250+ TOP MCQs on IEEE 802.11i WLAN Security and Answers

Network Security Questions & Answers for campus interviews on “IEEE 802.11i WLAN Security”.

1. What is the size of the Temporal Key for the case of TKIP?
a) 64 bits
b) 128 bits
c) 256 bits
d) 512 bits

Answer: c
Clarification: In the case of TKIP -256 bits and CCMP – 128 bits.

2. What is a valid size of the Group Temporal Key (GTK) in WEP?
a) 40 bits
b) 128 bits
c) 512 bits
d) 80 bits

Answer: a
Clarification: GTK in WEP is of 40 bits or 104 bits.

3. Which key in the PTK protects the confidentiality of keys and data during RSN associated procedure?
a) EAPOL KCK
b) EAPOL KEK
c) TK
d) All of the mentioned

Answer: b
Clarification: This is the function of the EAPOL Key Encryption Key.

4. What is the size of the Message Integrity Code Key?
a) 64 bits
b) 128 bits
c) 256 bits
d) 512 bits

Answer: a
Clarification: The MIC Key has a size of 64 bits and it is used by TCIP’s Michael MIS to provide integrity protection of messages.

5. Which one of these is not a Traffic control key?
a) GTK
b) TK
c) MIC Key
d) WEP Key

Answer: c
Clarification: The MIC Key is a message integrity key.

6. The MPDU exchange for distributing pairwise keys is known as __________
a) 2-way handshake
b) 4-way handshake
c) 5 way handshake
d) 3 way handshake

Answer: b
Clarification: The MPDU exchange for distributing pairwise keys is a 4 way handshaking process and hence the name.

7. GTK is encrypted using:
a) Either RC4 or AES
b) DES
c) Rabin
d) ECC

Answer: a
Clarification: GTK is encrypted using either the RC4 or AES cipher system.

8. Message Integrity Code (MIC) is generated by an algorithm called
a) Susan
b) Michael
c) Barbara
d) Rijndael

Answer: b
Clarification: Message Integrity Code (MIC) is generated by an algorithm called Michael.

9. The TKIP and CCMP both provide 3 services: Message Integrity, Data Confidentiality and Protected Data Transfer.
a) True
b) False

Answer: b
Clarification: The TKIP and CCMP both provide the services: Message Integrity and Data Confidentiality. Protected Data Transfer isn’t TKIP and CCMP functionality.

10. CCMP uses which block cipher mode of operation?
a) OFB
b) CFB
c) CTR
d) CBC

Answer: c
Clarification: CCMP uses the CTR mode of operation for AES encryption.

Leave a Reply

Your email address will not be published. Required fields are marked *