d.
Radio frequency scrambling attack76. b.
Exploitation of unencrypted management messages can result in subtle denial-of-service (DoS), replay, or manipulation attacks that are difficult to detect. These attacks spoof management messages. A water torture attack is an example of subtle DoS attack in which an adversary drains a client node’s battery by sending a constant series of management messages to the SS/MS. Radio frequency (RF) jamming is classified as a DoS attack. RF scrambling attacks are the precise injections of RF interference during the transmission of specific management messages. A man-in-the-middle (MitM) attack occurs when an adversary deceives an SS/MS to appear as a legitimate base station (BS) while simultaneously deceiving a BS to appear as a legitimate SS/MS.77. Regarding worldwide interoperability for microwave access (WiMAX) security, which of the following is
not a weakness of data encryption standard-cipher block chaining (DES-CBC) algorithm?a.
Replay attackb.
Denial-of-service attackc.
Eavesdropping attackd.
Man-in-the-middle attack77. a.
The weaknesses of data encryption standard-cipher block chaining (DES-CBC) are well documented, and include denial-of-service (DoS), eavesdropping, and man-in-the-middle (MitM) attacks. Replay attacks occur when adversaries reuse expired traffic encryption keys (TEKs). Replay attacks lead to unauthorized disclosure of information and compromise of the TEK. 78. For worldwide interoperability for microwave access (WiMAX) security, denial-of-service (DoS) attacks occur due to which of the following?
1.
Lack of mutual authentication2.
Use of nonunicast messages3.
Use of wireless technology as a communications medium4.
Use of unencrypted management messagesa.
1 and 2b.
1 and 3c.
2 and 3d.
1, 2, 3, and 478. d.
Lack of mutual authentication occurs between subscriber’s station (SS) and base station (BS). This may enable a rogue BS operator to degrade performance or steal information by conducting denial-of-service (DoS) or forgery attacks against client SSs. In unencrypted management messages, nonunicast messages open WiMAX systems to DoS attacks. In the use of wireless as a communications medium, a DoS attack can be executed by the introduction of a powerful radio frequency (RF) source intended to overwhelm system radio spectrum. 79. For worldwide interoperability for microwave access (WiMAX) security, replay attacks occur due to which of the following?
1.
Injection of reused traffic encryption key2.
Insecure unicast messages3.
Unencrypted management messages4.
Insecure nonunicast messagesa.
1 and 2b.
1 and 3c.
2 and 3d.
3 and 479. b.
Replay attacks occur due to injection of reused traffic encryption key (TEK) and unencrypted management messages. Integrity checks are added to unicast messages to prevent replay attacks. Nonunicast messages are open to DoS attacks. 80. For worldwide interoperability for microwave access (WiMAX) security, a countermeasure for man-in-the-middle (MitM) attack is:
a.
DES-CBCb.
AES-CCMc.
AES onlyd.
VPN only80. b.
If a WiMAX system is not using the advanced encryption standard Counter with CBC message authentication code (AES-CCM), it can open up the possibility of a MitM attack. Data encryption standard-cipher block chaining (DES-CBC) is a weak algorithm that cannot ensure confidentiality of data and may lead to MitM attack. Virtual private network (VPN) is a mature technology and cannot defend against the MitM attacks. The advanced encryption standard (AES) is not as strong as the AES-CCM. 81. Which of the following worldwide interoperability for microwave access (WiMAX) operating topologies uses only the non-line-of-sight (NLOS) signal propagation?
a.
Point-to-pointb.
Point-to-multipointc.
Multihop relayd.
Mobile