Protocol
should not rely on WEP - the Wired Equivalence Protocol
is not needed in a point-to-point wireless link because no one else can receive the radio signal
is impossible because the data is transmitted through the air and anyone can capture those signals
The AES Protocol
uses a 64 bit block size and two 56 bit keys, encrypting with key 1, decrypting with key 2, and encrypting with key 1 again
processes data in 128 bit blocks and can use a 128, 192 or 256 bit keys
uses a a random order of the ASCII table to encrypt the data
uses two keys, one for encryption and the other for decryption
Confidentiality is
that messages cannot be modified without detection
that messages can be communicated at any time when desired by the sender and receiver
the sending and receiving of messages securely, so that only the sender and receiver can understand the contents of their messages
that messages can only be sent anonymously between senders and receivers
Conversational audio and video
relies on the network to be able to deliver the data with high latency and variable network delay
must overcome variable network delay and latency
should deliver network data with more than a 1000 ms delay
can overcome any network delivery issues with sufficient buffering
If Bob and Alice use symmetric key encryption, they need
one key that they both use for both encryption and decryption
two keys - one for encryption and one for decryption
four keys - two for Bob and two for Alice
three keys - one each for Bob, Alice and Trudy
The IPSec protocol secures data by adding encryption
at the network layer
between the application and transport layers
at the data link layer
at the physical layer
If Bob and Alice use public-key encryption, they need
one key that they both use for both encryption and decryption
two keys - one for encryption and one for decryption
three keys - one each for Bob, Alice and Trudy
four keys - two for Bob and two for Alice
In terms of network management, MIB is
the men in black, otherwise known as network administrators who must always wear sunglasses so that the blinking lights of switches and routers don't cause them to forget the OSI data model
a distributed store/database of network management data
the data definition langauge for network management data
the protocol for communicating network management data between managed devices and managing entities
Streaming stored audio and video
requires that network delays do not exceed 400 ms
overcomes many network related issues by relying on the inherent re-transmission capability in UDP
can be stored on different servers at different bitrates to meet the needs of users
requires that the entire file is downloaded by the client prior to playback
Video over IP using the H.323 protocol
is transmitted using RTP (real-time protocol) which relies on TCP
Uses the SIP protocol over TCP
is transmitted using RTP (real-time protocol) which relies on UDP
is transmitted using the DASH protocol which relies on the HTTP and TCP protocols
Wireless networks use CSMA-CA (carrier sense, multiple access, collision avoidance) instead of CSMA-CD (carrier sense, multiple access, collision detection) that is used on wired networks because
wireless network nodes cannot "hear" all other nodes on the network and therefore cannot rely on hearing other transmissions to determine if the network is busy or not
wireless network nodes can "hear" all other network nodes, unlike in a wired network, so they don't have to detect collisions
signal propagation in a wireless network is uni-directional and follows guided network paths, so collision detection isn't needed
wireless nodes can move, so radio wave collision must be avoided as nodes move around the network
SNMP, Simple network management protocol, does not include
security through encryption of messages using WPA2 and AES
management information base (MIB)
transmission of messages using the UDP transport layer protocol
managed devices
The SSL protocol secures data by adding encryption
at the data link layer
at the physical layer
between the application and transport layers
at the network layer
The following are goals for network security except
integrity
availability
anonymity
confidentiality
The SNMP Request/Response messages
data is requested from the managed device, requiring a response from the managing entity
data is sent from the managed device to the managing entity when there is some event or exception that occurs
data is sent from the managing entity to the managed device when there is some event or exception that occurs
data is requested from the managing entity, requiring a response from the managed device
If "Trudy" wishes to do harmful things to the communication between "Bob" and "Alice", she can attempt to do all except
eavesdrop - intercept messages
impersonate either Bob or Alice
hijack the connection, and become a "man-in-the-middle"
crack the AES encryption key easily because of how poorly AES was designed
Select the best authenitcation method that Alice can use to prove who she is to Bob
she can send Bob a hash of her username to prove she is Alice
she can send an encrypted version of her password to Bob to prove that she is Alice
Bob sends a nonce to Alice, which she encrypts with her password as the key, and sends the result back to Bob
she can just send her password to Bob and Bob can validate the password against the database
Message integrity is
that messages can only be sent anonymously between senders and receivers
the sending and receiving of messages securely, so that only the two of them can understand the contents of their messages
that messages cannot be modified without detection
that messages can be communicated at any time when desired by the sender and receiver
In the SSL protocol
a complex substitution cipher using a random order of the ASCII table is used
the WPA2 protocol with 3DES encryption is used
both the RSA protocol during the connection phase and the AES Protocol for bulk encryption are used
only the Caesar cipher is used
Jitter in digital video transmission
is caused by variable network delay
is caused by the user shaking the camera violently
is caused by green blocks of video being transmitted to the receiver
is caused by constant network delay
ASN.1 addresses the problem of
translation between different types of SNMP messages
asynchronous system notation between similar systems
autonomous system networking
the study of national networks through the association for the study of nationalities
The following are issues with wireless networks except
temperature gradients as heat waves interfere with radio waves
signal strength issues as radio signals travel through walls, trees, concrete, water and air at different rates
interference from other intentional and unintentional radio wave sources like other networks, background radiation, electrical equipment and medical devices
multipath propagation as radio signals reflect off objects and arrive at receivers at slightly different times
In the case of the SNMP Trap message,
data is sent from the managing entity to the managed device when there is some event or exception that occurs
data is requested from the managing entity, requiring a response from the managed device
data is sent from the managed device to the managing entity when there is some event or exception that occurs
data is requested from the managed device, requiring a response from the managing entity
Explanation / Answer
Wireless ad-hoc mode
uses ad-hoc security protocols that are designed as the connection is established to create security through obscurity.
This wireless networking protocol has an approximate range of 30 meters and a maximum transmission rate of 11 Mbps
802.11 b
Wireless network security
should not rely on WEP - the Wired Equivalence Protocol
The AES Protocol
processes data in 128 bit blocks and can use a 128, 192 or 256 bit keys
Confidentiality is
the sending and receiving of messages securely, so that only the sender and receiver can understand the contents of their messages
Conversational audio and video
can overcome any network delivery issues with sufficient buffering
If Bob and Alice use symmetric key encryption, they need
one key that they both use for both encryption and decryption
IPSec protocol secures data by adding encryption
at the network layer
If Bob and Alice use public-key encryption, they need
two keys - one for encryption and one for decryption
In terms of network management, MIB is
the data definition langauge for network management data
Streaming stored audio and video
requires that network delays do not exceed 400 ms
Video over IP using the H.323 protocol
is transmitted using RTP (real-time protocol) which relies on TCP
Wireless networks use CSMA-CA (carrier sense, multiple access, collision avoidance) instead of CSMA-CD (carrier sense, multiple access, collision detection) that is used on wired networks because
wireless network nodes can "hear" all other network nodes, unlike in a wired network, so they don't have to detect collisions
SNMP, Simple network management protocol, does not include
security through encryption of messages using WPA2 and AES
The SSL protocol secures data by adding encryption
between the application and transport layers
The following are goals for network security except
anonymity
The SNMP Request/Response messages
data is requested from the managing entity, requiring a response from the managed device
If "Trudy" wishes to do harmful things to the communication between "Bob" and "Alice", she can attempt to do all except
impersonate either Bob or Alice
Select the best authenitcation method that Alice can use to prove who she is to Bob
she can send an encrypted version of her password to Bob to prove that she is Alice
Message integrity is
the sending and receiving of messages securely, so that only the two of them can understand the contents of their messages
Jitter in digital video transmission
is caused by constant network delay
addresses the problem of
the study of national networks through the association for the study of nationalities
The following are issues with wireless networks except
signal strength issues as radio signals travel through walls, trees, concrete, water and air at different rates
In the case of the SNMP Trap message,
data is sent from the managing entity to the managed device when there is some event or exception that occurs
Related Questions
drjack9650@gmail.com
Navigate
Integrity-first tutoring: explanations and feedback only — we do not complete graded work. Learn more.