A on a windows-based laptop computer the security registry


True/False Questions (NO explanation is needed):

(a) On a Windows-based laptop computer the SECURITY registry file maintains a list of the host computer's wireless connections.

(b) IEEE 802.11 Security Standard WEP (Wired Equivalent Privacy) uses CRC checksum for its data integrity protection.

(c) IEEE 802.11 Security Standard WEP (Wired Equivalent Privacy) sends the Initialization Vector (IV) value, when it is included in a frame/packet, in clear text during transmission.

(d) Wireless stations (clients) may be connected (communicating) directly with each other when the network is operating in the Infrastructure Mode.

(e) The services and protocols specified in the IEEE 802 family map to the top two layers of the OSI (Open Systems Interconnection) 7-layer model.

(f) The RC4 cipher used in WEP (Wired Equivalent Privacy) is not an open-source cipher.

(g) Suppose an electromagnetic wave has a frequency of f cycles/second, period T seconds/cycle, and wave length W meters/cycle. These quantities are related by the equation c = W/T when the waves are transmitted in a vacuum, where c = the speed of light ? 3?108 meters/second.

(h) The infrared frequency is generally higher than the radio frequency,

(i) Encoding and decoding wireless signals is a function of the MAC (medium access control) layer of the 802.11 protocol.

(j) Wi-Fi Alliance is not a US regulatory agency.

(k) The three interframe space (IFS) values used in frame transmissions of an 802.11 network are related by the following: DIFS < PIFS < SIFS.

(l) Each 802.11 MAC frame must include at least two MAC addresses (for sender and receiver, respectively).

(m) An 802.11 MAC frame with the subtype value 1100 (in binary, arranged from left to right, most significant bit to least significant bit) is a deauthentication frame.

(n) Typical client authentication process of 802.11 networks requires a client first be associated with an AP (access point) before being authenticated.

(o) The PTW attack against a WEP-protected wireless network exploited the flaw due to RC4's weak keys.

Solution Preview :

Prepared by a verified Expert
History: A on a windows-based laptop computer the security registry
Reference No:- TGS02940201

Now Priced at $10 (50% Discount)

Recommended (99%)

Rated (4.3/5)

2015 ┬ęTutorsGlobe All rights reserved. TutorsGlobe Rated 4.8/5 based on 34139 reviews.