Network Security Questions and Answers – Overview – III

This set of tough Network Security questions and answers focuses on “Overview – III”. 1. On which port will the server generally listen to for SMTP? a) port 35 b) port 63 c) port 25 d) port 65 2. In the alert protocol the first byte takes the value 1 or 2 which corresponds to … Read more

advertisement

Network Security Questions and Answers – Overview – II

This set of Network Security Aptitude Test focuses on “Overview – II”. 1. __________ services are implemented in every 802.11 station, including AP stations. _________ services are provided between BSSs. a) Station, Distribution b) Distribution, Station c) Extended, Basic d) Basic, Extended 2. There are a number of possible EAP exchanges that can be used … Read more

advertisement

Network Security Questions and Answers – Overview – I

This set of Network Security Multiple Choice Questions & Answers (MCQs) focuses on “Overview of Network Security”. 1. Number of Blocks in class C are – a) 27 b) 28 c) 214 d) 29 2. A router receives a packet with the destination address 132.7.21.84. Find the network address of the packet. a) 1.32.7 b) … Read more

advertisement

Network Security Questions and Answers – IEEE 802.11i WLAN Security – III

This set of tough Network Security Questions focuses on “IEEE 802.11i WLAN Security – III”. 1. In CCMP a 128-bit AES Key is used for both integrity and confidentiality. The scheme uses a ___________ bit packet number to construct a nonce to prevent __________ attacks. a) 48, replay b) 64, replay c) 48, transient d) … Read more

advertisement

Network Security Questions and Answers – IEEE 802.11i WLAN Security – II

This set of Network Security Questions & Answers for campus interviews focuses on “IEEE 802.11i WLAN Security – II”. 1. What is the size of the Temporal Key for the case of TKIP? a) 64 bits b) 128 bits c) 256 bits d) 512 bits 2. What is a valid size of the Group Temporal … Read more

advertisement

Network Security Questions and Answers – IEEE 802.11i WLAN Security – I

This set of Network Security Questions & Answers for entrance exams focuses on “IEEE 802.11i WLAN Security – I”. 1. What was the security algorithm defined for the IEEE 802.11? a) WEP b) RSN c) WPA d) SSL 2. The final form of the 802.11i standard is referred to as – a) Wi-Fi Protected Access … Read more

advertisement

Network Security Questions and Answers – IEEE 802.11 WLAN – II

This set of Network Security question bank focuses on “IEEE 802.11 WLAN – II” 1. __________ consists of two or more basic service sets interconnected by a distribution system. a) Extended Service Set b) Permuted Service Set c) Complex Service Set d) Multiplex Service Set 2. IEEE 802.11 defines ___________ services that need to be … Read more

advertisement

Network Security Questions and Answers – IEEE 802.11 WLAN – I

This set of Network Security online quiz focuses on “IEEE 802.11 WLAN – I”. 1. Which layer in the IEEE 802.11 protocol stack has the function of flow control and error control? a) Physical Layer b) Logic Link Control Layer c) Medium Access Layer d) None of the mentioned 2. With respect to IEEE 802.11 … Read more

advertisement

Network Security Questions and Answers – Wireless Security

This set of Network Security online test focuses on “Wireless Security”. 1. Wi-Fi stands for- a) Wireless Fidelity b) Wireless LAN c) Wireless FLAN d) None of the mentioned 2. Wired networks are far more susceptible to eavesdropping and jamming than wireless networks. a) True b) False 3. “A user intending to connect to one … Read more

advertisement

Network Security Questions and Answers – Secure Shell(SSH) – II

This set of Network Security Puzzles focuses on “Secure Shell(SSH)”. 1. In the Key generation procedure, the Integrity Key from the client to server is represented as: a) HASH(K||H||”E”||session_id) b) HASH(K||H||”C”||session_id) c) HASH(K||H||”B”||session_id) d) HASH(K||H||”D”||session_id) 2.In the Key generation procedure, the Integrity Key from the server to client is represented as: a) HASH(K||H||”A”||session_id) b) HASH(K||H||”B”||session_id) … Read more

advertisement
Subscribe to our Newsletters (Subject-wise). Participate in the Sanfoundry Certification contest to get free Certificate of Merit. Join our social networks below and stay updated with latest contests, videos, internships and jobs!

Youtube | Telegram | LinkedIn | Instagram | Facebook | Twitter | Pinterest
Manish Bhojasia - Founder & CTO at Sanfoundry
Manish Bhojasia, a technology veteran with 20+ years @ Cisco & Wipro, is Founder and CTO at Sanfoundry. He lives in Bangalore, and focuses on development of Linux Kernel, SAN Technologies, Advanced C, Data Structures & Alogrithms. Stay connected with him at LinkedIn.

Subscribe to his free Masterclasses at Youtube & discussions at Telegram SanfoundryClasses.