In: Computer Science
4. True or False? WEP is designed to protect linkage-level data for wireless transmission by providing confidentiality, access control, and data integrity, to provide secure communication between a mobile device and an access point in a 802.11 wireless LAN.
5. True or False? The WPA standard is aimed at providing a stronger security compared to WEP and is expected to tackle most of the weakness found in WEP.
3. Secure Efficient Ad hoc Distance (SEAD) vector routing is a design based on a:
A. Secure on-demand routing protocol.
B. ROUTE RQUEST.
C. Message Authentication Code (MAC).
D. Authenticated Routing for Ad hoc Networks (ARAN).
E. Destination-Sequenced Distance Vector (DSDV) routing.
Ans:
4. What requires a trusted certificate server, where the public key is known to all valid nodes?
A. ARAN.
B. RDP.
C. REP.
D. ERR.
E. All of the above.
5. What is a secure routing protocol for an ad hoc network building based on link state protocols?
A. Neighbor Lookup Protocol (NLP).
B. Secure Link State Routing Protocol (SLSP).
C. Bootstrapping protocol.
D. Preauthentication protocol.
E. All of the above.
[4] True
Reason : Wired Equivalent Privacy (WEP). WEP is designed to provide
secure communication between the device and an access point (AP)
wireless LAN.
[5] True
Reason : WPA, or Wi-Fi Protected Access aims to provide stronger
wireless data encryption than WEP,
[3] [E] Destination-Sequenced Distance Vector (DSDV)
routing
Reason : An ad hoc network is a collection of wireless computers
(nodes), communicating among themselves. ad hoc network routing
protocol based on the design of the Destination-Sequenced
Distance-Vector routing protocol (DSDV).
[4] [A] ARAN
Reason : Authenticated Routing for Ad hoc Networks (ARAN) is a
routing protocol for ad hoc networks with authentication
enabled.
[5] [B] Secure Link State Routing Protocol (SLSP).
Reason : Secure Link State Routing Protocol (SLSP) consider each
node has a public/private key pair and has the capability of
signing and verifying digital signatures.