PrepAway - Latest Free Exam Questions & Answers

Which of the following encryption algorithms is used by Wired Equivalent Privacy (WEP)?

Which of the following encryption algorithms is used by Wired Equivalent Privacy (WEP)?

PrepAway - Latest Free Exam Questions & Answers

A.
RSA

B.
RC4

C.
TKIP

D.
CCMP

Explanation:
WEP encryption uses the RC4 stream cipher with 40 or 104-bit keys and a 24-bit initialization vector. In cryptography, RC4 (also known as ARC4 or ARCFOUR) is the most widely-used software stream cipher and is used in popular protocols such as Secure Sockets Layer (SSL) (to protect Internet traffic) and WEP (to secure wireless networks). RC4 generates a pseudorandom stream of bits (a keystream) which, for encryption, is combined with the plaintext using Bit-wise Exclusive- OR; decryption is performed the same way. To generate the keystream, the cipher makes use of a secret internal state which consists of two parts:
1. A permutation of all 256 possible bytes.
2. Two 8-bit index-pointers.
The permutation is initialized with a variable length key, typically between 40 and 256 bits, using the keyscheduling algorithm (KSA). Once this has been completed, the stream of bits is generated using the pseudo-random generation algorithm (PRGA).

Answer options A is incorrect. In cryptography, RSA (which stands for Rivest, Shamir, and Adleman, who first publicly described it) is an algorithm for public-key cryptography. It is the first algorithm known to be suitable for signing as well as
encryption, and was one of the first great advances in public key cryptography. RSA is widely used in electronic commerce protocols, and is believed to be secure givensufficiently long keys and the use of up-to-date implementations. Answer option C is incorrect. Temporal Key Integrity Protocol or TKIP is a security protocol used in the IEEE 802.11 wireless networking standard. TKIP is vulnerable to a keystream recovery attack that, if successfully executed, permits an attacker to transmit 7-15 packets of the attacker’s choice on the network. Answer option D is incorrect. CCMP (Counter Mode with Cipher Block Chaining Message Authentication Code Protocol) is an IEEE 802.11i encryption protocol created to replace both TKIP, the mandatory protocol in WPA, and WEP. CCMP, part of the 802.11i standard, uses the Advanced Encryption Standard (AES) algorithm. Unlike in TKIP, key management and message integrity is handled by a single component built around AES using a 128-bit key, a 128-bit block, and 10 rounds of encoding per the FIPS 197 standard.

Reference: http://en.wikipediA.org/wiki/

You work as a Network Administrator for Tech Perfect Inc. The company has a Windows Server 2008 network environment. The network is configured as a Windows Active Directory-based single forest domain-based network. The company has recently provided fifty laptops to its sales team members. You are required to configure an 802.11 wireless network for the laptops. The sales team members must be able to use their data placed at a server in a cabled network. The planned network should be able to handle the threat of unauthorized access and data interception by an unauthorized user. You are also required to prevent the sales team members from communicating directly to one another.


Leave a Reply