QUESTION 14 A_attack on WEP involves viewing collisions to derive plaintext valu
ID: 3739974 • Letter: Q
Question
QUESTION 14 A_attack on WEP involves viewing collisions to derive plaintext values O capture O keystream o weak key O pseudo-random number QUESTION 15 When a wireless connection is made using preshared keys, what does the preshared key (passphrase) become in the secure connection? PMK O GTK PTK O Nothing, it is discarded QUESTION 16 What feature of a WIPS solution can be used to physically locate a nonapproved wireless device? O RF signature analysis O RF calibration O Rogue triangulation O Rogue containmentExplanation / Answer
ANSWER:-
Question (1) option (b) keystream
Question (2) option (a) PMK
Question (3) option (a) RF Signature analysis
Stream ciphers, where plaintext bits are combined with a cipher bit stream by an exclusive-or operation (xor), can be very secure if used properly. However, they are vulnerable to attacks if certain precautions are not followed: