Network Security Questions & Answers for campus interviews on “IEEE 802.11i WLAN Security”.
1. What is the size of the Temporal Key for the case of TKIP?
a) 64 bits
b) 128 bits
c) 256 bits
d) 512 bits
Answer: c
Clarification: In the case of TKIP -256 bits and CCMP – 128 bits.
2. What is a valid size of the Group Temporal Key (GTK) in WEP?
a) 40 bits
b) 128 bits
c) 512 bits
d) 80 bits
Answer: a
Clarification: GTK in WEP is of 40 bits or 104 bits.
3. Which key in the PTK protects the confidentiality of keys and data during RSN associated procedure?
a) EAPOL KCK
b) EAPOL KEK
c) TK
d) All of the mentioned
Answer: b
Clarification: This is the function of the EAPOL Key Encryption Key.
4. What is the size of the Message Integrity Code Key?
a) 64 bits
b) 128 bits
c) 256 bits
d) 512 bits
Answer: a
Clarification: The MIC Key has a size of 64 bits and it is used by TCIP’s Michael MIS to provide integrity protection of messages.
5. Which one of these is not a Traffic control key?
a) GTK
b) TK
c) MIC Key
d) WEP Key
Answer: c
Clarification: The MIC Key is a message integrity key.
6. The MPDU exchange for distributing pairwise keys is known as __________
a) 2-way handshake
b) 4-way handshake
c) 5 way handshake
d) 3 way handshake
Answer: b
Clarification: The MPDU exchange for distributing pairwise keys is a 4 way handshaking process and hence the name.
7. GTK is encrypted using:
a) Either RC4 or AES
b) DES
c) Rabin
d) ECC
Answer: a
Clarification: GTK is encrypted using either the RC4 or AES cipher system.
8. Message Integrity Code (MIC) is generated by an algorithm called
a) Susan
b) Michael
c) Barbara
d) Rijndael
Answer: b
Clarification: Message Integrity Code (MIC) is generated by an algorithm called Michael.
9. The TKIP and CCMP both provide 3 services: Message Integrity, Data Confidentiality and Protected Data Transfer.
a) True
b) False
Answer: b
Clarification: The TKIP and CCMP both provide the services: Message Integrity and Data Confidentiality. Protected Data Transfer isn’t TKIP and CCMP functionality.
10. CCMP uses which block cipher mode of operation?
a) OFB
b) CFB
c) CTR
d) CBC
Answer: c
Clarification: CCMP uses the CTR mode of operation for AES encryption.