Question

In: Computer Science

1. You have the choice of selecting a networking device with WEP or a device with...

1. You have the choice of selecting a networking device with WEP or a device with WPA. Which offers better

     security and why?

2.

The term association is characterized by which of the following?

a.

Describe the MAC address of the client.

b.

Prevent excessive routing.

c.

Describe that a wireless connection has been obtained.

d.

Prevent unauthorized network access.

3.

Wi-Fi is which of the following?

a.

The Wi-Fi Alliance, which is an organization that tests and certifies wireless equipment for compliance with the 802.11x standards

b.

None of these answers are correct

c.

The Wi-Fi Alliance, which is an organization that assembles and tests wireless equipment before it is shipped to the vendors

d.

The Wi-Fi Alliance, which is an organization that tests and certifies wireless equipment for compliance with the 803.1 standards

Solutions

Expert Solution

1. You have the choice of selecting a networking device with WEP or a device with WPA. Which offers better security and why?

Answer:

WEP stands for Wired Equivalent Privacy

  • WEP has 802.11 standard for Wi-Fi networks
  • WEP protocol uses cipher (RC4) as WEP
  • It uses 64-bit or 128-bit key
  • WEP has a number of vulnerabilities andit is possible to break into any WEP network by using a brute-force method to decipher the key.

WPA stands for Wireless Protected Access

  • WPA is newer standard and is much more secure than WEP
  • WPA protocol uses the same cipher (RC4) as WEP but it includes TKIP (Termporal Key Integrity Protocol) to make it harder to decipher the key.

WPA offers better security than WEP

Although there is a newer wifi technology which offer even better security than WPA termed as WPA2

2.The term association is characterized by which of the following?

Answer: c. Describe that a wireless connection has been obtained.

  • WiFi Association basically means that you have authenticated with the AP, and are now 'linked' to it, so that the AP knows to act as the network bridge for your device, so traffic can be routed to and from your device.

3.Wi-Fi is which of the following?

Answer: The Wi-Fi Alliance, which is an organization that tests and certifies wireless equipment for compliance with the 802.11x standards

  • Wi-Fi is a family of wireless network protocols, based on the IEEE 802.11 family of standards, which are commonly used for local area networking of devices and Internet access
  • Wi-Fi uses multiple parts of the IEEE 802 protocol family and is designed to interwork seamlessly with its wired sibling Ethernet.

If you have any doubts, leave a comment below before rating. I'll be happy to assist you further


Do UPVOTE this as I have put a lot of EFFORT in answering this question. It really helps me.


Related Solutions

Greenwork Accessories assembles a computer networking device from kits of imported components. You have been asked...
Greenwork Accessories assembles a computer networking device from kits of imported components. You have been asked to develop a quarterly and annual operating budget and pro- forma income statements for 2016. You have obtained the following information: 20 points Beginning-of-year balances Cash . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . ....
Works Accessories assembles a computer networking device from kits of imported components. You have been asked...
Works Accessories assembles a computer networking device from kits of imported components. You have been asked to develop a quarterly and annual operating budget and pro- forma income statements for 2016. You have obtained the following information: Beginning-of-year balances Cash . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . ....
There is no question the router plays a vital role in networking. If this device were...
There is no question the router plays a vital role in networking. If this device were to be controlled by an attacker, then the entire CIA goal can be violated. As such, you can argue about the need to protect the router administratively, physically, and technically. Our focus again is on the technical part. Having said this, discuss the methods that can be used on a standard IOS router that will prevent unauthorized access to the router. Also, discuss how...
QUESTION 1 (10 marks) (12 minutes) Answer the following multiple-choice questions. Indicate your choice by selecting...
QUESTION 1 (12 minutes) Answer the following multiple-choice questions. Indicate your choice by selecting only one option from the four options given for each question answered. (a) Which one of the following is not considered to be an enhancing qualitative characteristic to ensure the usefulness of information that is already relevant and faithfully represented in terms of The Conceptual Framework for Financial Reporting 2018? 1) Completeness; 2) Comparability; 3) Timeliness; 4) Understandability. (b) Which one of the following is not...
QUESTION 1 (10 marks) Answer the following multiple-choice questions. Indicate your choice by selecting only one...
QUESTION 1 Answer the following multiple-choice questions. Indicate your choice by selecting only one option from the four options given for each question answered. (a) Which one of the following is not considered to be an enhancing qualitative characteristic to ensure the usefulness of information that is already relevant and faithfully represented in terms of The Conceptual Framework for Financial Reporting 2018? 1) Completeness; 2) Comparability; 3) Timeliness; 4) Understandability. (b) Which one of the following is not an objective...
Assess the most important criteria for selecting networking devices at the core, access, and distribution layers...
Assess the most important criteria for selecting networking devices at the core, access, and distribution layers in a campus network; explain the 2-3 selection criteria that you feel are most critical in a campus network. Analyze and explain the primary security technologies and devices typically employed in a campus network.
1) You have a device that wants to transmit many packets to a router, which is...
1) You have a device that wants to transmit many packets to a router, which is sometimes busy serving other users. At every second, your device attempts to send a packet. It succeeds with probability 1/5 and the success of any attempt is independent of the success of other attempts. What is the average number of attempts until the first success? 2)You have a device that wants to transmit many packets to a router, which is sometimes busy serving other...
Read the article: Selecting the Way to the Moon: The Choice of the Lunar Orbital Rendezvous...
Read the article: Selecting the Way to the Moon: The Choice of the Lunar Orbital Rendezvous Mode: 1) Outline the alternative architectures that were under consideration for the Apollo missions. 2) Discuss the pros and cons of each and why LOR became the preferred architecture
you will have a choice to conduct an interview with a spiritual leader (Option 1) or...
you will have a choice to conduct an interview with a spiritual leader (Option 1) or write a paper based on John Hick's pluralistic hypothesis regarding the Dalai Lama (Option 2). You are strongly encouraged to choose between Option 1 and Option 2 as early as feasible and then plan accordingly, though you are required to inform the instructor of the chosen option by the conclusion of Module 5. You are encouraged to review each option fully and choose the...
You are currently troubleshooting a networking issue. You have narrowed down the IP address that is...
You are currently troubleshooting a networking issue. You have narrowed down the IP address that is causing the issue, but you need to know the host name of the computer. What command would give you this information? The internet browser is unable to find the host you are trying to reach. What command(s) should you use to try to rectify the situation?
ADVERTISEMENT
ADVERTISEMENT
ADVERTISEMENT