This set of Network Security Questions & Answers for entrance exams focuses on “IEEE 802.11i WLAN Security – I”.
1. What was the security algorithm defined for the IEEE 802.11?
Explanation: Wired Equivalency Privacy was the security algorithm defined for the IEEE 802.11.
2. The final form of the 802.11i standard is referred to as –
a) Wi-Fi Protected Access
b) Robust Security Network
c) Wired Equivalency Privacy
d) None of the mentioned
Explanation: The final form of the 802.11i standard is the Robust Security Network (RSN).
3. EAP stands for –
a) Extended Application Protocol
b) Extensible Authentication Protocol
c) Embedded Application Protocol
d) Embedded Authentication Protocol
Explanation: EAP stands for Extensible Authentication Protocol.
4. TKIP is an access control protocol.
Explanation: TKIP stands for Temporal Key Integrity Protocol and falls under “Confidentiality, Data Origin Authentication and Integrity and Replay Protection.”
5. In which phase of operation does the STA and AS prove their identities to each other?
c) Key generation and distribution
d) Protected data transfer
Explanation: The STA and AS prove their identities to each other in the Authentication phase.
6. The specification of a protocol, along with the chosen key length (if variable) is known as –
a) cipher suite
b) system suite
c) key set
d) service set
Explanation: The specification of a protocol, along with the chosen key length (if variable) is known as cipher suite.
7. Which the 3rd phase of operation in the IEEE 802.11i Protocol?
a) Protected Data Transfer
d) Key Management
Explanation: Key management is the 3rd Phase of operation in the IEEE 802.11i Protocol.
8. Which phase uses the Extensible Authentication Protocol?
c) Key Management
d) Protected Data Transfer
Explanation: EAP belongs to the Authentication Phase and is defined in the IEEE 802.1X standard.
9. There are a number of possible EAP exchanges that can be used during authentication phase. Typically the message flow between the STA and AP employs the ___________ protocol.
Explanation: The message flow between the STA and AP employs the EAP over LAN (EAPOL) protocol.
10. Another name for the AAA key (Authentication, Authorization and Accounting Key) is –
a) pre-shared key
b) pairwise transient key
c) master session key
d) key conformation key
Explanation: The AAA key (Authentication, Authorization and Accounting Key) is also known as master session key.
Sanfoundry Global Education & Learning Series – Cryptography and Network Security.
To practice all areas of Network Security for entrance exams, here is complete set of 1000+ Multiple Choice Questions and Answers.