Network Security Questions & Answers for entrance exams on “IEEE 802.11i WLAN Security”.
1. What was the security algorithm defined for the IEEE 802.11?
a) WEP
b) RSN
c) WPA
d) SSL
Answer: a
Clarification: Wired Equivalency Privacy was the security algorithm defined for the IEEE 802.11.
2. The final form of the 802.11i standard is referred to as –
a) Wi-Fi Protected Access
b) Robust Security Network
c) Wired Equivalency Privacy
d) None of the mentioned
Answer: b
Clarification: The final form of the 802.11i standard is the Robust Security Network (RSN).
3. EAP stands for –
a) Extended Application Protocol
b) Extensible Authentication Protocol
c) Embedded Application Protocol
d) Embedded Authentication Protocol
Answer: b
Clarification: EAP stands for Extensible Authentication Protocol.
4. TKIP is an access control protocol.
a) True
b) False
Answer: b
Clarification: TKIP stands for Temporal Key Integrity Protocol and falls under “Confidentiality, Data Origin Authentication and Integrity and Replay Protection.”
5. In which phase of operation does the STA and AS prove their identities to each other?
a) Discovery
b) Authentication
c) Key generation and distribution
d) Protected data transfer
Answer: b
Clarification: The STA and AS prove their identities to each other in the Authentication phase.
6. The specification of a protocol, along with the chosen key length (if variable) is known as –
a) cipher suite
b) system suite
c) key set
d) service set
Answer: a
Clarification: The specification of a protocol, along with the chosen key length (if variable) is known as cipher suite.
7. Which the 3rd phase of operation in the IEEE 802.11i Protocol?
a) Protected Data Transfer
b) Discovery
c) Authentication
d) Key Management
Answer: d
Clarification: Key management is the 3rd Phase of operation in the IEEE 802.11i Protocol.
8. Which phase uses the Extensible Authentication Protocol?
a) Discovery
b) Authentication
c) Key Management
d) Protected Data Transfer
Answer: b
Clarification: EAP belongs to the Authentication Phase and is defined in the IEEE 802.1X standard.
9. There are a number of possible EAP exchanges that can be used during authentication phase. Typically the message flow between the STA and AP employs the ___________ protocol.
a) RADUIS
b) EAPOL
c) TKIP
d) KSN
Answer: b
Clarification: The message flow between the STA and AP employs the EAP over LAN (EAPOL) protocol.
10. Another name for the AAA key (Authentication, Authorization and Accounting Key) is –
a) pre-shared key
b) pairwise transient key
c) master session key
d) key conformation key
Answer: c
Clarification: The AAA key (Authentication, Authorization and Accounting Key) is also known as master session key.