Answered step by step
Verified Expert Solution
Link Copied!

Question

1 Approved Answer

Wireless network security relies on ARP - the Airway Recryption Protocol should not rely on WEP - the Wired Equivalence Protocol is not needed in

Wireless network security

relies on ARP - the Airway Recryption Protocol

should not rely on WEP - the Wired Equivalence Protocol

is not needed in a point-to-point wireless link because no one else can receive the radio signal

is impossible because the data is transmitted through the air and anyone can capture those signals

Conversational audio and video

relies on the network to be able to deliver the data with high latency and variable network delay

must overcome variable network delay and latency

should deliver network data with more than a 1000 ms delay

can overcome any network delivery issues with sufficient buffering

The IPSec protocol secures data by adding encryption

at the network layer

between the application and transport layers

at the data link layer

at the physical layer

In terms of network management, MIB is

the men in black, otherwise known as network administrators who must always wear sunglasses so that the blinking lights of switches and routers don't cause them to forget the OSI data model

a distributed store/database of network management data

the data definition langauge for network management data

the protocol for communicating network management data between managed devices and managing entities

Streaming stored audio and video

requires that network delays do not exceed 400 ms

overcomes many network related issues by relying on the inherent re-transmission capability in UDP

can be stored on different servers at different bitrates to meet the needs of users

requires that the entire file is downloaded by the client prior to playback

Wireless networks use CSMA-CA (carrier sense, multiple access, collision avoidance) instead of CSMA-CD (carrier sense, multiple access, collision detection) that is used on wired networks because

wireless network nodes cannot "hear" all other nodes on the network and therefore cannot rely on hearing other transmissions to determine if the network is busy or not

wireless network nodes can "hear" all other network nodes, unlike in a wired network, so they don't have to detect collisions

signal propagation in a wireless network is uni-directional and follows guided network paths, so collision detection isn't needed

wireless nodes can move, so radio wave collision must be avoided as nodes move around the network

If "Trudy" wishes to do harmful things to the communication between "Bob" and "Alice", she can attempt to do all except

eavesdrop - intercept messages

impersonate either Bob or Alice

hijack the connection, and become a "man-in-the-middle"

crack the AES encryption key easily because of how poorly AES was designed

Select the best authenitcation method that Alice can use to prove who she is to Bob

she can send Bob a hash of her username to prove she is Alice

she can send an encrypted version of her password to Bob to prove that she is Alice

Bob sends a nonce to Alice, which she encrypts with her password as the key, and sends the result back to Bob

she can just send her password to Bob and Bob can validate the password against the database

Message integrity is

that messages can only be sent anonymously between senders and receivers

the sending and receiving of messages securely, so that only the two of them can understand the contents of their messages

that messages cannot be modified without detection

that messages can be communicated at any time when desired by the sender and receiver

Jitter in digital video transmission

is caused by variable network delay

is caused by the user shaking the camera violently

is caused by green blocks of video being transmitted to the receiver

is caused by constant network delay

ASN.1 addresses the problem of

translation between different types of SNMP messages

asynchronous system notation between similar systems

autonomous system networking

the study of national networks through the association for the study of nationalities

Step by Step Solution

There are 3 Steps involved in it

Step: 1

blur-text-image

Get Instant Access to Expert-Tailored Solutions

See step-by-step solutions with expert insights and AI powered tools for academic success

Step: 2

blur-text-image

Step: 3

blur-text-image

Ace Your Homework with AI

Get the answers you need in no time with our AI-driven, step-by-step assistance

Get Started

Recommended Textbook for

More Books

Students also viewed these Databases questions

Question

Design and implement effective change communication.

Answered: 1 week ago