Question

In: Computer Science

True or False? Wireless ad hoc networks are distributed networks that work without fixed infrastructures and...

  1. True or False? Wireless ad hoc networks are distributed networks that work without fixed infrastructures and in which each network node is willing to forward network packets for other network nodes.

4. True or False? WEP is designed to protect linkage-level data for wireless transmission by providing confidentiality, access control, and data integrity, to provide secure communication between a mobile device and an access point in a 802.11 wireless LAN.

5. True or False? The WPA standard is aimed at providing a stronger security compared to WEP and is expected to tackle most of the weakness found in WEP.

3. Secure Efficient Ad hoc Distance (SEAD) vector routing is a design based on a:

A. Secure on-demand routing protocol.

B. ROUTE RQUEST.

C. Message Authentication Code (MAC).

D. Authenticated Routing for Ad hoc Networks (ARAN).

E. Destination-Sequenced Distance Vector (DSDV) routing.

Ans:

4. What requires a trusted certificate server, where the public key is known to all valid nodes?

A. ARAN.

B. RDP.

C. REP.

D. ERR.

E. All of the above.

5. What is a secure routing protocol for an ad hoc network building based on link state protocols?

A. Neighbor Lookup Protocol (NLP).

B. Secure Link State Routing Protocol (SLSP).

C. Bootstrapping protocol.

D. Preauthentication protocol.

E. All of the above.

Solutions

Expert Solution

[4] True
Reason : Wired Equivalent Privacy (WEP). WEP is designed to provide secure communication between the device and an access point (AP) wireless LAN.

[5] True
Reason : WPA, or Wi-Fi Protected Access aims to provide stronger wireless data encryption than WEP,

[3] [E] Destination-Sequenced Distance Vector (DSDV) routing
Reason : An ad hoc network is a collection of wireless computers (nodes), communicating among themselves. ad hoc network routing protocol based on the design of the Destination-Sequenced Distance-Vector routing protocol (DSDV).

[4] [A] ARAN
Reason : Authenticated Routing for Ad hoc Networks (ARAN) is a routing protocol for ad hoc networks with authentication enabled.

[5] [B] Secure Link State Routing Protocol (SLSP).
Reason : Secure Link State Routing Protocol (SLSP) consider each node has a public/private key pair and has the capability of signing and verifying digital signatures.


Related Solutions

Q.4.     A) How Data Dissemination in Vehicular Ad hoc Networks (VANETs) is achieved?
Q.4.     A) How Data Dissemination in Vehicular Ad hoc Networks (VANETs) is achieved?
1. (30) True or False (explain your answer briefly. A simple "true" or "false" without explanation...
1. (30) True or False (explain your answer briefly. A simple "true" or "false" without explanation will get zero point) a) (6 points) An upper stream manufacturing rm merges with another downstream distri- bution firm so as to engage in price discrimination. Such a vertical merger will decrease all consumer'swelfare. b) (6 points) Two firms merge together, only if the transaction cost must be reduced. c) (6 points) Specic human capital is a barrier of vertical integration. d) (6 points)....
True or False: Any organized rhythm without a pulse is defined as pulseless electrical activity (PEA). True False...
True or False: Any organized rhythm without a pulse is defined as pulseless electrical activity (PEA). True False True or False: Synchronized cardioversion is appropriate for treating an unknown wide complex tachycardia. True False True or False: The right side of the heart is responsible for pulmonary circulation. True False True or False: Any bradycardia less than 60 beats per minute is a pathologic event. True False True or False: The most effective treatment for ventricular fibrillation is defibrillation. True...
True or False (xvi) Device drivers are a part of user interface. (xvii) Star networks are...
True or False (xvi) Device drivers are a part of user interface. (xvii) Star networks are same as networks of computers used to process data about stars in the sky. (xviii) 1 petabyte equals 253 bits. (xix) Auditing software in the context of operating systems is a software that creates a software during an attack on a computer/computers, to defend the computer/computers. (xx) A dispatcher in the context of operating systems chooses the activities to consider for execution.
True or False (xi) There are multiple criteria for classifying computer networks. (xii) The only way...
True or False (xi) There are multiple criteria for classifying computer networks. (xii) The only way to create a larger computer network from bus networks is to connected them with a bridge. (xiii) File manager is a part of user interface. (xiv) Booting is the process of transferring the operating system from the main memory to the mass storage. (xv) 1 exabyte equals 250 kilobytes.
Briefly explain whether the following statement is true or false. In the AD-AS model, monetary policy...
Briefly explain whether the following statement is true or false. In the AD-AS model, monetary policy cannot stabilize both the price level and the level of real GDP following a shock to aggregate supply. Please answer elaborately with proper reasoning, graphs and equations. Also include a policy example.
Question 1. true or false or uncertain, explain briefly a) Consider a standard AD-AS model. —If...
Question 1. true or false or uncertain, explain briefly a) Consider a standard AD-AS model. —If the SRAS curve is steep,a permanent increase in investment that increases potential output leads to a relatively large short-run increase in inflation but no long-run increase in inflation. Answer true,false,or uncertain.Please briefly explain your answer. b) Consider a closed economy. —The introduction of a fiscal stimulus package (i.e., more government purchases)will decrease real interest rates and the equilibrium quantity of saving supplied and demanded...
True of False: Vitamins and minerals are very important to health, they are absorbed without any...
True of False: Vitamins and minerals are very important to health, they are absorbed without any change during digestion. (     ) The human body needs fatty acids, and it can make all but two of them—linoleic acid (the 18-carbon omega-8 fatty acid) and linolenic acid (the 18-carbon omega-3 fatty acid). (     ) Sometimes a nonessential amino acid might become essential under special circumstances. (    ) the cells of the pancreas do not make the protein hemoglobin, which is needed only...
True of False: Vitamins and minerals are very important to health, they are absorbed without any...
True of False: Vitamins and minerals are very important to health, they are absorbed without any change during digestion. (     ) The human body needs fatty acids, and it can make all but two of them—linoleic acid (the 18-carbon omega-8 fatty acid) and linolenic acid (the 18-carbon omega-3 fatty acid). (     ) Sometimes a nonessential amino acid might become essential under special circumstances. (    ) the cells of the pancreas do not make the protein hemoglobin, which is needed only...
WAP purpose is to allow web access on low-bandwidth high-latency wireless links. True or false
WAP purpose is to allow web access on low-bandwidth high-latency wireless links. True or false
ADVERTISEMENT
ADVERTISEMENT
ADVERTISEMENT