Wireless network security relies on ARP - the Airway Recryption Protocol should
ID: 3695929 • Letter: W
Question
Wireless network security
relies on ARP - the Airway Recryption Protocol
should not rely on WEP - the Wired Equivalence Protocol
is not needed in a point-to-point wireless link because no one else can receive the radio signal
is impossible because the data is transmitted through the air and anyone can capture those signals
Conversational audio and video
relies on the network to be able to deliver the data with high latency and variable network delay
must overcome variable network delay and latency
should deliver network data with more than a 1000 ms delay
can overcome any network delivery issues with sufficient buffering
The IPSec protocol secures data by adding encryption
at the network layer
between the application and transport layers
at the data link layer
at the physical layer
In terms of network management, MIB is
the men in black, otherwise known as network administrators who must always wear sunglasses so that the blinking lights of switches and routers don't cause them to forget the OSI data model
a distributed store/database of network management data
the data definition langauge for network management data
the protocol for communicating network management data between managed devices and managing entities
Streaming stored audio and video
requires that network delays do not exceed 400 ms
overcomes many network related issues by relying on the inherent re-transmission capability in UDP
can be stored on different servers at different bitrates to meet the needs of users
requires that the entire file is downloaded by the client prior to playback
Wireless networks use CSMA-CA (carrier sense, multiple access, collision avoidance) instead of CSMA-CD (carrier sense, multiple access, collision detection) that is used on wired networks because
wireless network nodes cannot "hear" all other nodes on the network and therefore cannot rely on hearing other transmissions to determine if the network is busy or not
wireless network nodes can "hear" all other network nodes, unlike in a wired network, so they don't have to detect collisions
signal propagation in a wireless network is uni-directional and follows guided network paths, so collision detection isn't needed
wireless nodes can move, so radio wave collision must be avoided as nodes move around the network
If "Trudy" wishes to do harmful things to the communication between "Bob" and "Alice", she can attempt to do all except
eavesdrop - intercept messages
impersonate either Bob or Alice
hijack the connection, and become a "man-in-the-middle"
crack the AES encryption key easily because of how poorly AES was designed
Select the best authenitcation method that Alice can use to prove who she is to Bob
she can send Bob a hash of her username to prove she is Alice
she can send an encrypted version of her password to Bob to prove that she is Alice
Bob sends a nonce to Alice, which she encrypts with her password as the key, and sends the result back to Bob
she can just send her password to Bob and Bob can validate the password against the database
Message integrity is
that messages can only be sent anonymously between senders and receivers
the sending and receiving of messages securely, so that only the two of them can understand the contents of their messages
that messages cannot be modified without detection
that messages can be communicated at any time when desired by the sender and receiver
Jitter in digital video transmission
is caused by variable network delay
is caused by the user shaking the camera violently
is caused by green blocks of video being transmitted to the receiver
is caused by constant network delay
ASN.1 addresses the problem of
translation between different types of SNMP messages
asynchronous system notation between similar systems
autonomous system networking
the study of national networks through the association for the study of nationalities
Explanation / Answer
1.
Wireless network security is used for data security. At the time when we transfer the data
from one host to other host the same time anyone can capture the data. So, to secure the
data we use wireless network security.
Therefore, the correct option is D) is impossible because the data is transmitted
through the air and anyone can capture those signals.
2.
Conversational audio and video depend on the network only if the network is having high
bandwidth then the conversation will be very good.
Therefore, the correct option is A) relies on the network to be able to deliver the data
with high latency and variable network delay.
3.
IPSec is the part of the network security and it is used for adding the encryption key with
the data.
Therefore, the correct option is A) at the network layer
4.
The full name of the MIB is the management information base. It is a database
which is used to managing the entity of the database.
Therefore, the correct option is D) the protocol for communicating network
management data between managed devices and managing entities.
5.
CSMA/CD is used in the wired network whereas the CSMA/CA is being used in the
wireless network. There is no need to use the of collision detection in the wireless
network because the communication is used happen in the half duplex mode.
Therefore, the correct option is C) signal propagation in a wireless network is uni-
directional and follows guided network paths, so collision detection isn't needed.
6.
A Trudy is one who can hijack the connection which is in between Alice and Bob and
can read the message.
Therefore, the correct option is C) hijack the connection, and become a "man-in-the-
middle".
7.
Alice can send the encrypted password to the Bob so that the Bob could know about
the Alice.
Therefore, correct option is B) she can send an encrypted version of her password to
Bob to prove that she is Alice.
8.
Message integrity is the part of the cryptography system in which when the sender sends
the message to the receiver at the same time no one can modify the message.
Therefore, the correct option is C) that messages cannot be modified without detection
9.
Jitter is the delay in receiving the packet from the sender. It varies from time to time
rather than being constant. It occurs because of the congestion and improper queuing of
the packets.
Therefore, the correct option is A) is caused by variable network delay.
10.
ASN.1 address the problem related to the connection between the similar systems.
Therefore, the correct option is B) asynchronous system notation between similar
Systems.
Related Questions
drjack9650@gmail.com
Navigate
Integrity-first tutoring: explanations and feedback only — we do not complete graded work. Learn more.