MCQOPTIONS
Home
About Us
Contact Us
Bookmark
Saved Bookmarks
Testing Subject
General Aptitude
Logical and Verbal Reasoning
English Skills Ability
Technical Programming
Current Affairs
General Knowledge
Finance & Accounting
GATE (Mechanical Engineering)
Chemical Engineering
→
Network Security
→
Networking Overview I
→
Which Hashing algorithm is used to derive the PTK...
1.
Which Hashing algorithm is used to derive the PTK for PMK?
A.
SHA-1
B.
SHA-2
C.
SHA-3
D.
MD-5
Answer» B. SHA-2
Show Answer
Discussion
No Comment Found
Post Comment
Related MCQs
Broadcast address is given by
The secure authentication connection is referred to as
In which port forwarding technique does the client act on the server s behalf?
Which Hashing algorithm is used to derive the PTK for PMK?
In the IEEE 802.11i PRF, a nonce is generated by the following expression:nonce = PRF (Random Number, InitCounter , MAC || Time, Len)
There are a number of possible EAP exchanges that can be used during authentication phase. Typically the message flow between the STA and AP employs the _________ protocol.
__________ services are implemented in every 802.11 station, including AP stations. _________ services are provided between BSSs.
Reply to Comment
×
Name
*
Email
*
Comment
*
Submit Reply
Your experience on this site will be improved by allowing cookies. Read
Cookie Policy
Reject
Allow cookies