100% satisfaction guarantee Immediately available after payment Both online and in PDF No strings attached
logo-home
CNM 324 Chapter 3,4,5,6,7,9,11 Final Exam || very Flawless. $12.99   Add to cart

Exam (elaborations)

CNM 324 Chapter 3,4,5,6,7,9,11 Final Exam || very Flawless.

 9 views  0 purchase
  • Course
  • CNM 324 Chapter 3,4,5,6,7,9,11
  • Institution
  • CNM 324 Chapter 3,4,5,6,7,9,11

CCMP/AES encryption adds an extra 16 bytes to the body of an 802.11 data frame. Where are these bytes added? (Choose all that apply.) correct answers 8 bytes to the CCMP trailer Correct! 8 bytes to the CCMP header Correct! 8 bytes to the MIC 16 bytes to the CCMP header You have implemented an...

[Show more]

Preview 3 out of 23  pages

  • July 26, 2024
  • 23
  • 2023/2024
  • Exam (elaborations)
  • Questions & answers
  • CNM 324 Chapter 3,4,5,6,7,9,11
  • CNM 324 Chapter 3,4,5,6,7,9,11
avatar-seller
FullyFocus
CNM 324 Chapter 3,4,5,6,7,9,11 Final Exam || very Flawless.
CCMP/AES encryption adds an extra 16 bytes to the body of an 802.11 data frame. Where are these bytes added? (Choose all that apply.) correct answers 8 bytes to the CCMP trailer
Correct! 8 bytes to the CCMP header
Correct! 8 bytes to the MIC
16 bytes to the CCMP header
You have implemented an all 802.11n network using TKIP. You notice that none of the 802.11n-
compliant devices are using any of the higher data rates offered by 802.11n. What is the most likely cause of this problem? correct answers All of the APs are only 1X1:1 MIMO.
All of the stations are only 1X1:1 MIMO.
TKIP is adding too much overhead.
Correct! 802.11n limits the data rates when using legacy security.
CCMP using AES uses which block size? correct answers 24 bit
48 bit
104 bit
Correct! 128 bit
When using asymmetric encryption, which key is responsible for encrypting the transmission? correct answers The Master key
The Temporal key
The Private key
Correct! The Public key
When using asymmetric encryption, which key is responsible for decrypting the transmission? correct answers The Public key
Correct! The Private key
The Master key
The Temporal key
What are the lengths of the encryption keys available when using AES? (Choose all that apply.) correct answers Correct! 192 bits
Correct! 256 bits
64 bits
Correct! 128 bits
What is the main weakness in a PSK network? correct answers The IV is at most only 48 bits long.
The static key is at most only 104 bits long.
Correct! Keys are easily compromised.
The 4-Way Handshake is in clear text.
Symmetric key encryption is used by WEP and TKIP. What does this mean in relation to the encryption keys used? correct answers The AP uses a stronger key. The STA uses a stronger key.
The 4-Way Handshake is not needed.
Correct! They are the same on the AP and STA
Is the CCMP header encrypted? correct answers Only when using 802.1X authentication
Only when using Enterprise Root Certificates
Only when using EAP/PEAP
Correct! The CCMP header is not encrypted.
Where is the AES algorithm defined? correct answers In WPA/2
All of the above
In 802.1X
In 802.11i
Correct! In FIPS
CCMP/AES encryption adds an extra of overhead to the body of an 802.11 data frame. correct answers 12 bytes
20 bytes
None of the above
Correct! 16 bytes
10 bytes
TKIP/ARC4 encryption adds an extra of overhead to the body of an 802.11 MPDU. correct answers Correct! 20 bytes
16 bytes
12 bytes
10 bytes
None of the above
An HT client STA is transmitting to an HT AP using modulation and coding scheme (MCS) #12 that defines 16 QAM modulation, two spatial streams, a 40 MHz bonded channel, and an 800 ns ‐ ‐
guard interval to achieve a data rate of 162 Mbps. According to the IEEE, which types of encryption should be used by the HT client STA? (Choose all that apply.) correct answers Static WEP
Dynamic WEP
Correct Answer CCMP/AES
All of the above
TKIP/ARC4
CCMP/AES uses a temporal key and encrypts data in blocks. correct answers 192 bit, 256 bit ‐ ‐
256 bit, 256 bit‐ ‐
Correct! 128 bit, 128 bit ‐ ‐
128 bit, 192 bit‐ ‐
192 bit, 192 bit‐ ‐ When using an encryption suite that implements an asymmetric algorithm, which of the following statements is true? (Choose all that apply.) correct answers Asymmetric algorithms generally are faster than symmetric algorithms.
Both the encrypting and decrypting parties share the same key.
Correct Answer Public and private encryption keys must be generated.
Correct! Asymmetric algorithms generally are slower than symmetric algorithms.
Andy calls the help desk for assistance with sending an encrypted message to Chris. Without knowing what type of security protocol and encryption Andy and Chris are using, which of the answers here could make the following scenario true? In order for Andy to send an encrypted message successfully to Chris, Andy is told to enter on his computer; Chris needs to enter on his computer. (Choose all that apply.) correct answers Correct! A public key, the companion private key
A private key, the companion public key
Correct! A symmetric key, the same symmetric key
An asymmetric key, the same asymmetric key
The IEEE 802.11 2012 standard states which of the following regarding 802.11n data rates and ‐
encryption? (Choose all that apply.) correct answers WEP cannot be used; however, TKIP can be
used if also using 802.1X.
Any encryption defined by the standard is allowed.
Correct! CCMP can only be used.
Correct! WEP and TKIP must not be used.
Given that CCMP uses a MIC for data integrity to protect the frame body and portions of the MAC header, what information needs to be constructed to protect certain fields in the MAC header? correct answers IV
Correct! AAD
Nonce
Extended IV
ICV
PN
Which of the following is a FIPS encryption standard that uses a single 56 bit symmetric key? ‐
(Choose all that apply.) correct answers RC4
Correct! DES
3DES
RC5
AES
CCMP is an acronym made up of multiple components. Which of the following is an expanded version of this acronym? (Choose all that apply) correct answers None of these is accurate.
Correct! CTR with CBC MAC Protocol ‐
Correct! Counter Mode with CBC MAC Protocol ‐
Counter Message with Cipher Block Chaining Mode Authentication Code Protocol ‐
Correct! Counter Mode with Cipher Block Chaining Message Authentication Code Protocol ‐

The benefits of buying summaries with Stuvia:

Guaranteed quality through customer reviews

Guaranteed quality through customer reviews

Stuvia customers have reviewed more than 700,000 summaries. This how you know that you are buying the best documents.

Quick and easy check-out

Quick and easy check-out

You can quickly pay through credit card or Stuvia-credit for the summaries. There is no membership needed.

Focus on what matters

Focus on what matters

Your fellow students write the study notes themselves, which is why the documents are always reliable and up-to-date. This ensures you quickly get to the core!

Frequently asked questions

What do I get when I buy this document?

You get a PDF, available immediately after your purchase. The purchased document is accessible anytime, anywhere and indefinitely through your profile.

Satisfaction guarantee: how does it work?

Our satisfaction guarantee ensures that you always find a study document that suits you well. You fill out a form, and our customer service team takes care of the rest.

Who am I buying these notes from?

Stuvia is a marketplace, so you are not buying this document from us, but from seller FullyFocus. Stuvia facilitates payment to the seller.

Will I be stuck with a subscription?

No, you only buy these notes for $12.99. You're not tied to anything after your purchase.

Can Stuvia be trusted?

4.6 stars on Google & Trustpilot (+1000 reviews)

82871 documents were sold in the last 30 days

Founded in 2010, the go-to place to buy study notes for 14 years now

Start selling
$12.99
  • (0)
  Add to cart