MCQOPTIONS
Saved Bookmarks
This section includes 10 Mcqs, each offering curated multiple-choice questions to sharpen your Network Security knowledge and support exam preparation. Choose a topic below to get started.
| 1. |
The pairwise transient key (PTK) consists of ______________ keys. |
| A. | 3 |
| B. | 4 |
| C. | 5 |
| D. | 2 |
| Answer» B. 4 | |
| 2. |
The pairwise transient key (PTK) is derived from |
| A. | Key Confirmation Key (KCK) |
| B. | Temporal Key (TK) |
| C. | Pairwise master Key (PMK) |
| D. | Pre-Shared Key (PSK) |
| Answer» D. Pre-Shared Key (PSK) | |
| 3. |
The Pairwise master key (PMK) can be derived from either PSK or MSK. |
| A. | True |
| B. | False |
| Answer» B. False | |
| 4. |
A __________ is a secret key shared by the AP and a STA and installed in some fashion outside the scope of IEEE 802.11i. |
| A. | pre-shared key |
| B. | pairwise transient key |
| C. | master session key |
| D. | key conformation key |
| Answer» B. pairwise transient key | |
| 5. |
The message input to the IEEE 802.11 pseudorandom Function consists of 4 items concatenated together. Which of the following option is not a part of this message input |
| A. | the parameter B |
| B. | a byte with value FF (11111111) |
| C. | the parameter A |
| D. | counter value i |
| Answer» C. the parameter A | |
| 6. |
What is Len (desirable number of pseudorandom bits) field in the case of CCMP PTK computation? |
| A. | 256 |
| B. | 384 |
| C. | 568 |
| D. | 298 |
| Answer» C. 568 | |
| 7. |
Nonce = PRF (Random Number, InitCounter , MAC || Time, Len)What is the Key K in the above expression? |
| A. | InitCounter |
| B. | Random Number |
| C. | PRF |
| D. | Time |
| Answer» D. Time | |
| 8. |
In the IEEE 802.11i PRF, a nonce is generated by the following expression nonce = PRF (Random Number, InitCounter , MAC || Time, Len) |
| A. | nWhat is the value of the Len (desirable number of pseudorandom bits)? |
| B. | 64 |
| C. | 128 |
| D. | 256 |
| E. | 512 |
| Answer» D. 256 | |
| 9. |
HMAC SHA-1 produces a hash of length- |
| A. | 180 bits |
| B. | 240 bits |
| C. | 160 bits |
| D. | 40 bits |
| Answer» D. 40 bits | |
| 10. |
In CCMP a 128-bit AES Key is used for both integrity and confidentiality. The scheme uses a ___________ bit packet number to construct a nonce to prevent __________ attacks. |
| A. | 48, replay |
| B. | 64, replay |
| C. | 48, transient |
| D. | 64, transient |
| Answer» B. 64, replay | |