QUESTION 14 A_attack on WEP involves viewing collisions to derive plaintext valu
ID: 3739974 • Letter: Q
Question
QUESTION 14 A_attack on WEP involves viewing collisions to derive plaintext values O capture O keystream o weak key O pseudo-random number QUESTION 15 When a wireless connection is made using preshared keys, what does the preshared key (passphrase) become in the secure connection? PMK O GTK PTK O Nothing, it is discarded QUESTION 16 What feature of a WIPS solution can be used to physically locate a nonapproved wireless device? O RF signature analysis O RF calibration O Rogue triangulation O Rogue containmentExplanation / Answer
ANSWER:-
Question (1) option (b) keystream
Question (2) option (a) PMK
Question (3) option (a) RF Signature analysis
Stream ciphers, where plaintext bits are combined with a cipher bit stream by an exclusive-or operation (xor), can be very secure if used properly. However, they are vulnerable to attacks if certain precautions are not followed:
Related Questions
Hire Me For All Your Tutoring Needs
Integrity-first tutoring: clear explanations, guidance, and feedback.
Drop an Email at
drjack9650@gmail.com
drjack9650@gmail.com
Navigate
Integrity-first tutoring: explanations and feedback only — we do not complete graded work. Learn more.