Network Security Questions and Answers – IEEE 802.11i WLAN Security – II

This set of Network Security Questions & Answers for campus interviews focuses on “IEEE 802.11i WLAN Security – II”.

1. What is the size of the Temporal Key for the case of TKIP?
a) 64 bits
b) 128 bits
c) 256 bits
d) 512 bits
View Answer

Answer: c
Explanation: In the case of TKIP -256 bits and CCMP – 128 bits.

2. What is a valid size of the Group Temporal Key (GTK) in WEP?
a) 40 bits
b) 128 bits
c) 512 bits
d) 80 bits
View Answer

Answer: a
Explanation: GTK in WEP is of 40 bits or 104 bits.

3. Which key in the PTK protects the confidentiality of keys and data during RSN associated procedure?
a) EAPOL KCK
b) EAPOL KEK
c) TK
d) All of the mentioned
View Answer

Answer: b
Explanation: This is the function of the EAPOL Key Encryption Key.
advertisement
advertisement

4. What is the size of the Message Integrity Code Key?
a) 64 bits
b) 128 bits
c) 256 bits
d) 512 bits
View Answer

Answer: a
Explanation: The MIC Key has a size of 64 bits and it is used by TCIP’s Michael MIS to provide integrity protection of messages.

5. Which one of these is not a Traffic control key?
a) GTK
b) TK
c) MIC Key
d) WEP Key
View Answer

Answer: c
Explanation: The MIC Key is a message integrity key.
Sanfoundry Certification Contest of the Month is Live. 100+ Subjects. Participate Now!

6. The MPDU exchange for distributing pairwise keys is known as __________
a) 2-way handshake
b) 4-way handshake
c) 5 way handshake
d) 3 way handshake
View Answer

Answer: b
Explanation: The MPDU exchange for distributing pairwise keys is a 4 way handshaking process and hence the name.

7. GTK is encrypted using:
a) Either RC4 or AES
b) DES
c) Rabin
d) ECC
View Answer

Answer: a
Explanation: GTK is encrypted using either the RC4 or AES cipher system.
advertisement

8. Message Integrity Code (MIC) is generated by an algorithm called
a) Susan
b) Michael
c) Barbara
d) Rijndael
View Answer

Answer: b
Explanation: Message Integrity Code (MIC) is generated by an algorithm called Michael.

9. The TKIP and CCMP both provide 3 services: Message Integrity, Data Confidentiality and Protected Data Transfer.
a) True
b) False
View Answer

Answer: b
Explanation: The TKIP and CCMP both provide the services: Message Integrity and Data Confidentiality. Protected Data Transfer isn’t TKIP and CCMP functionality.
advertisement

10. CCMP uses which block cipher mode of operation?
a) OFB
b) CFB
c) CTR
d) CBC
View Answer

Answer: c
Explanation: CCMP uses the CTR mode of operation for AES encryption.

Sanfoundry Global Education & Learning Series – Cryptography and Network Security.

To practice all areas of Network Security for campus interviews, here is complete set of 1000+ Multiple Choice Questions and Answers.

If you find a mistake in question / option / answer, kindly take a screenshot and email to [email protected]

advertisement
advertisement
Subscribe to our Newsletters (Subject-wise). Participate in the Sanfoundry Certification contest to get free Certificate of Merit. Join our social networks below and stay updated with latest contests, videos, internships and jobs!

Youtube | Telegram | LinkedIn | Instagram | Facebook | Twitter | Pinterest
Manish Bhojasia - Founder & CTO at Sanfoundry
Manish Bhojasia, a technology veteran with 20+ years @ Cisco & Wipro, is Founder and CTO at Sanfoundry. He lives in Bangalore, and focuses on development of Linux Kernel, SAN Technologies, Advanced C, Data Structures & Alogrithms. Stay connected with him at LinkedIn.

Subscribe to his free Masterclasses at Youtube & discussions at Telegram SanfoundryClasses.