PrepAway - Latest Free Exam Questions & Answers

Which of the following is designed to detect bit-flipping and forgery attacks that are used against WEP?

Which of the following is designed to detect bit-flipping and forgery attacks that are used against WEP?

PrepAway - Latest Free Exam Questions & Answers

A.
Cyclic redundancy check (CRC)

B.
Initialization vector (IV)

C.
Message authentication code (MAC)

D.
Message integrity code (MIC)

Explanation:
Message integrity code (MIC) is designed to detect bit-flipping and forgery attacks. During a bit-flip attack, an intruder intercepts and alters an encrypted message and retransmits it. The receiver then accepts the retransmitted message. The MIC, which is implemented on both the access point and all associated client devices, adds a few bytes to each packet to make the packets tamper- proof.

Answer B is incorrect. An initialization vector (IV) is a block of bits that is required to allow a stream cipher or a block cipher to be executed in any of several streaming modes of operation to produce a unique stream independent from other streams produced by the same encryption key, without having to go through a rekeying process. The size of the IV depends on the encryption algorithm and on the cryptographic protocol in use and is normally as large as the block size of the cipher or as large as the encryption key. The IV must be known to the recipient of the encrypted information to be able to decrypt it.

Answer A is incorrect. Cyclic redundancy check (CRC) is an error-checking mechanism used by Frame Relay. In order to determine whether errors occurred during the transmission from source to destination, CRCcompares two calculated values. By implementing error checking rather than error correction, Frame Relay reduces network overhead. CRC is popular because it is simple to implement in binary hardware. It is also easy to analyze mathematically, and good at detecting common errors caused by noise in transmission channels.

Answer C is incorrect. Message authentication code (MAC) is a mechanism that applies an authentication scheme and a secret key to a message, so that the message can only be verified by the intended recipient. It provides integrity checks based on the secret key. Typically, message uthentication codes are used between two parties that share a secret key to authenticate information transmitted between them.
Reference. http.//en.wikipediA.org/wiki/Wired_Equivalent_Privacy


Leave a Reply