Question

1) What is the protocol developed for the wireless network communications? Explain. A) Wireless Encryption Protocol...

1) What is the protocol developed for the wireless network communications? Explain.

A) Wireless Encryption Protocol (WEP)
B) Wireless Application Protocol (WAP)
C) Wired Equivalent Privacy (WEP)
D) Wireless Session Protocol (WSP)

2) Consider 802.11 shared key authentication. Which of the following statements is false? Explain.

A) If a device with the key is lost then the security for the entire WLAN is compromised.
B) 802.1X requires shared key authentication.
C) Real users and attackers with a shared WEP key have the same rights.
D) Users cannot determine whether the access point is an imposter.

3) The term used for certified 802.11b products is ___________ .

A) WAP
B) Wi-Fi
C) WiMAX
D) WPA

4) Which of the following is not a reason why WEP may be considered vulnerable? Explain. (Select all that apply.)

A) Shared WEP keys among all clients
B) 20-bit initialization vector
C) An RC4 engine not properly initialized
D) 48-bit WEP key

0 0
Add a comment Improve this question Transcribed image text
Answer #1

1) B) Wireless Application Protocol (WAP)

WAP (Wireless Application Protocol) is a specification for a set of communication protocols to standardize the way that wireless devices, such as cellular telephones and radio transceivers, can be used for Internet access, including e-mail, the World Wide Web, newsgroups, and instant messaging. While Internet access has been possible in the past, different manufacturers have used different technologies. In the future, devices and service systems that use WAP will be able to interoperate.

The WAP layers are:

  • Wireless Application Environment (WAE)
  • Wireless Session Layer (WSL)
  • Wireless Transport Layer Security (WTLS)
  • Wireless Transport Layer (WTP)

The WAP was conceived by four companies: Ericsson, Motorola, Nokia, and Unwired Planet (now Phone.com). The Wireless Markup Language (WML) is used to create pages that can be delivered using WAP..

3)  B) Wi-Fi

802.11b (also referred to as 802.11 High Rate or Wi-Fi) — an extension to 802.11 that applies to wireless LANS and provides 11 Mbps transmission (with a fallback to 5.5, 2 and 1-Mbps) in the 2.4 GHz band. 802.11b uses only DSSS. 802.11b was a 1999 ratification to the original 802.11 standard, allowing wireless functionality comparable to Ethernet.

Add a comment
Know the answer?
Add Answer to:
1) What is the protocol developed for the wireless network communications? Explain. A) Wireless Encryption Protocol...
Your Answer:

Post as a guest

Your Name:

What's your source?

Earn Coins

Coins can be redeemed for fabulous gifts.

Not the answer you're looking for? Ask your own homework help question. Our experts will answer your question WITHIN MINUTES for Free.
Similar Homework Help Questions
  • 14. TKIP/RC4 encryption adds an extra of overhead to the body of an 802.11 MPDU. A....

    14. TKIP/RC4 encryption adds an extra of overhead to the body of an 802.11 MPDU. A. 16 bytes B. 12 bytes C. 20 bytes D. 10 bytes E. None of the above 15. An HT client STA is transmitting to an HT AP using modulation and coding scheme (MCS)#12 that defines 16 - QAM modulation, two spatial streams, a 40-MHz bonded channel and an 800 ns guard interval to achieve a data rate of 162 Mbps. According to the IEEE,...

  • Chapter 18: wireless networks TRUE OR FALSE                                    

    Chapter 18: wireless networks TRUE OR FALSE                                                                                                     T          F          1. As the demand for broadband Internet access has grown, providers of wired local loop service have responded with increasing reliance   on optical fiber and coaxial cable. T          F          2. A BWA provider services one or more cells. T          F          3. Wireless systems are more expensive than wired systems. T          F          4. IEEE 802.16 and the associated WiMAX specification now deal with      both fixed and mobile BWA. T          F         ...

  • RSA is a common form of symmetric key encryption. Select one: True False What is the...

    RSA is a common form of symmetric key encryption. Select one: True False What is the purpose of a nonce in an end-point authentication protocol? Select one: a. It protects against replay attacks. b. It serves as a private key. c. It serves as a public key. d. It serves as a signature. e. It serves as a shared symmetric key. What is (19 * 16) mod 7? Answer: A TCP connection setup requires 3 messages to be passed. How...

  • In this lab, we’ll investigate the 802.11 wireless network protocol. Follow the instructions and answers questions...

    In this lab, we’ll investigate the 802.11 wireless network protocol. Follow the instructions and answers questions 7 - 10. http://gaia.cs.umass.edu/wireshark-labs/wireshark-traces.zip In this lab, we'll investigate the 802.11 wireless network protocol. Before beginning this lab, you might want to re-read Section 6.3 in the text. Since we l1 be delving a bit deeper into 802.11 than is covered in the text, you might want to check out "A Technical Tutorial on the 802.11Protocol," by Pablo Brenner (Breezecom Communications) http://www.sss-mag.com/pdf802_11tut.pdf, and "Understanding...

  • 1. Which 802.11 standard has the best performing parameters in terms of data rate, range, channel...

    1. Which 802.11 standard has the best performing parameters in terms of data rate, range, channel separation issues and interoperability? 802.11n 802.11b 802.11g 802.11a 2. WPA2 uses IEEE 802.X with the Extensible Authentication Protocol (EAP) to perform mutual authentication, either via a _________ server or by means of a changing key generated on the basis of a shared secret pass-phrase. AES RADIUS WEP Common 3. At the MAC level, 802.11 LANs involve the use of ______ for medium access control....

  • TRUE/FALSE QUESTIONS:  Foundations of Information Security and Assurance 1. There is a problem anticipating and testing for...

    TRUE/FALSE QUESTIONS:  Foundations of Information Security and Assurance 1. There is a problem anticipating and testing for all potential types of non-standard inputs that might be exploited by an attacker to subvert a program. 2. Without suitable synchronization of accesses it is possible that values may be corrupted, or changes lost, due to over-lapping access, use, and replacement of shared values. 3. The biggest change of the nature in Windows XP SP2 was to change all anonymous remote procedure call (RPC)...

ADVERTISEMENT
Free Homework Help App
Download From Google Play
Scan Your Homework
to Get Instant Free Answers
Need Online Homework Help?
Ask a Question
Get Answers For Free
Most questions answered within 3 hours.
ADVERTISEMENT
ADVERTISEMENT
ADVERTISEMENT