Network Security Questions and Answers – Overview – II

This set of Network Security Aptitude Test focuses on “Overview – II”.

1. __________ services are implemented in every 802.11 station, including AP stations. _________ services are provided between BSSs.
a) Station, Distribution
b) Distribution, Station
c) Extended, Basic
d) Basic, Extended
View Answer

Answer: a
Explanation: Station services are implemented in every 802.11 station, including AP stations. Distribution services are provided between BSSs.

2. There are a number of possible EAP exchanges that can be used during authentication phase. Typically the message flow between the STA and AP employs the _________ protocol.
a) RADUIS
b) EAPOL
c) TKIP
d) KSN
View Answer

Answer: b
Explanation: The message flow between the STA and AP employs the EAP over LAN (EAPOL) protocol.

3. What is a valid size of the Group Temporal Key (GTK) in WEP?
a) 40 bits
b) 128 bits
c) 512 bits
d) 80 bits
View Answer

Answer: a
Explanation: GTK in WEP is of 40 bits or 104 bits.
advertisement
advertisement

4. In the IEEE 802.11i PRF, a nonce is generated by the following expression:
nonce = PRF (Random Number, “InitCounter”, MAC || Time, Len)
What is the value of the ‘Len’ (desirable number of pseudorandom bits)?
a) 64
b) 128
c) 256
d) 512
View Answer

Answer: c
Explanation: nonce = PRF (Random Number, “InitCounter”, MAC || Time, Len).

5. Which Hashing algorithm is used to derive the PTK for PMK?
a) SHA-1
b) SHA-2
c) SHA-3
d) MD-5
View Answer

Answer: a
Explanation: SHA-1 is used to derive PMK from the PTK.
Note: Join free Sanfoundry classes at Telegram or Youtube

6. Which is the correct order of the SSH Transport Layer Protocol Packet Exchanges?
a) Algorithm Negotiation; End of key exchange; Service request; Identification string exchange
b) Identification string exchange; Algorithm Negotiation; End of key exchange; Service request
c) Identification string exchange; End of key exchange; Service request; Algorithm Negotiation
d) Algorithm Negotiation; Identification string exchange; End of key exchange; Service request
View Answer

Answer: b
Explanation: The correct order is: Identification string exchange; Algorithm Negotiation; End of key exchange; Service request.

7. In which port forwarding technique does the client act on the server’s behalf?
a) Remote Forwarding
b) Local Forwarding
c) Stable Forwarding
d) None of the mentioned
View Answer

Answer: a
Explanation: In Remote forwarding, the client receives traffic with a given destination port number, places the teaffic on the correct port and sends it to the destination the user chooses.
advertisement

8. Which of the following are valid authentication methods?
a) Public Key Based
b) Password Based
c) Host Based
d) All of the mentioned
View Answer

Answer: d
Explanation: The server may require one or more of the three authentication methods mentioned above.

9. The secure authentication connection is referred to as
a) chisel
b) tunnel
c) zeroing
d) handshaking
View Answer

Answer: b
Explanation: The secure connection is referred to as tunnel.
advertisement

10. Broadcast address is given by
a) 0.0.0.0
b) 127.x.x.x
c) 255.255.255.255
d) None of the mentioned
View Answer

Answer: c
Explanation: Broadcast address is given by 255.255.255.255. This address is the last address in the range of addresses, and is the address whose host portion is set to all ones.

Sanfoundry Global Education & Learning Series – Cryptography and Network Security.

To practice all areas of Network Security for aptitude tests, here is complete set of 1000+ Multiple Choice Questions and Answers.

If you find a mistake in question / option / answer, kindly take a screenshot and email to [email protected]

advertisement
advertisement
Subscribe to our Newsletters (Subject-wise). Participate in the Sanfoundry Certification contest to get free Certificate of Merit. Join our social networks below and stay updated with latest contests, videos, internships and jobs!

Youtube | Telegram | LinkedIn | Instagram | Facebook | Twitter | Pinterest
Manish Bhojasia - Founder & CTO at Sanfoundry
Manish Bhojasia, a technology veteran with 20+ years @ Cisco & Wipro, is Founder and CTO at Sanfoundry. He lives in Bangalore, and focuses on development of Linux Kernel, SAN Technologies, Advanced C, Data Structures & Alogrithms. Stay connected with him at LinkedIn.

Subscribe to his free Masterclasses at Youtube & discussions at Telegram SanfoundryClasses.