This set of Network Security Multiple Choice Questions & Answers (MCQs) focuses on “IEEE 802.11i WLAN Security – II”.
1. What is the size of the Temporal Key for the case of TKIP?
a) 64 bits
b) 128 bits
c) 256 bits
d) 512 bits
View Answer
Explanation: In the case of TKIP -256 bits and CCMP – 128 bits.
2. What is a valid size of the Group Temporal Key (GTK) in WEP?
a) 40 bits
b) 128 bits
c) 512 bits
d) 80 bits
View Answer
Explanation: GTK in WEP is of 40 bits or 104 bits.
3. Which key in the PTK protects the confidentiality of keys and data during RSN associated procedure?
a) EAPOL KCK
b) EAPOL KEK
c) TK
d) All of the mentioned
View Answer
Explanation: This is the function of the EAPOL Key Encryption Key.
4. What is the size of the Message Integrity Code Key?
a) 64 bits
b) 128 bits
c) 256 bits
d) 512 bits
View Answer
Explanation: The MIC Key has a size of 64 bits and it is used by TCIP’s Michael MIS to provide integrity protection of messages.
5. Which one of these is not a Traffic control key?
a) GTK
b) TK
c) MIC Key
d) WEP Key
View Answer
Explanation: The MIC Key is a message integrity key.
6. The MPDU exchange for distributing pairwise keys is known as __________
a) 2-way handshake
b) 4-way handshake
c) 5 way handshake
d) 3 way handshake
View Answer
Explanation: The MPDU exchange for distributing pairwise keys is a 4 way handshaking process and hence the name.
7. GTK is encrypted using:
a) Either RC4 or AES
b) DES
c) Rabin
d) ECC
View Answer
Explanation: GTK is encrypted using either the RC4 or AES cipher system.
8. Message Integrity Code (MIC) is generated by an algorithm called
a) Susan
b) Michael
c) Barbara
d) Rijndael
View Answer
Explanation: Message Integrity Code (MIC) is generated by an algorithm called Michael.
9. The TKIP and CCMP both provide 3 services: Message Integrity, Data Confidentiality and Protected Data Transfer.
a) True
b) False
View Answer
Explanation: The TKIP and CCMP both provide the services: Message Integrity and Data Confidentiality. Protected Data Transfer isn’t TKIP and CCMP functionality.
10. CCMP uses which block cipher mode of operation?
a) OFB
b) CFB
c) CTR
d) CBC
View Answer
Explanation: CCMP uses the CTR mode of operation for AES encryption.
Sanfoundry Global Education & Learning Series – Cryptography and Network Security.
To practice all areas of Cryptography and Network Security, here is complete set of 1000+ Multiple Choice Questions and Answers.
- Practice Cyber Security MCQ
- Practice Computer Science MCQs
- Apply for Computer Science Internship
- Check Computer Science Books
- Check Cryptography and Network Security Books