# Network Security Questions and Answers – IEEE 802.11i WLAN Security – III

This set of tough Network Security Questions focuses on “IEEE 802.11i WLAN Security – III”.

1. In CCMP a 128-bit AES Key is used for both integrity and confidentiality. The scheme uses a ___________ bit packet number to construct a nonce to prevent __________ attacks.
a) 48, replay
b) 64, replay
c) 48, transient
d) 64, transient

Explanation: The scheme uses a 48-bit packet number to construct a nonce to prevent replay attacks.

2. HMAC SHA-1 produces a hash of length-
a) 180 bits
b) 240 bits
c) 160 bits
d) 40 bits

Explanation: The hash length and key length in HASH SHA-1 is 160 bits.

3. In the IEEE 802.11i PRF, a nonce is generated by the following expression –
nonce = PRF (Random Number, “InitCounter”, MAC || Time, Len)
What is the value of the ‘Len’ (desirable number of pseudorandom bits)?
a) 64
b) 128
c) 256
d) 512

Explanation: Nonce = PRF (Random Number, “InitCounter”, MAC || Time, Len).

4. Nonce = PRF (Random Number, “InitCounter”, MAC || Time, Len)
What is the Key ‘K’ in the above expression?
a) InitCounter
b) Random Number
c) PRF
d) Time

Explanation: PRF is the secret key.

5. What is ‘Len’ (desirable number of pseudorandom bits) field in the case of CCMP PTK computation?
a) 256
b) 384
c) 568
d) 298

Explanation: The ‘Len’ value in the case of CCMP is 128+128+128 = 384 bits.
Note: Join free Sanfoundry classes at Telegram or Youtube

6. The message input to the IEEE 802.11 pseudorandom Function consists of 4 items concatenated together. Which of the following option is not a part of this message input –
a) the parameter B
b) a byte with value FF (11111111)
c) the parameter A
d) counter value i

Explanation: The byte concatenated has a value 00h.

7. A __________ is a secret key shared by the AP and a STA and installed in some fashion outside the scope of IEEE 802.11i.
a) pre-shared key
b) pairwise transient key
c) master session key
d) key conformation key

Explanation: A pre-shared key(PSK) is a secret key shared by the AP and a STA and installed in some fashion outside the scope of IEEE 802.11i.

8. The Pairwise master key (PMK) can be derived from either PSK or MSK.
a) True
b) False

Explanation: If a PSK is used then the PSK becomes the PMK; if an MSK is used, then the PMK is derived from the MSK using truncation.
PSK – Pre-shared Key
MSK – Master shared key.

9. The pairwise transient key (PTK) is derived from –
a) Key Confirmation Key (KCK)
b) Temporal Key (TK)
c) Pairwise master Key (PMK)
d) Pre-Shared Key (PSK)

Explanation: The pairwise transient key (PTK) is derived from the Pairwise master Key (PMK).

10. The pairwise transient key (PTK) consists of ______________ keys.
a) 3
b) 4
c) 5
d) 2

Explanation: The pairwise transient key (PTK) consists of three keys, which are KCK KEK and TK.

11. Which Hashing algorithm is used to derive the PTK for PMK?
a) SHA-1
b) SHA-2
c) SHA-3
d) MD-5

Explanation: SHA-1 is used to derive PMK from the PTK.

Sanfoundry Global Education & Learning Series – Cryptography and Network Security.

To practice tough questions on all areas of Network Security, here is complete set of 1000+ Multiple Choice Questions and Answers.

If you find a mistake in question / option / answer, kindly take a screenshot and email to [email protected]