Network Security Questions and Answers – IEEE 802.11i WLAN Security – I

«
»

This set of Network Security Questions & Answers for entrance exams focuses on “IEEE 802.11i WLAN Security – I”.

1. What was the security algorithm defined for the IEEE 802.11?
a) WEP
b) RSN
c) WPA
d) SSL
View Answer

Answer: a
Explanation: Wired Equivalency Privacy was the security algorithm defined for the IEEE 802.11.
advertisement

2. The final form of the 802.11i standard is referred to as –
a) Wi-Fi Protected Access
b) Robust Security Network
c) Wired Equivalency Privacy
d) None of the mentioned
View Answer

Answer: b
Explanation: The final form of the 802.11i standard is the Robust Security Network (RSN).

3. EAP stands for –
a) Extended Application Protocol
b) Extensible Authentication Protocol
c) Embedded Application Protocol
d) Embedded Authentication Protocol
View Answer

Answer: b
Explanation: EAP stands for Extensible Authentication Protocol.

4. TKIP is an access control protocol.
a) True
b) False
View Answer

Answer: b
Explanation: TKIP stands for Temporal Key Integrity Protocol and falls under “Confidentiality, Data Origin Authentication and Integrity and Replay Protection.”

5. In which phase of operation does the STA and AS prove their identities to each other?
a) Discovery
b) Authentication
c) Key generation and distribution
d) Protected data transfer
View Answer

Answer: b
Explanation: The STA and AS prove their identities to each other in the Authentication phase.
advertisement

6. The specification of a protocol, along with the chosen key length (if variable) is known as –
a) cipher suite
b) system suite
c) key set
d) service set
View Answer

Answer: a
Explanation: The specification of a protocol, along with the chosen key length (if variable) is known as cipher suite.

7. Which the 3rd phase of operation in the IEEE 802.11i Protocol?
a) Protected Data Transfer
b) Discovery
c) Authentication
d) Key Management
View Answer

Answer: d
Explanation: Key management is the 3rd Phase of operation in the IEEE 802.11i Protocol.

8. Which phase uses the Extensible Authentication Protocol?
a) Discovery
b) Authentication
c) Key Management
d) Protected Data Transfer
View Answer

Answer: b
Explanation: EAP belongs to the Authentication Phase and is defined in the IEEE 802.1X standard.

9. There are a number of possible EAP exchanges that can be used during authentication phase. Typically the message flow between the STA and AP employs the ___________ protocol.
a) RADUIS
b) EAPOL
c) TKIP
d) KSN
View Answer

Answer: b
Explanation: The message flow between the STA and AP employs the EAP over LAN (EAPOL) protocol.
advertisement

10. Another name for the AAA key (Authentication, Authorization and Accounting Key) is –
a) pre-shared key
b) pairwise transient key
c) master session key
d) key conformation key
View Answer

Answer: c
Explanation: The AAA key (Authentication, Authorization and Accounting Key) is also known as master session key.

Sanfoundry Global Education & Learning Series – Cryptography and Network Security.

To practice all areas of Network Security for entrance exams, here is complete set of 1000+ Multiple Choice Questions and Answers.

Participate in the Sanfoundry Certification contest to get free Certificate of Merit. Join our social networks below and stay updated with latest contests, videos, internships and jobs!

advertisement
advertisement
advertisement
Manish Bhojasia, a technology veteran with 20+ years @ Cisco & Wipro, is Founder and CTO at Sanfoundry. He is Linux Kernel Developer & SAN Architect and is passionate about competency developments in these areas. He lives in Bangalore and delivers focused training sessions to IT professionals in Linux Kernel, Linux Debugging, Linux Device Drivers, Linux Networking, Linux Storage, Advanced C Programming, SAN Storage Technologies, SCSI Internals & Storage Protocols such as iSCSI & Fiber Channel. Stay connected with him @ LinkedIn