Network Security Questions and Answers – IEEE 802.11i WLAN Security – III

This set of tough Network Security Questions focuses on “IEEE 802.11i WLAN Security – III”.

1. In CCMP a 128-bit AES Key is used for both integrity and confidentiality. The scheme uses a ___________ bit packet number to construct a nonce to prevent __________ attacks.
a) 48, replay
b) 64, replay
c) 48, transient
d) 64, transient
View Answer

Answer: a
Explanation: The scheme uses a 48-bit packet number to construct a nonce to prevent replay attacks.

2. HMAC SHA-1 produces a hash of length-
a) 180 bits
b) 240 bits
c) 160 bits
d) 40 bits
View Answer

Answer: c
Explanation: The hash length and key length in HASH SHA-1 is 160 bits.

3. In the IEEE 802.11i PRF, a nonce is generated by the following expression –
nonce = PRF (Random Number, “InitCounter”, MAC || Time, Len)
What is the value of the ‘Len’ (desirable number of pseudorandom bits)?
a) 64
b) 128
c) 256
d) 512
View Answer

Answer: c
Explanation: Nonce = PRF (Random Number, “InitCounter”, MAC || Time, Len).
advertisement
advertisement

4. Nonce = PRF (Random Number, “InitCounter”, MAC || Time, Len)
What is the Key ‘K’ in the above expression?
a) InitCounter
b) Random Number
c) PRF
d) Time
View Answer

Answer: c
Explanation: PRF is the secret key.

5. What is ‘Len’ (desirable number of pseudorandom bits) field in the case of CCMP PTK computation?
a) 256
b) 384
c) 568
d) 298
View Answer

Answer: b
Explanation: The ‘Len’ value in the case of CCMP is 128+128+128 = 384 bits.
Note: Join free Sanfoundry classes at Telegram or Youtube

6. The message input to the IEEE 802.11 pseudorandom Function consists of 4 items concatenated together. Which of the following option is not a part of this message input –
a) the parameter B
b) a byte with value FF (11111111)
c) the parameter A
d) counter value i
View Answer

Answer: b
Explanation: The byte concatenated has a value 00h.

7. A __________ is a secret key shared by the AP and a STA and installed in some fashion outside the scope of IEEE 802.11i.
a) pre-shared key
b) pairwise transient key
c) master session key
d) key conformation key
View Answer

Answer: a
Explanation: A pre-shared key(PSK) is a secret key shared by the AP and a STA and installed in some fashion outside the scope of IEEE 802.11i.
advertisement

8. The Pairwise master key (PMK) can be derived from either PSK or MSK.
a) True
b) False
View Answer

Answer: a
Explanation: If a PSK is used then the PSK becomes the PMK; if an MSK is used, then the PMK is derived from the MSK using truncation.
PSK – Pre-shared Key
MSK – Master shared key.

9. The pairwise transient key (PTK) is derived from –
a) Key Confirmation Key (KCK)
b) Temporal Key (TK)
c) Pairwise master Key (PMK)
d) Pre-Shared Key (PSK)
View Answer

Answer: c
Explanation: The pairwise transient key (PTK) is derived from the Pairwise master Key (PMK).
advertisement

10. The pairwise transient key (PTK) consists of ______________ keys.
a) 3
b) 4
c) 5
d) 2
View Answer

Answer: a
Explanation: The pairwise transient key (PTK) consists of three keys, which are KCK KEK and TK.

11. Which Hashing algorithm is used to derive the PTK for PMK?
a) SHA-1
b) SHA-2
c) SHA-3
d) MD-5
View Answer

Answer: a
Explanation: SHA-1 is used to derive PMK from the PTK.

Sanfoundry Global Education & Learning Series – Cryptography and Network Security.

To practice tough questions on all areas of Network Security, here is complete set of 1000+ Multiple Choice Questions and Answers.

If you find a mistake in question / option / answer, kindly take a screenshot and email to [email protected]

advertisement
advertisement
Subscribe to our Newsletters (Subject-wise). Participate in the Sanfoundry Certification contest to get free Certificate of Merit. Join our social networks below and stay updated with latest contests, videos, internships and jobs!

Youtube | Telegram | LinkedIn | Instagram | Facebook | Twitter | Pinterest
Manish Bhojasia - Founder & CTO at Sanfoundry
Manish Bhojasia, a technology veteran with 20+ years @ Cisco & Wipro, is Founder and CTO at Sanfoundry. He lives in Bangalore, and focuses on development of Linux Kernel, SAN Technologies, Advanced C, Data Structures & Alogrithms. Stay connected with him at LinkedIn.

Subscribe to his free Masterclasses at Youtube & discussions at Telegram SanfoundryClasses.