This set of Network Security Multiple Choice Questions & Answers (MCQs) focuses on “IEEE 802.11i WLAN Security – I”.
1. What was the security algorithm defined for the IEEE 802.11?
a) WEP
b) RSN
c) WPA
d) SSL
View Answer
Explanation: Wired Equivalency Privacy was the security algorithm defined for the IEEE 802.11.
2. The final form of the 802.11i standard is referred to as –
a) Wi-Fi Protected Access
b) Robust Security Network
c) Wired Equivalency Privacy
d) None of the mentioned
View Answer
Explanation: The final form of the 802.11i standard is the Robust Security Network (RSN).
3. EAP stands for –
a) Extended Application Protocol
b) Extensible Authentication Protocol
c) Embedded Application Protocol
d) Embedded Authentication Protocol
View Answer
Explanation: EAP stands for Extensible Authentication Protocol.
4. TKIP is an access control protocol.
a) True
b) False
View Answer
Explanation: TKIP stands for Temporal Key Integrity Protocol and falls under “Confidentiality, Data Origin Authentication and Integrity and Replay Protection.”
5. In which phase of operation does the STA and AS prove their identities to each other?
a) Discovery
b) Authentication
c) Key generation and distribution
d) Protected data transfer
View Answer
Explanation: The STA and AS prove their identities to each other in the Authentication phase.
6. The specification of a protocol, along with the chosen key length (if variable) is known as –
a) cipher suite
b) system suite
c) key set
d) service set
View Answer
Explanation: The specification of a protocol, along with the chosen key length (if variable) is known as cipher suite.
7. Which the 3rd phase of operation in the IEEE 802.11i Protocol?
a) Protected Data Transfer
b) Discovery
c) Authentication
d) Key Management
View Answer
Explanation: Key management is the 3rd Phase of operation in the IEEE 802.11i Protocol.
8. Which phase uses the Extensible Authentication Protocol?
a) Discovery
b) Authentication
c) Key Management
d) Protected Data Transfer
View Answer
Explanation: EAP belongs to the Authentication Phase and is defined in the IEEE 802.1X standard.
9. There are a number of possible EAP exchanges that can be used during authentication phase. Typically the message flow between the STA and AP employs the ___________ protocol.
a) RADUIS
b) EAPOL
c) TKIP
d) KSN
View Answer
Explanation: The message flow between the STA and AP employs the EAP over LAN (EAPOL) protocol.
10. Another name for the AAA key (Authentication, Authorization and Accounting Key) is –
a) pre-shared key
b) pairwise transient key
c) master session key
d) key conformation key
View Answer
Explanation: The AAA key (Authentication, Authorization and Accounting Key) is also known as master session key.
Sanfoundry Global Education & Learning Series – Cryptography and Network Security.
To practice all areas of Cryptography and Network Security, here is complete set of 1000+ Multiple Choice Questions and Answers.
- Practice Cyber Security MCQ
- Check Cryptography and Network Security Books
- Practice Computer Science MCQs
- Apply for Computer Science Internship
- Check Computer Science Books