Question

14. TKIP/RC4 encryption adds an extra of overhead to the body of an 802.11 MPDU. A. 16 bytes B. 12 bytes C. 20 bytes D. 10 by
0 0
Add a comment Improve this question Transcribed image text
Answer #1

14.20 Bytes

When implementing TKIP because of the extra overhead from the extended IV and the MIC, a total 20 bytes of overhead is added to the body of an 802.11 MPDU.

15.All of the above

HT station should not use WEP or TKIP when communicating with other STAs that support stronger ciphers. HT STAs should not use pre-RSNA security methods to protect unicast frames if the RA or address 1 of the frame corresponds to an HT STA

16.128‐bit, 128‐bit

AES processing in CCMP uses AES with a 128-bit key and a 128-bit block size.

17.AAD
Additional Authentication Data (AAD) is constructed from portions of the MPDU header. This information is used for data integrity of portions of the MAC header. Receiving stations can then validate the integrity of these MAC header fields. The MIC protects the AAD information and the frame body for data integrity

18.DES

3DES is a FIPS encryption standard, but it uses three keys with an effective key size of 168 bits.

19.WLAN controller

WLAN controller usually functions as the authenticator. When an 802.1X/EAP solution is deployed in a wireless controller, the virtual controlled and uncontrolled ports exist on the WLAN controller.

Do Upvote! If found usefull!

Add a comment
Know the answer?
Add Answer to:
14. TKIP/RC4 encryption adds an extra of overhead to the body of an 802.11 MPDU. A....
Your Answer:

Post as a guest

Your Name:

What's your source?

Earn Coins

Coins can be redeemed for fabulous gifts.

Not the answer you're looking for? Ask your own homework help question. Our experts will answer your question WITHIN MINUTES for Free.
Similar Homework Help Questions
  • Implement in Go language AES encryption mode CBC with providing the packages name for Go language....

    Implement in Go language AES encryption mode CBC with providing the packages name for Go language. You can implement AES-ECB Mode (the basic AES) from crypto/aes package and crypto/cipher.Block. You can also get the SHA-256 hash function from crypto/sha256. You can get the secure random numbers generator from crypto/rand package. However, the you will implement both CBC mode and HMAC from scratch. You are NOT allowed to use any libraries or packages to implement these two things for you. You...

  • 1. Which 802.11 standard has the best performing parameters in terms of data rate, range, channel...

    1. Which 802.11 standard has the best performing parameters in terms of data rate, range, channel separation issues and interoperability? 802.11n 802.11b 802.11g 802.11a 2. WPA2 uses IEEE 802.X with the Extensible Authentication Protocol (EAP) to perform mutual authentication, either via a _________ server or by means of a changing key generated on the basis of a shared secret pass-phrase. AES RADIUS WEP Common 3. At the MAC level, 802.11 LANs involve the use of ______ for medium access control....

  • 41. Which of the following cipher systems uses polyalphabetic substitution? A. Vigenère B. Substitution C. Transposition...

    41. Which of the following cipher systems uses polyalphabetic substitution? A. Vigenère B. Substitution C. Transposition D. Shift 42. Which encryption algorithm can have key sizes of 128, 192, and 256 bits, with the key size affecting the number of rounds used in the algorithm? A. SHA B. RC С. AES D. DES 43. Which of the following security principles ensures that the sender and the recipient of a message are informed that the message was not altered in transmission?...

ADVERTISEMENT
Free Homework Help App
Download From Google Play
Scan Your Homework
to Get Instant Free Answers
Need Online Homework Help?
Ask a Question
Get Answers For Free
Most questions answered within 3 hours.
ADVERTISEMENT
ADVERTISEMENT
ADVERTISEMENT