250+ TOP MCQs on IEEE 802.11i WLAN Security Answers

Network Security Questions & Answers for entrance exams on “IEEE 802.11i WLAN Security”.

1. What was the security algorithm defined for the IEEE 802.11?
a) WEP
b) RSN
c) WPA
d) SSL

Answer: a
Clarification: Wired Equivalency Privacy was the security algorithm defined for the IEEE 802.11.

2. The final form of the 802.11i standard is referred to as –
a) Wi-Fi Protected Access
b) Robust Security Network
c) Wired Equivalency Privacy
d) None of the mentioned

Answer: b
Clarification: The final form of the 802.11i standard is the Robust Security Network (RSN).

3. EAP stands for –
a) Extended Application Protocol
b) Extensible Authentication Protocol
c) Embedded Application Protocol
d) Embedded Authentication Protocol

Answer: b
Clarification: EAP stands for Extensible Authentication Protocol.

4. TKIP is an access control protocol.
a) True
b) False

Answer: b
Clarification: TKIP stands for Temporal Key Integrity Protocol and falls under “Confidentiality, Data Origin Authentication and Integrity and Replay Protection.”

5. In which phase of operation does the STA and AS prove their identities to each other?
a) Discovery
b) Authentication
c) Key generation and distribution
d) Protected data transfer

Answer: b
Clarification: The STA and AS prove their identities to each other in the Authentication phase.

6. The specification of a protocol, along with the chosen key length (if variable) is known as –
a) cipher suite
b) system suite
c) key set
d) service set

Answer: a
Clarification: The specification of a protocol, along with the chosen key length (if variable) is known as cipher suite.

7. Which the 3rd phase of operation in the IEEE 802.11i Protocol?
a) Protected Data Transfer
b) Discovery
c) Authentication
d) Key Management

Answer: d
Clarification: Key management is the 3rd Phase of operation in the IEEE 802.11i Protocol.

8. Which phase uses the Extensible Authentication Protocol?
a) Discovery
b) Authentication
c) Key Management
d) Protected Data Transfer

Answer: b
Clarification: EAP belongs to the Authentication Phase and is defined in the IEEE 802.1X standard.

9. There are a number of possible EAP exchanges that can be used during authentication phase. Typically the message flow between the STA and AP employs the ___________ protocol.
a) RADUIS
b) EAPOL
c) TKIP
d) KSN

Answer: b
Clarification: The message flow between the STA and AP employs the EAP over LAN (EAPOL) protocol.

10. Another name for the AAA key (Authentication, Authorization and Accounting Key) is –
a) pre-shared key
b) pairwise transient key
c) master session key
d) key conformation key

Answer: c
Clarification: The AAA key (Authentication, Authorization and Accounting Key) is also known as master session key.

Leave a Reply

Your email address will not be published. Required fields are marked *