Prev Question
Next Question

In wireless communication, which of the following controls allows the device receiving the
communications to verify that the received communications have not been altered in transit?

A.
Device authentication and data origin authentication

B.
Wireless intrusion detection (IDS) and prevention systems (IPS)

C.
The use of cryptographic hashes

D.
Packet headers and trailers

Explanation:
Calculating cryptographic hashes for wireless communications allows the device receiving the
communications to verify that the received communications have not been altered in transit. This
prevents masquerading and message modification attacks. Device authentication and data origin
authentication is not the correct answer since authenticating wireless endpoints to each other
prevents man-in-the-middle attacks and masquerading. Wireless iDS/lPSs is not the correct answer
since wireless IDS/lPSshave the ability to detect misconfigured devices and rogue devices, and
detect and possibly stop certain types of attacks. Packet headers and trailers alone do not ensure
that the content has not been altered.

Prev Question
Next Question
Tagged:

Leave a Reply

Your email address will not be published. Required fields are marked *